Book Chapter - Georgetown University Press
Cyber Threats, Nuclear Analogies? Divergent Trajectories in Adapting to New Dual-Use Technologies
Alarm is mounting over large security vulnerabilities produced by the pervasive spread of cyber capabilities into vast realms of socioeconomic activity.
To be sure, most cyber threats fall into the category of mischief or normal crime, but some potential cyber attacks—on nuclear power plants or other critical infrastructure or on the financial system, for example—could do enormous harm....
The entire volume of Understanding Cyber Conflict: 14 Analogies is available for download here.
For more information on this publication:
Please contact
International Security
For Academic Citation:
Miller, Steven E. "Cyber Threats, Nuclear Analogies? Divergent Trajectories in Adapting to New Dual-Use Technologies." In Understanding Cyber Conflict: 14 Analogies, Perkovich, George and Ariel E. Levite, eds., Washington, D.C.: Georgetown University Press, 2017: pp. 161–179
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Journal Article
- Quarterly Journal: International Security
Deterrence and Dissuasion in Cyberspace
Book Chapter
The Sarajevo Centenary—1914 and the Rise of China
Paper
- American Academy of Arts & Sciences
Nuclear Collisions: Discord, Reform & the Nuclear Nonproliferation Regime
In the Spotlight
Most Viewed
Analysis & Opinions
- Belfer Center for Science and International Affairs, Harvard Kennedy School
AI and Trust
Paper
- Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It
Analysis & Opinions
- Slate
The Internet Enabled Mass Surveillance. A.I. Will Enable Mass Spying.
Alarm is mounting over large security vulnerabilities produced by the pervasive spread of cyber capabilities into vast realms of socioeconomic activity. To be sure, most cyber threats fall into the category of mischief or normal crime, but some potential cyber attacks—on nuclear power plants or other critical infrastructure or on the financial system, for example—could do enormous harm....
The entire volume of Understanding Cyber Conflict: 14 Analogies is available for download here.
Miller, Steven E. "Cyber Threats, Nuclear Analogies? Divergent Trajectories in Adapting to New Dual-Use Technologies." In Understanding Cyber Conflict: 14 Analogies, Perkovich, George and Ariel E. Levite, eds., Washington, D.C.: Georgetown University Press, 2017: pp. 161–179
- Recommended
- In the Spotlight
- Most Viewed
Recommended
Journal Article - Quarterly Journal: International Security
Deterrence and Dissuasion in Cyberspace
Book Chapter
The Sarajevo Centenary—1914 and the Rise of China
Paper - American Academy of Arts & Sciences
Nuclear Collisions: Discord, Reform & the Nuclear Nonproliferation Regime
In the Spotlight
Most Viewed
Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School
AI and Trust
Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School
Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It
Analysis & Opinions - Slate
The Internet Enabled Mass Surveillance. A.I. Will Enable Mass Spying.