What strikes you as the most persuasive and non-persuasive


Assignment

• Choose and read three articles from the list bellow:

o Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, Fall 2013.

o Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, Fall 2013.

o Arquilla, J. (2012). Cyberwar is already upon us. Foreign Policy. March/April, 2012.

o Brown, G. & Poellet, K. (2012). The Customary International Law of Cyberspace. Strategic Studies Quarterly, 6, no. 3, pp. 126-145.

o Caplan, N. (2013). Cyber War: the Challenge to National Security. Global Security Studies, Winter 2013, Volume 4, Issue

o Studentnummer, L. van den Boom (2012). The dilemmas of state response to cyber attacks. Understanding the phenomena, challenges and legal response. Vrije Universiteit Amsterdam: Paper Governance of Security and Policing.

o Crosston, M. D. (2011). World Gone Cyber MAD: How 'Mutually Assured Debilitation' Is the Best Hope for Cyber Deterrence. Strategic Studies Quarterly, 5, no. 1, pp. 100-116.

o Goldsmith, J. (2011). Cybersecurity Treaties: A Skeptical View. A Future Challenges Essay. Hoover Institution.

o Mudrinich, E. (2012). Cyber 3.0: the Department of Defense strategy for operating in cyberspace and the attribution problem.

o Guinchard, A. (2011). Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy. Journal of Strategic Security Volume 4 Number 2 Summer 2011.

o Khosla, P. (2009). Information Security for the Next Century. Carnegie Mellon CyLab.

o Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), pp. 1155-1175.

o Kusiak, P. (2012). Culture, Identity, and Information Technology in the 21st Century: Implications for U.S. National Security. Carlisle Barracks: U.S. Army War College, Strategic Studies Institute.

o Libicki, M. C. (2012). Crisis and Escalation in Cyberspace. Santa Monica: RAND.

o Nye, J. (2011). Nuclear lessons for cyber security. Strategic Studies Quarterly. Winter 2011.

o Rid T. (2012). Think again: Cyberwar. Foreign Policy. March/April, 2012.

o Robinson, N., Gribbon, L., Horvath, V. & Robertson, K. (2013). Cyber-security threat characterisation: A rapid comparative analysis. RAND Europe.

o Schilling, J. R. (2010). Defining Our National Cyberspace Boundaries. Strategy Research Project. Carlisle Barracks: U.S. Army War College.

o Schneider, F. B. & Birman, K.B. (2009). The monoculture risk put into context. IEEE Security & Privacy.

o Schneider, F. & Mulligan, D. (2011). Doctrine for cybersecurity. Daedalus. Fall 2011, pp. 70-92.

o Steptoe Cyberblog (2012). The hackback debate. Nov. 2, 2012.

o Ahmad, R. & Yunos, Z (2012). The Application of Mixed Method in Developing a Cyber Terrorism Framework. Journal of Information Security, 2012, 3, pp. 209-214.

o Gourley, B. (2009). Open Source Software and Cyber Defense. A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure.

o Cote, R. (2011). The Strategic Paradox of Social Networks. Strategy Research Project. Carlisle Barracks: U.S. Army War College.

Answer these questions in 250 words

1. What strikes you as the most persuasive and non-persuasive premise or thesis?
2. Conclude with a research or policy question for further research.

Request for Solution File

Ask an Expert for Answer!!
Dissertation: What strikes you as the most persuasive and non-persuasive
Reference No:- TGS02354522

Expected delivery within 24 Hours