is Cyber Deterrence Possible

is Cyber Deterrence Possible

Topic Research question

“Is Cybrer Deterrence Possible ”

Assignment Instructions

The components of this assignment include a research question, a purpose statement, and six sources (at least four of which must be peer-reviewed

Technical Requirements:

Length: 2.5 pages double spaced, 1″ margins, 12 pitch type in Times New Roman font left justified format. You must use Turabian parenthetical style for this assignment.

Notes

include a title, reference and cover page. also an Abstract( a concise statement of your intended research of no more than 100 words setting out the problem that you want to examine “Is Cybrer Deterrence Possible ”

Research Context

You should explain the broad background against which you will conduct your research. You should include a brief overview of the general area of study within which your proposed research falls.

The proposal should set out the central aims and questions that will guide your research.

The proposal should also explain your intended approach to answering the questions: will your approach be empirical, doctrinal or theoretical etc?

Research Methods

The proposal should outline your research methods, explaining how you are going to conduct your research. Your methods is soley libraries or archives based

Significance of Research

The proposal should demonstrate the originality of your intended research. You should therefore explain why your research is important (for example, by explaining how your research builds on and adds to the current state of knowledge in the field or by setting out reasons why it is timely to research your proposed topic).

Bibliography

The proposal should include a short bibliography identifying the most relevant works for your topic.

 

 

Solution Preview

Possibility of Cyber Deterrence

Research Context

Some pundits argue that the next World War will be heavily dependent on cyberspace. Even as pacifists make extensive arguments that there will always be a way to deter the existence of such an aftermath, it is important to consider the extent to which the contemporary society is dependent on cyberspace. Consequently, the cyberspace has attracted as much attention from a myriad of sources, some of whose intentions are not necessarily committed to the welfare of the society (Piotrowski & Sliwa, 2015). This attracts the necessity for the different stakeholders interested in investment in the cyberspace to take the necessary measures in guaranteeing its protection through whatever means necessary.

(848 words)

Open chat
Hello
Contact us here via WhatsApp