Book contents
- Cyber Mercenaries
- Cyber Mercenaries
- Copyright page
- Contents
- Figures
- Preface
- Acknowledgments
- Abbreviations
- Part I Of Brokers and Proxies
- Part II Cyber Proxies Up Close
- Part III Implications
- 8 The Theory: State Responsibility and Cyber Proxies
- 9 The Practice: Shaping Cyber Proxy Relationships
- 10 Conclusion: Cyber Proxies, the Future, and Suggestions for Further Research
- Future Research
- Notes
- Index
10 - Conclusion: Cyber Proxies, the Future, and Suggestions for Further Research
from Part III - Implications
Published online by Cambridge University Press: 21 December 2017
- Cyber Mercenaries
- Cyber Mercenaries
- Copyright page
- Contents
- Figures
- Preface
- Acknowledgments
- Abbreviations
- Part I Of Brokers and Proxies
- Part II Cyber Proxies Up Close
- Part III Implications
- 8 The Theory: State Responsibility and Cyber Proxies
- 9 The Practice: Shaping Cyber Proxy Relationships
- 10 Conclusion: Cyber Proxies, the Future, and Suggestions for Further Research
- Future Research
- Notes
- Index
Summary
![Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'](https://static.cambridge.org/content/id/urn%3Acambridge.org%3Aid%3Abook%3A9781316422724/resource/name/firstPage-9781316422724c10_p151-157_CBO.jpg)
- Type
- Chapter
- Information
- Cyber MercenariesThe State, Hackers, and Power, pp. 151 - 157Publisher: Cambridge University PressPrint publication year: 2018