The Evolution of Competitive Advantage in the Cyber Domain
Main Article Content
Abstract
The cyber domain is a critical operational arena that integrates military activities occurring across other domains, as these operations rely heavily on information and communication technology infrastructures within cyberspace. Such infrastructures enable information exchange, command and control, and the attainment of information superiority to support decision-making at the strategic, operational, and tactical levels. It may therefore be argued that achieving advantage in the cyber domain can have significant implications for national security, both in peacetime and during armed conflict. This can be observed in the Russia–Ukraine war, in which cyber operations demonstrated prolonged and continuous development even prior to the physical invasion and the contest for control over land and maritime spaces.
This article analyzes and synthesizes research findings and capability-development efforts related to cyber warfare and proposes strategic recommendations to enhance the Royal Thai Navy’s cyber capabilities. These recommendations aim to strengthen readiness and ensure alignment with the rapidly evolving landscape of cyber threats, which continue to advance at an accelerating pace.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles in this journal are copyrighted by the Naval Strategic Studies Center, Naval Education Department, and published under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license.
may be read and used for academic purposes, such as teaching, research, or citation, with proper credit given to the author and the journal.
Use or modification of the articles is prohibited without permission.
Statements expressed in the articles are solely the opinions of the authors.
Authors are fully responsible for the content and accuracy of their articles.
Any other republication of the articles requires permission from the journal.
References
D. Ventre, “Information Warfare”, 2nd Edition., (2016) pp-263
ISBN: 978-1-848-21660-0
Cornut J, de Zamaróczy N. How can document speak about
practices? Practice tracing, the Wikileaks cables, and
diplomatic culture. Cooperation and Conflict. (2021) ;56(3):
-345. doi:10.1177/0010836720972426
Henry Dalziel, Chapter 2 - Cyber Kill Chain, Securing Social
Media in the Enterprise, Syngress, (2015), pp. 7-15, ISBN
, doi:10.1016/B978-0-12-804180-2.00002-6.
J. Toepher, “Sead from the group up: Sof’s role in the
suppression of enemy air defense”, Thesis, Naval
Postgraduate School (2019), Monterey CA 93943-500,
USA, pp.36-41
D. Fulghum, R. Wall, A. Butler, “Cyber-combat’s First Shot”,
Aviation Week and Space Technology, November 26, 2007,
pp.29-30
J. A. Lewis, “Cyberwar and Ukraine”, Center for Strategic and
International Studies, June 2022
K. Boyte, “ The Evolution of Cyber Warfare in Information
Operations Targeting Estonia, the U.S., and Ukraine,
Developments in Information Security and Cybernetic War,
(2019), IGI Global, DOI: 10.4018/978-1-5225-8304-2
A. Giles, “Valery Gerasimov’s Doctrine”, Special Report,
Universitat Potsdam, DOI: 10.13140/RG.2.2.10944.35848
Evron G., “Battling botnet and online mob: Estonia’s
defense efforts during the Internet war”, Georgetown Journal
of International Affairs, 9(1), (2008), pp.121-126
C. Easttom, J. Taylor., “Computer crime, investigation and
the law”, Course Technology (2011), Boston MA
P.W. Singer, A. Friedman, “Cybersecurity: What every one
needs to know”, (2014), Oxford University Press, Oxford
P. Christopher, “Understanding and Pursuing Information
Advantage”, The Cyber Security Review, (2020), pp.109-121
M. M. Yamin, M. Ullah, H. Ullah, B. Katt, “Weaponized AI for
cyber attacks”, Journal of Information Security and
Application, 57, (2021) DOI: 10.1016/j.jisa.2020.102722Get, pp.1-14
European Digital Media Observation, “War in Ukraine”, (2022)
Available at: https://edmo.eu/war-in-ukraine-the-factchecked-
disinformation-detected-in-the-eu/ (Accessed: July 23, 2022)
F. Umbach, “Rissia’s cyber fog in the Ukraine war”, (2022),
Available at: https://www.gisreportsonline.com/r/russia-cyber/
(Access: (Accessed: July 23, 2022)
T. Burt, “The hybrid war in Ukrain”,(2022), https://blogs.
microsoft.com/on-the-issues/2022/04/27/hybrid-war-ukrainerussia-
cyberattacks/”(Access: (Accessed: July 23, 2022)