Graduate level writing is a must. Utilize resources based off of resource document provided.  Please follow and answer questions in document provided.  Minimum of 6 different citations.
Please write out a well-structured, well-cited, and well-argued essay based on the following two-part question.
Part 1 (Discursive): What do we know about cyber conflict? Be sure to include and discuss the dynamics, methods, capabilities, power, theory, and empirical evidence to answer this question.
Part 2 (Argumentative):  Based on what we know, paint a picture of the next 10 years of international cyber relations. What could happen based on what we know? Be sure to look at multi-layers when answering this question (international, state, non-state).
Notes for essay:
Part 1 will used to give an intro and lit review/material.
Part 2 will be the argument portion.
*Please use resource document for citing.
**If any other sources are utilized, please let know before hand.
John Arquilla and David Ronfeldt, Cyberwar is Coming!, 1993, reprinted in In Athena’s Camp, 1997,
Thomas Rid, Think Again: Cyberwar, Foreign Policy, March/April 2012,
John Arquilla, Cyberwar Is Already Upon Us, Foreign Policy, March/April 2012,
Lee, Robert and Thomas Rid. 2014. “OMG Cyber!” The RUSI Jounal,
Craig Timberg, Net of Insecurity, The Washington Post, May 30 and 31, 2015,
Joseph S. Nye, Cyber Power, Belfer Center, Harvard, May 2010;
Bruce Schneier, The Battle for Power on the Internet, The Atlantic, Oct. 24, 2013, internet/280824/.
Joseph S. Nye, Jr., The  Regime Complex for Managing Global  Cyber Activities, Global Commission on Internet Governance,  May  2014,
John B. Sheldon, Deciphering Cyberpower:  Strategic Purpose in Peace  and  War, Strategic  Studies Quarterly, Summer 2011,
A Giant Cage, Special Report on China’s Internet,  The Economist, April  6, 2013,
Carson, A. and Yarhi-Milo, K., 2017.  Covert communication:  The  intelligibility and credibility of signaling  in  secret.  Security Studies,  26(1), pp.124-156.
Rid,  Thomas.  2011.  “Cyberwar  Will  Not  Take  Place.”  Journal  of  Strategic Studies. First Article: 1-28.
Stone, John.  2012.  “Cyber War  Will Take  Place!”  Journal  of  Strategic Studies 36 (1): 101-108.
McGraw, Gary. 2013.  “Cyber  War  is Inevitable  (Unless We  Build Security In).” Journal  of Security Studies 36 (1):  109-119.
Goodman,  Will. 2010. “Cyber Deterrence: Tougher  in Theory than  in Practice?”  Strategic  Studies Quarterly
Gartzke, Erik. 2013.  “The Myth of Cyberwar:  Bringing War  on the  Internet Back Down to Earth.”    ?,  International Security  38  (2):  41-72.
Rid,  Thomas and Peter McBurney.  2012. “Cyber Weapons.”  The RUSI Journal  157  (1): 6-13.
Peterson, Dale. 2013.  “Offensive Cyber  Weapons: Construction, Development, and Employment.”  Journal  of Strategic Studies
Danielle Kehl, Andi Wilson, and Kevin Bankston, Doomed to Repeat  History? Lessons  from the Crypto  Wars of the 1990s, June 2015, New America,
Peter Bergen et  al., Do  NSA’s Bulk Surveillance Programs Stop Terrorists?, New America, Jan. 2014,
Bauman, Z.,  Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D. and  Walker, R.B., 2014. “After Snowden: Rethinking  the impact  of surveillance.”  International political sociology,  8  (2): 121-144.
Robert S. Litt, Privacy, Technology  and National Security: An Overview of Intelligence  Collection, July 18, 2013,,-technology-and-national-security-an-overview-ofintelligence-collection.
Robyn Greene et al., Surveillance Costs: The NSA’s Impact  on the  Economy, Internet Freedom  & Cybersecurity, 2014. _the_economy_internet_freedom_cybersecurity
Tim  Maurer  et al., Technological Sovereignty:  Missing the Point?  An Analysis of European Proposals after June 5, 2013, New  America Foundations Open Policy Institute and  the  Global Public Policy Institute,
Even, Siman-Tov, and Biboni. 2016. “Structuring  Israel’s Cyber  Defense.”  INSS publication.
Rid, Thomas and Ben Buchanan. 2014, “Attributing Cyber Attacks.”  Journal of Strategic  Studies
Jason Healey, Beyond Attribution: Seeking National  Responsibility for Cyberattacks, Atlantic  Council  Issue Brief, 2011,,_ 2012.pdf.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized