Skip to main content
14
Views
235
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Reviewed article

Controlling Computer Network Operations

How to cite:
Andrew Rathmell
"Controlling Computer Network Operations"
Information & Security: An International Journal,
7,
(2001):
121-144.
http://dx.doi.org/10.11610/isij.0707

Controlling Computer Network Operations

Source:

Information & Security: An International Journal,
Volume: 7,
p.121-144
(2001)

Abstract:

The development of Information Operations and, more particularly, Computer Network Operations (CNO), has been paralleled by calls to control both the military and the criminal/terrorist use of these capabilities. The need for multilateral action to control criminal and terrorist activity is acknowledged and being pursued through mechanisms such as the Council of Europe. Efforts to control military use of CNO through arms control or multilateral behavioral norms are however being undermined by an unresolved dilemma faced by the leading powers; whether to exploit their CNO advantage for strategic purposes or to protect the global information environment on which they depend. In resolving this dilemma, Western strategists need to take into account two important new features of the security environment—interdependency and the role of the private sector.

14
Views
235
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
14
Citations
International Journal of Computer & Organization Trends
3,
no. 3
(2013):
The Ashgate Research Companion to Modern Warfare
(2010):
WSIS Thematic Meeting on Cybersecurity
(2005):
Journal of International Relations and Development
21,
no. 3
(2018):
523–551.