Depleted trust in the cyber commons

This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.

Bibliographic Details
Main Author: Hurwitz, Roger
Format: Article
Language:en_US
Published: United States Air Force / © Roger Hurwitz 2022
Online Access:https://www.jstor.org/stable/26267260
https://hdl.handle.net/1721.1/141675
_version_ 1826197843838238720
author Hurwitz, Roger
author_facet Hurwitz, Roger
author_sort Hurwitz, Roger
collection MIT
description This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.
first_indexed 2024-09-23T10:54:10Z
format Article
id mit-1721.1/141675
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T10:54:10Z
publishDate 2022
publisher United States Air Force / © Roger Hurwitz
record_format dspace
spelling mit-1721.1/1416752022-04-07T03:29:55Z Depleted trust in the cyber commons Hurwitz, Roger This material is based on work supported by the U.S. Office of Naval Research, Grant No. N00014-09-1-0597. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. 2022-04-06T06:01:57Z 2022-04-06T06:01:57Z 2012-10-01 Article https://www.jstor.org/stable/26267260 https://hdl.handle.net/1721.1/141675 Hurwitz, R. (2012). Depleted trust in the cyber commons. Strategic Studies Quarterly, 6(3), 20–45. en_US Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf United States Air Force / © Roger Hurwitz
spellingShingle Hurwitz, Roger
Depleted trust in the cyber commons
title Depleted trust in the cyber commons
title_full Depleted trust in the cyber commons
title_fullStr Depleted trust in the cyber commons
title_full_unstemmed Depleted trust in the cyber commons
title_short Depleted trust in the cyber commons
title_sort depleted trust in the cyber commons
url https://www.jstor.org/stable/26267260
https://hdl.handle.net/1721.1/141675
work_keys_str_mv AT hurwitzroger depletedtrustinthecybercommons