In this Book

  • The Decision to Attack: Military and Intelligence Cyber Decision-Making
  • Book
  • Aaron Franklin Brantly
  • 2016
  • Published by: University of Georgia Press
    • Viewed
    • View Citation
summary
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain.

With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utilityvrational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.

Discussed:
The Key Concepts of Cyber
The Motivation and Utility for Covert Action
Digital Power
Anonymity and Attribution in Cyberspace
Cyber and Conventional Operations:
The Dynamics of Conflict
Defining the Role of Intelligence in Cyberspace
How Actors Decide to Use Cyber·a Rational
Choice Approach
Cognitive Processes and Decision-Making
in Cyberspace
Finding Meaning in the Expected Utility of
International Cyber Conflict

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • PDF icon Download
  1. Series page, Title, Copyright, Dedication
  2. restricted access
    • PDF icon Download
  1. Contents
  2. pp. ix-x
  3. restricted access
    • PDF icon Download
  1. List of Illustrations
  2. pp. xi-xii
  3. restricted access
    • PDF icon Download
  1. Acknowledgments
  2. pp. xiii-xiv
  3. restricted access
    • PDF icon Download
  1. List of Abbreviations
  2. pp. xv-xvi
  3. restricted access
    • PDF icon Download
  1. Chapter 1. Introduction to Cyber Decision-Making
  2. pp. 1-24
  3. restricted access
    • PDF icon Download
  1. Chapter 2. The Key Concepts of Cyber
  2. pp. 25-42
  3. restricted access
    • PDF icon Download
  1. Chapter 3. The Motivation and Utility for Covert Action
  2. pp. 43-62
  3. restricted access
    • PDF icon Download
  1. Chapter 4. Digital Power
  2. pp. 63-78
  3. restricted access
    • PDF icon Download
  1. Chapter 5. Anonymity and Attribution in Cyberspace
  2. pp. 79-89
  3. restricted access
    • PDF icon Download
  1. Chapter 6. Cyber and Conventional Operations: The Dynamics of Conflict
  2. pp. 90-100
  3. restricted access
    • PDF icon Download
  1. Chapter 7. Defining the Role of Intelligence in Cyberspace
  2. pp. 101-124
  3. restricted access
    • PDF icon Download
  1. Chapter 8. How Actors Decide to Use Cyber—a Rational Choice Approach
  2. pp. 125-149
  3. restricted access
    • PDF icon Download
  1. Chapter 9. Cognitive Processes and Decision-Making in Cyberspace
  2. pp. 150-156
  3. restricted access
    • PDF icon Download
  1. Chapter 10. Finding Meaning in the Expected Utility of International Cyber Conflict
  2. pp. 157-168
  3. restricted access
    • PDF icon Download
  1. Appendix A. Power Score Components and Scores
  2. pp. 169-170
  3. restricted access
    • PDF icon Download
  1. Appendix B. Modified Economist Intelligence Unit Component Values
  2. pp. 171-188
  3. restricted access
    • PDF icon Download
  1. Appendix C. Affinity Scores
  2. pp. 189-190
  3. restricted access
    • PDF icon Download
  1. Notes
  2. pp. 191-202
  3. restricted access
    • PDF icon Download
  1. Works Cited
  2. pp. 203-216
  3. restricted access
    • PDF icon Download
  1. Index
  2. pp. 217-226
  3. restricted access
    • PDF icon Download
Back To Top