Understanding “Cyber Conflict”
Author(s)
Shukla, Aadya
DownloadPoster (727.1Kb)
Terms of use
Metadata
Show full item recordAbstract
Problem: Emergence of cyber as the new arena for conflict raises three basic questions: (a) What qualifies as a Cyber Conflict? (multiple definitions exist); (b) Does intervention of cyber in conflict life-cycle requires new models to decipher control points in cyberspace?; and (c) What is different between conflicts in kinetic and cyberspace?
Solution: Application of USE CASE ANALYSIS to understand the mechanics of cyber conflict to arrive at a model of cyber conflict in a data driven manner (analysis of events since 2001). In Software Engineering domain use case analysis is used as an established tool to define processes and roles a stakeholder employs to interact with a system, and system’s response to the user stimulus.
Description
Poster presented in the workshop on "Who Controls Cyberspace,” MIT, Cambridge, MA, United States, November 6-7, 2012.
Date issued
2012-11-06Publisher
Explorations in Cyber International Relations.
Citation
Shukla, A. (2012, November 6–7). Understanding "cyber conflict" [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
Version: Final published version.
Collections
The following license files are associated with this item: