مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

936
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

The Deterrence Power in Cyberspace

Pages

  47-74

Abstract

 The anarchical status of Cyberspace brings about deep effects on countries’ interests and national security. A large number of anonymous global players threaten the interests or even the vital infrastructures of their counterparts on a daily basis. This has made the states around the world to think about finding a real approach to decrease such damages, threats, etc. in the Cyberspace. And the Deterrence Strategy, as an efficient tool in dealing with such a significant issue, is the outcome of this long endeavor. The current essay aims to discover the effectiveness of Deterrence Strategy in Cyberspace and those conditions it is in need of to be regarded as a most efficient deterring tool. The findings here in this essay prove that the Deterrence Strategy cannot have the same performance in Cyberspace as it had during the Cold War. However, at the same time, they establish that the Deterrence Strategy enjoys great potentials through which it protects the countries’ interests and national security. Great Defense capability, the power of identifying the invaders, and the capability of conducting harsh Retaliatory Acts are the main three components that make this strategy effective. However, it is worth saying that among all those components, the ‘ identification’ factor plays the most fundamental role in making the Deterrence Strategy effective in Cyberspace. The reason is that an unbeaten identifying process guarantees the effectiveness and usefulness of Retaliatory Acts. Furthermore, such a triumph will force the real threat to be wiped out forever. The findings also show that the Deterrence Strategy is something imperfect without the presence of Retaliatory Acts. In fact, such a shortcoming allows the potential invaders to revise their plans in order to resume their attacks against their rivals in Cyberspace.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ZABOLIZADEH, ARDESHIR, & VAHABPOUR, PEYMAN. (2018). The Deterrence Power in Cyberspace. (RASANE VA FARHANG), 8(1 (15) ), 47-74. SID. https://sid.ir/paper/360762/en

    Vancouver: Copy

    ZABOLIZADEH ARDESHIR, VAHABPOUR PEYMAN. The Deterrence Power in Cyberspace. (RASANE VA FARHANG)[Internet]. 2018;8(1 (15) ):47-74. Available from: https://sid.ir/paper/360762/en

    IEEE: Copy

    ARDESHIR ZABOLIZADEH, and PEYMAN VAHABPOUR, “The Deterrence Power in Cyberspace,” (RASANE VA FARHANG), vol. 8, no. 1 (15) , pp. 47–74, 2018, [Online]. Available: https://sid.ir/paper/360762/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button