Book contents
- Cyber Mercenaries
- Cyber Mercenaries
- Copyright page
- Contents
- Figures
- Preface
- Acknowledgments
- Abbreviations
- Part I Of Brokers and Proxies
- Part II Cyber Proxies Up Close
- Part III Implications
- 8 The Theory: State Responsibility and Cyber Proxies
- 9 The Practice: Shaping Cyber Proxy Relationships
- 10 Conclusion: Cyber Proxies, the Future, and Suggestions for Further Research
- Future Research
- Notes
- Index
8 - The Theory: State Responsibility and Cyber Proxies
from Part III - Implications
Published online by Cambridge University Press: 21 December 2017
- Cyber Mercenaries
- Cyber Mercenaries
- Copyright page
- Contents
- Figures
- Preface
- Acknowledgments
- Abbreviations
- Part I Of Brokers and Proxies
- Part II Cyber Proxies Up Close
- Part III Implications
- 8 The Theory: State Responsibility and Cyber Proxies
- 9 The Practice: Shaping Cyber Proxy Relationships
- 10 Conclusion: Cyber Proxies, the Future, and Suggestions for Further Research
- Future Research
- Notes
- Index
Summary
- Type
- Chapter
- Information
- Cyber MercenariesThe State, Hackers, and Power, pp. 123 - 137Publisher: Cambridge University PressPrint publication year: 2018