Oxford University Press eBooks,
Journal Year:
2024,
Volume and Issue:
unknown, P. 109 - 132
Published: March 21, 2024
Abstract
The
cyber
domain
connects
all
other
domains,
which
makes
it
inherently
“cross-domain.”
problems
of
deterrence
in
and
through
cyberspace,
therefore,
have
the
potential
to
pose
everywhere
else.
This
chapter
argues
that
cyberattacks
are
unlikely
prove
particularly
potent
grand
strategic
terms
unless
they
can
impose
substantial,
durable
harm
on
an
adversary.
is
only
likely
if
warfare
accompanied
by
terrestrial
military
force
or
actions
designed
capitalize
any
temporary
incapacity
achieved
via
internet.
Those
initiating
must
therefore
decide
whether
prepared
exploit
windows
opportunity
generated
internet
attacks.
If
not
willing
able
do
so,
there
few
compelling
reasons
inflict
large-scale
digital
destruction.
thus
explains
why
technical
possibility
catastrophic
damage
should
be
conflated
with
political
probability
actor
actually
doing
so.
Journal of Peace Research,
Journal Year:
2024,
Volume and Issue:
61(1), P. 3 - 9
Published: Jan. 1, 2024
Investigating
cyber
conflict
is
enormously
difficult.
The
domain
complex,
quality
data
are
sparse,
international
affairs
shrouded
in
secrecy,
and
despite
its
seeming
ubiquity,
power
has
only
recently
entered
the
battlefield.
In
face
of
these
challenges,
we
must
rise
to
meet
challenges
cybersecurity
research
by
deploying
creative
methods
that
collect
verifiable
probatory
data,
which
allow
for
predictive
models
behavior.
Against
this
backdrop,
our
special
issue
offers
a
vision
embraces
culture
rigorous
inquiry
based
on
theoretically
robust,
policy
relevant
investigation.
We
highlight
two
key
features.
First,
at
intersection
political
science
incorporate
human
dimension
conflict.
A
security
approach
places
people
as
primary
objects
recognizes
individual-level
analyses
can
shed
light
macro-level
trends.
Second,
adopt
rigorous,
empirical
methods.
embrace
broad
tent
collection
techniques
–
spanning
qualitative
quantitative,
experimental,
observational
research.
What
integral
all
scholarship
abides
highest
standards
replicability
falsifiability.
articles
contained
collectively
form
proof
concept
expands
horizons
from
substantive
viewpoint
(adding
prevalent
military/strategic
analyses),
methodological
perspective
(propounding
importance
scrutiny).
Together,
10
pieces
affirm
there
now
critical
mass
substantively
diverse
empirically
field
cybersecurity,
community
capable
making
bold,
grounded,
tested
claims
verify
how
or
not
altering
nature
peace,
relations.
Journal of Peace Research,
Journal Year:
2024,
Volume and Issue:
61(1), P. 103 - 118
Published: Jan. 1, 2024
When
it
comes
to
cybersecurity
incidents
–
public
opinion
matters.
But
how
do
voters
form
opinions
in
the
aftermath
of
cyberattacks
that
are
shrouded
ambiguity?
How
people
account
for
uncertainty
inherent
cyberspace
forge
preferences
following
attacks?
This
article
seeks
answer
these
questions
by
introducing
an
threshold
mechanism
predicting
level
attributional
certainty
required
support
economic,
diplomatic
or
military
responses
cyberattacks.
Using
a
discrete-choice
experimental
design
with
2025
US
respondents,
we
find
lower
is
associated
less
retaliation,
yet
this
contingent
on
suspected
identity
attacker
and
partisan
identity.
Diplomatic
allies
possess
reservoir
good
will
amplifies
effect
uncertainty,
while
rivals
often
given
benefit
doubt.
We
demonstrate
encourages
use
cognitive
schemas
overcome
ambiguity,
fall
back
upon
pre-existing
politically
guided
views
about
country
behind
attack.
If
ambiguity
surrounding
has
typically
been
discussed
as
operational
strategic
concern,
shifts
focus
attention
human
positions
mass
forgotten
important
party
during
cyber
conflict.
Journal of Peace Research,
Journal Year:
2024,
Volume and Issue:
61(1), P. 72 - 86
Published: Jan. 1, 2024
What
determines
media
coverage
on
cyber
conflict
(CC)?
Media
bias
fostering
misperception
is
a
well-established
problem
in
reporting.
Because
of
the
secrecy
and
complexity
surrounding
operations
(COs),
where
most
data
moreover
come
from
marketing
publications
by
private
sector
firms,
this
likely
to
be
especially
pronounced
reporting
threats.
shapes
public
perception,
such
can
shape
dynamics
outcomes
with
potentially
destabilizing
consequences.
Yet
little
research
has
examined
systematically.
This
study
connects
existing
literature
CC
formulate
four
theoretical
explanations
for
variation
COs
based
corresponding
characteristics
CO.
We
introduce
new
dataset
sector,
which
we
call
Cyber
Conflict
Coverage
Dataset,
each
these
operations.
Consequently,
conduct
statistical
analysis
identify
correlate
quantity.
shows
that
use
novel
techniques,
specifically
zero-day
exploits,
highly
significant
predictor
Operations
targeting
military
or
financial
generate
less
coverage.
also
find
effect
tend
receive
more
compared
espionage,
but
result
not
statistically
significant.
Nonetheless,
predictive
models
explain
limited
news
These
findings
indicate
are
treated
differently
than
other
forms
conflict,
help
persistent
threat
perception
among
despite
absence
catastrophic
cyberattacks.
Salud Ciencia y Tecnología - Serie de Conferencias,
Journal Year:
2025,
Volume and Issue:
4, P. 642 - 642
Published: Feb. 5, 2025
This
paper
explores
the
dual
role
of
artificial
intelligence
(AI)
technologies
in
Ukraine’s
post-war
economic
recovery
and
cybersecurity
using
Agent-Based
Modeling
(ABM).
The
simulation
reveals
that
sectors
like
manufacturing
banking
rapidly
adopt
AI
due
to
clear
productivity
security
benefits,
leading
positive
spillover
effects
across
broader
economy.
However,
slower
adoption
such
as
agriculture
retail
highlights
need
for
government
intervention,
subsidies
tax
incentives,
ensure
a
balanced
recovery.
In
cybersecurity,
AI-enhanced
defence
mechanisms
significantly
improve
threat
detection
response,
though
they
also
introduce
new
vulnerabilities,
requiring
continuous
system
updates
stay
ahead
evolving
threats.
findings
emphasise
importance
strategic
adaptive
policies
context,
with
implications
future
stability
national
security.
study
identifies
critical
areas
research,
including
data
validation
further
exploration
vulnerabilities.
Security and Privacy,
Journal Year:
2025,
Volume and Issue:
8(2)
Published: March 1, 2025
ABSTRACT
This
article
provides
an
overview
of
the
Internet
things
(IoT)
and
its
growing
significance
in
today's
interconnected
world.
It
discusses
concept
man‐in‐the‐middle
(MitM)
attacks
detail,
including
their
various
types,
causes,
potential
impacts
on
IoT
networks.
The
analyzes
MitM
at
different
layers
architecture
explores
current
prevention
techniques
mitigation
strategies.
addresses
challenges
detecting
preventing
such
attacks,
particularly
context
heterogeneous
resource‐constrained
nature
devices.
also
examines
emerging
technologies,
as
machine
learning
blockchain,
for
enhancing
security.
Furthermore,
it
open
issues,
prevention,
impact
new
future
trends
attacks.
By
exploring
these
aspects,
aims
to
provide
insights
into
improving
detection
mechanisms
against
environments.
Journal of Global Security Studies,
Journal Year:
2024,
Volume and Issue:
9(2)
Published: March 12, 2024
Abstract
Proximity
is
a
core
feature
of
theories
political
violence,
with
the
effects
attacks
rippling
outward
so
that
geographically
proximate
individuals
experience
more
severe
than
those
distant.
However,
this
model
proximity
and
exposure
unlikely
to
recur
for
cyberattacks.
The
incorporeality
cyber
incidents
absence
physical
epicenter
constrain
mechanism
coupling
distance
harm.
To
empirically
test
relationship
between
cyberattacks,
we
conducted
field
study
involving
707
German
respondents
following
ransomware
attack
in
Düsseldorf.
We
find
classical
“ripple
effect”
reversed,
trust
highest
among
people
closer
lowest
postulate
firsthand
its
effects,
distant
employ
abstract
conceptions
consequences
do
not
align
actual
events.
Consequently,
does
confer
security,
it
can
even
amplify
adverse
exposure.
This
finding
highlights
need
governments
actively
work
assuage
public
fears
Journal of Risk Research,
Journal Year:
2023,
Volume and Issue:
26(7), P. 801 - 814
Published: May 8, 2023
How
can
a
focus
on
socio-technical
vulnerability
and
uncertainty
make
cyber
security
more
resilient?
In
this
article,
we
provide
conceptual
discussion
of
how
to
increase
resilience.
First,
show
resilience
thinking
co-evolved
through
their
connection
critical
infrastructures,
the
ensuing
dominant
technical
inevitably
always
falls
short
due
diverse
societal
values
that
underpin
social
functions.
We
argue
sole
aggregate
systems
neglects
important
differences
in
threats
are
experienced
dealt
with
by
individuals.
Second,
draw
insights
from
disaster
management
literature
establish
better
link
between
individuals
systems.
two
key
aspects
highlight
its
nature:
uncertainty.
Instead
as
"technical
problem
+
humans,"
suggest
should
be
conceptualized
"social
technology."
conclude
highlighting
three
ways
forward
for
researchers,
policymakers,
practitioners:
interdisciplinary
research,
public
debate
about
set
normative
questions,
need
an
discourse
politics
policymaking.
Public Opinion Quarterly,
Journal Year:
2023,
Volume and Issue:
87(1), P. 92 - 119
Published: Feb. 1, 2023
Research
into
cyber-conflict,
public
opinion,
and
international
security
is
burgeoning,
yet
the
field
suffers
from
an
absence
of
conceptual
agreement
about
key
terms.
For
instance,
every
time
a
cyberattack
takes
place,
debate
erupts
as
to
whether
it
constitutes
cyberterrorism.
This
bears
significant
consequences,
seeing
ascription
"terrorism"
label
enables
application
heavy-handed
counterterrorism
powers
heightens
level
perceived
threat
among
public.
In
light
widespread
disagreement
in
cyberspace,
we
assert
that
opinion
plays
heightened
role
understanding
nature
cyber
threats.
We
construct
typological
framework
illuminate
attributes
drive
classification
attack
cyberterrorism,
which
test
through
ratings-based
conjoint
experiment
United
States,
Kingdom,
Israel
(N
=
21,238
observations).
find
(1)
refrains
labeling
attacks
by
unknown
actors
or
hacker
collectives
cyberterrorism;
(2)
classifies
disseminate
sensitive
data
terrorism
greater
extent
even
than
physically
explosive
attacks.
Importantly,
uniform
perspectives
across
three
countries
challenge
foundational
tenet
relations
scholarship
divided
views
elites
on
foreign
policy
matters
will
be
reflected
study
concludes
providing
definitive
baseline
support
future
research
topic.
Oxford University Press eBooks,
Journal Year:
2024,
Volume and Issue:
unknown
Published: March 21, 2024
Abstract
Global
politics
in
the
twenty-first
century
is
complicated
by
dense
interdependencies,
rapid
technological
innovation,
and
fierce
security
competition.
How
should
governments
formulate
grand
strategy
this
complex
environment?
Many
strategists
look
to
deterrence
as
answer,
but
there
are
doubts
about
how
much
we
can
expect
from
deterrence.
Classical
theory
developed
response
distinctive
circumstances
of
Cold
War.
Since
then,
have
sought
apply
a
range
threats
on
land,
sea,
air,
space,
cyber
domains,
with
varying
degrees
success.
If
war
continuation
other
means,
then
diversity
technologies
modern
suggests
political
effects.
Some
military
forces
or
postures
particularly
useful
for
“winning”
wars.
Other
non-military
tools
more
adept
at
“warning”
adversaries
consequences
demonstrating
resolve.
Still
others
may
accomplish
these
objectives
reduced
cost,
greater
strategic
stability.
As
such,
not
single,
coherent
objective,
bundle
relationships
between
among
several
ends
means.
This
book
presents
findings
decade-long
research
program
“cross-domain
deterrence.”
Through
series
theoretical
empirical
studies,
it
explores
fundamental
trade-offs
that
always
been
implicit
practice
yet
be
synthesized
into
general
decision
making
under
constraint
pursuit
peace.
It
integrates
newly
revised
updated
versions
published
work
alongside
new
holistic
framework
understanding
works—or
fails
work—in
multiple
domains.