CHF 86.00

Analysis of Threat Perceptions
Nato and Turkiyes Cyber Terrorism Policies

English · Paperback / Softback

Shipping usually within 1 to 3 weeks

Description

Read more

In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and security. However, despite this series of cyberattacks, the North Atlantic Treaty Organization (NATO) did not apply Article 5 of the North Atlantic Treaty due to lack of consensus on applying Article 5 in the Estonian case. Although various approaches have been developed by scholars, there is no common application of international law in the United Nations Charter regarding cyber threats or attacks. Moreover, while there has been no common definition of "cyber terrorism" by the international community, some scholars regard "cyberattacks" as acts of war. There is a paucity of literature dealing with the application of international law on cyber threats. A new Strategic Concept was adopted in 2010. Its most important development was to identify the significance of cyber threats to all NATO member bodies.
When updating its own technology, the organization needs to be ready to defend itself against all kinds of asymmetrical warfare, whether from within or beyond its operational range. However, the terms of Article 5 of the North Atlantic Treaty were imprecise as to whether cyberattacks can be regarded as a form of threat; for this reason, NATO accepted the case by case concept on cyber threats/attacks in terms of the application of Article 5 by the Wales Summit in 2014. Despite the fact that the Charter of the United Nations has not been revised, if its articles are broadly evaluated, cyberattacks would be accepted as a threat or use of force against the territorial integrity of a state.
The main purpose of this book is to analyze and evaluate what has been carried out regarding NATO's operational arrangements and its cyber defense approach and, secondly, to explain this through the lens of Game Theory. Furthermore, it will demonstrate why the web is paramount to NATO's system driven operations, and why it requires a cyber defense arrangement. In particular, the research presented here will analyze Türkiye in this regard. The cyberattack on Estonia in 2007 will be used by way of a case study to explain the development of threat perceptions, risks, international law, cybersecurity policies and application of Game Theory.

About the author










Mehmet Emin Erendor was born in Kilis, Türkiye in 1985. He received his bachelor's degree in International Relations from the University of K¿r¿kkale, Türkiye in 2008. He received the master's degree in International Law: Rights and Responsibilities from the University of Sussex, Brighton in 2011 and the Ph.D. degree in International Relations from the University of Southampton in 2017. From 2017 to 2018, he worked as a Dr. Research Assistant at the University of Çukurova. Since 2018, he has been an Associate Professor with the International Relations Department, Adana Alparslan Türke¿ Science and Technology University. His research interests include cyber security, terrorism, human rights, humanitarian intervention, and international organizations.


Product details

Authors Mehmet Emin Erendor
Publisher Taylor & Francis Ltd.
 
Content Book
Product form Paperback / Softback
Publication date 11.08.2025
Subject Social sciences, law, business > Political science > Political science and political education
 
EAN 9781032804422
ISBN 978-1-0-3280442-2
Pages 190
 
Series Security, Audit and Leadership Series
Subjects POLITICAL SCIENCE / Security (National & International), POLITICAL SCIENCE / International Relations / General, COMPUTERS / Security / General, Politics & government, Warfare & defence, Politics and government, Legal aspects of criminology, Warfare and defence, Privacy & data protection, Privacy and data protection, Legal aspects of IT, Computer architecture & logic design, Computer networking & communications, Causes & Prevention Of Crime, Computer fraud & hacking, Computer architecture and logic design, Hospitality and service industries, COMPUTERS / Internet / Online Safety & Privacy, Causes and prevention of crime, Computer fraud and hacking, Criminology: legal aspects, SOCIAL SCIENCE / Privacy & Surveillance, POLITICAL SCIENCE / Privacy & Surveillance, COMPUTERS / Security / Cryptography & Encryption, Security Services, COMPUTERS / Security / Network Security, Digital and information technologies: Legal aspects, Computer networking and communications, NATO (North Atlantic Treaty Organisation), international security;cybersecurity;NATO;politics, Türkiye / Turkey, risk assessment models, digital infrastructure protection, international law application, game theory analysis, cyber defense strategies, cyber threat policy development
 

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.