Edited by Nicholas Tsagourias and Russell Buchan
Chapter 10: The notion of cyber operations
AbstractThe aim of this chapter is to elaborate on the notion of ‘cyber operations’ against the generic manner in which they are used by popular media as well as by academics. This chapter differentiates between actors and motives, covering operations conducted by both state and non-state entities. Special attention is paid to governmental cyber operations that are characterized by distinct roles and paradigms: governance, protection, law enforcement, intelligence and military operations. Despite similarities regarding means and methods used in various cyber operations, the critical test is the purpose of those launching such operations. For governmental actors, the purposes are vested in the aforementioned paradigms.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.