Jump to ContentJump to Main Navigation
Cyber ThreatsThe Emerging Fault Lines of the Nation State$
Users without a subscription are not able to see the full content.

Susan W Brenner

Print publication date: 2009

Print ISBN-13: 9780195385014

Published to Oxford Scholarship Online: September 2009

DOI: 10.1093/acprof:oso/9780195385014.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see www.oxfordscholarship.com/page/privacy-policy).date: 20 September 2018

Where Do We Go From Here?

Where Do We Go From Here?

Chapter:
(p.227) Chapter 8 Where Do We Go From Here?
Source:
Cyber Threats
Author(s):

Susan W. Brenner

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780195385014.003.0008

Nation-states use a bipartite response system to maintain order: Professional law enforcement officers overtly maintain internal order by responding to violations of the criminal rules that control chaos within a state; and professional military personnel overtly maintain external order by responding to assaults from other nation-states. The activities of both implicitly maintain order by discouraging internal rule violations and external attacks. However, this system is not adept at dealing with threats vectored through cyberspace. There are two ways we can go about doing this: One is to retain the default nation-state governance structure but modify our current threat response processes so they are effective in both the real and virtual worlds. The other option is to replace the threat response processes we presently rely upon with an entirely new approach to maintaining order; this might, or might not, involve replacing the nation-state with a governing configuration that is not predicated on, and therefore limited by, territory. This chapter explores both options.

Keywords:   nation-state, cyberattacks, law enforcement, cyberwarfare

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .