skip to main content
research-article
Free Access

Why computer scientists should care about cyber conflict and U.S. national security policy

Published:01 June 2012Publication History
Skip Abstract Section

Abstract

Cybersecurity and policy issues for computer scientists.

References

  1. Gorman, S. Cyber combat: Act of war. Wall Street Journal (May 31, 2011); http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html#ixzz109BF3ADz.Google ScholarGoogle Scholar
  2. Mahnaimi, U. Israeli military plots to cripple Iran in cyberspace. Sunday Times (Aug. 7, 2011).Google ScholarGoogle Scholar
  3. Markoff, J. A code for chaos. New York Times (Oct. 2, 2010); http://www.nytimes.com/2010/10/03/weekinreview/03markoff.html?ref=stuxnet.Google ScholarGoogle Scholar
  4. National Research Council. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Academies Press, 2010; http://www.nap.edu/openbook.php?record_id=12886&page=1.Google ScholarGoogle Scholar
  5. National Research Council. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, W.A. Owens, K.W. Dam, and H.S. Lin, Eds., National Academies Press, 2009; http://www.nap.edu/catalog.php?record_id=12651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Reed, T.C. At the Abyss: An Insider's History of the Cold War. Ballantine Books, New York, 2004.Google ScholarGoogle Scholar
  7. White House. International Strategy for Cyberspace, May 2011; http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Why computer scientists should care about cyber conflict and U.S. national security policy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Communications of the ACM
            Communications of the ACM  Volume 55, Issue 6
            June 2012
            124 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/2184319
            Issue’s Table of Contents

            Copyright © 2012 Copyright is held by the owner/author(s)

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 June 2012

            Check for updates

            Qualifiers

            • research-article
            • Popular
            • Un-reviewed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format