New Identification of Political Conflict and the Asymmetric Threat Phenomenon on the Example of Cyber Warfare

New Identification of Political Conflict and the Asymmetric Threat Phenomenon on the Example of Cyber Warfare

Nika Chitadze
ISBN13: 9781668460924|ISBN10: 1668460920|ISBN13 Softcover: 9781668460931|EISBN13: 9781668460948
DOI: 10.4018/978-1-6684-6092-4.ch004
Cite Chapter Cite Chapter

MLA

Chitadze, Nika. "New Identification of Political Conflict and the Asymmetric Threat Phenomenon on the Example of Cyber Warfare." Handbook of Research on Current Trends in Cybersecurity and Educational Technology, edited by Remberto Jimenez and Veronica E. O'Neill, IGI Global, 2023, pp. 60-77. https://doi.org/10.4018/978-1-6684-6092-4.ch004

APA

Chitadze, N. (2023). New Identification of Political Conflict and the Asymmetric Threat Phenomenon on the Example of Cyber Warfare. In R. Jimenez & V. O'Neill (Eds.), Handbook of Research on Current Trends in Cybersecurity and Educational Technology (pp. 60-77). IGI Global. https://doi.org/10.4018/978-1-6684-6092-4.ch004

Chicago

Chitadze, Nika. "New Identification of Political Conflict and the Asymmetric Threat Phenomenon on the Example of Cyber Warfare." In Handbook of Research on Current Trends in Cybersecurity and Educational Technology, edited by Remberto Jimenez and Veronica E. O'Neill, 60-77. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6092-4.ch004

Export Reference

Mendeley
Favorite

Abstract

The end of the Cold War has given rise to a fresh set of security challenges that today pose a threat to the stability of any state. The focus is now as much on threats arising due to inter-state rivalries based on balance of power as on intra-national and transnational security threats that cannot be classified into the traditional security studies framework. Covering a wide range of situations, these non-traditional security threats have real consequences towards human, national, and environmental security. This chapter seeks to understand some of the most critical non-traditional security threats faced by international community on the example of cyber warfare.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.