Cyberspace Is Unsuitable for the Strategy of War DOI
Erik Gartzke, Jon R. Lindsay

Oxford University Press eBooks, Journal Year: 2024, Volume and Issue: unknown, P. 109 - 132

Published: March 21, 2024

Abstract The cyber domain connects all other domains, which makes it inherently “cross-domain.” problems of deterrence in and through cyberspace, therefore, have the potential to pose everywhere else. This chapter argues that cyberattacks are unlikely prove particularly potent grand strategic terms unless they can impose substantial, durable harm on an adversary. is only likely if warfare accompanied by terrestrial military force or actions designed capitalize any temporary incapacity achieved via internet. Those initiating must therefore decide whether prepared exploit windows opportunity generated internet attacks. If not willing able do so, there few compelling reasons inflict large-scale digital destruction. thus explains why technical possibility catastrophic damage should be conflated with political probability actor actually doing so.

Language: Английский

Introduction: Cyber-conflict – Moving from speculation to investigation DOI
Ryan Shandler, Daphna Canetti

Journal of Peace Research, Journal Year: 2024, Volume and Issue: 61(1), P. 3 - 9

Published: Jan. 1, 2024

Investigating cyber conflict is enormously difficult. The domain complex, quality data are sparse, international affairs shrouded in secrecy, and despite its seeming ubiquity, power has only recently entered the battlefield. In face of these challenges, we must rise to meet challenges cybersecurity research by deploying creative methods that collect verifiable probatory data, which allow for predictive models behavior. Against this backdrop, our special issue offers a vision embraces culture rigorous inquiry based on theoretically robust, policy relevant investigation. We highlight two key features. First, at intersection political science incorporate human dimension conflict. A security approach places people as primary objects recognizes individual-level analyses can shed light macro-level trends. Second, adopt rigorous, empirical methods. embrace broad tent collection techniques – spanning qualitative quantitative, experimental, observational research. What integral all scholarship abides highest standards replicability falsifiability. articles contained collectively form proof concept expands horizons from substantive viewpoint (adding prevalent military/strategic analyses), methodological perspective (propounding importance scrutiny). Together, 10 pieces affirm there now critical mass substantively diverse empirically field cybersecurity, community capable making bold, grounded, tested claims verify how or not altering nature peace, relations.

Language: Английский

Citations

15

Cyberattacks and public opinion – The effect of uncertainty in guiding preferences DOI
Eric Jardine, Nathaniel D. Porter, Ryan Shandler

et al.

Journal of Peace Research, Journal Year: 2024, Volume and Issue: 61(1), P. 103 - 118

Published: Jan. 1, 2024

When it comes to cybersecurity incidents – public opinion matters. But how do voters form opinions in the aftermath of cyberattacks that are shrouded ambiguity? How people account for uncertainty inherent cyberspace forge preferences following attacks? This article seeks answer these questions by introducing an threshold mechanism predicting level attributional certainty required support economic, diplomatic or military responses cyberattacks. Using a discrete-choice experimental design with 2025 US respondents, we find lower is associated less retaliation, yet this contingent on suspected identity attacker and partisan identity. Diplomatic allies possess reservoir good will amplifies effect uncertainty, while rivals often given benefit doubt. We demonstrate encourages use cognitive schemas overcome ambiguity, fall back upon pre-existing politically guided views about country behind attack. If ambiguity surrounding has typically been discussed as operational strategic concern, shifts focus attention human positions mass forgotten important party during cyber conflict.

Language: Английский

Citations

13

If it bleeps it leads? Media coverage on cyber conflict and misperception DOI Creative Commons
Christos Makridis, Lennart Maschmeyer, Max Smeets

et al.

Journal of Peace Research, Journal Year: 2024, Volume and Issue: 61(1), P. 72 - 86

Published: Jan. 1, 2024

What determines media coverage on cyber conflict (CC)? Media bias fostering misperception is a well-established problem in reporting. Because of the secrecy and complexity surrounding operations (COs), where most data moreover come from marketing publications by private sector firms, this likely to be especially pronounced reporting threats. shapes public perception, such can shape dynamics outcomes with potentially destabilizing consequences. Yet little research has examined systematically. This study connects existing literature CC formulate four theoretical explanations for variation COs based corresponding characteristics CO. We introduce new dataset sector, which we call Cyber Conflict Coverage Dataset, each these operations. Consequently, conduct statistical analysis identify correlate quantity. shows that use novel techniques, specifically zero-day exploits, highly significant predictor Operations targeting military or financial generate less coverage. also find effect tend receive more compared espionage, but result not statistically significant. Nonetheless, predictive models explain limited news These findings indicate are treated differently than other forms conflict, help persistent threat perception among despite absence catastrophic cyberattacks.

Language: Английский

Citations

8

The Role of Artificial Intelligence Technologies in Rebuilding the Post-war Economy and Ensuring Cyber Security: An Example from Ukraine DOI
Olha Vdovichena, Anna Krymska, Yurii Koroliuk

et al.

Salud Ciencia y Tecnología - Serie de Conferencias, Journal Year: 2025, Volume and Issue: 4, P. 642 - 642

Published: Feb. 5, 2025

This paper explores the dual role of artificial intelligence (AI) technologies in Ukraine’s post-war economic recovery and cybersecurity using Agent-Based Modeling (ABM). The simulation reveals that sectors like manufacturing banking rapidly adopt AI due to clear productivity security benefits, leading positive spillover effects across broader economy. However, slower adoption such as agriculture retail highlights need for government intervention, subsidies tax incentives, ensure a balanced recovery. In cybersecurity, AI-enhanced defence mechanisms significantly improve threat detection response, though they also introduce new vulnerabilities, requiring continuous system updates stay ahead evolving threats. findings emphasise importance strategic adaptive policies context, with implications future stability national security. study identifies critical areas research, including data validation further exploration vulnerabilities.

Language: Английский

Citations

1

IoT and Man‐in‐the‐Middle Attacks DOI Creative Commons
Hamidreza Fereidouni,

Olga Fadeitcheva,

Mehdi Zalai

et al.

Security and Privacy, Journal Year: 2025, Volume and Issue: 8(2)

Published: March 1, 2025

ABSTRACT This article provides an overview of the Internet things (IoT) and its growing significance in today's interconnected world. It discusses concept man‐in‐the‐middle (MitM) attacks detail, including their various types, causes, potential impacts on IoT networks. The analyzes MitM at different layers architecture explores current prevention techniques mitigation strategies. addresses challenges detecting preventing such attacks, particularly context heterogeneous resource‐constrained nature devices. also examines emerging technologies, as machine learning blockchain, for enhancing security. Furthermore, it open issues, prevention, impact new future trends attacks. By exploring these aspects, aims to provide insights into improving detection mechanisms against environments.

Language: Английский

Citations

1

Trust at Risk: The Effect of Proximity to Cyberattacks DOI Creative Commons
Miguel Alberto Gomez, Ryan Shandler

Journal of Global Security Studies, Journal Year: 2024, Volume and Issue: 9(2)

Published: March 12, 2024

Abstract Proximity is a core feature of theories political violence, with the effects attacks rippling outward so that geographically proximate individuals experience more severe than those distant. However, this model proximity and exposure unlikely to recur for cyberattacks. The incorporeality cyber incidents absence physical epicenter constrain mechanism coupling distance harm. To empirically test relationship between cyberattacks, we conducted field study involving 707 German respondents following ransomware attack in Düsseldorf. We find classical “ripple effect” reversed, trust highest among people closer lowest postulate firsthand its effects, distant employ abstract conceptions consequences do not align actual events. Consequently, does confer security, it can even amplify adverse exposure. This finding highlights need governments actively work assuage public fears

Language: Английский

Citations

6

Psychological harm: what is it and how does it apply to consumer products with internet connectivity? DOI Creative Commons
Magda Osman

Journal of Risk Research, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 22

Published: April 12, 2025

Language: Английский

Citations

0

Making cyber security more resilient: adding social considerations to technological fixes DOI Creative Commons
Myriam Dunn Cavelty, Christine Eriksen, Benjamin Scharte

et al.

Journal of Risk Research, Journal Year: 2023, Volume and Issue: 26(7), P. 801 - 814

Published: May 8, 2023

How can a focus on socio-technical vulnerability and uncertainty make cyber security more resilient? In this article, we provide conceptual discussion of how to increase resilience. First, show resilience thinking co-evolved through their connection critical infrastructures, the ensuing dominant technical inevitably always falls short due diverse societal values that underpin social functions. We argue sole aggregate systems neglects important differences in threats are experienced dealt with by individuals. Second, draw insights from disaster management literature establish better link between individuals systems. two key aspects highlight its nature: uncertainty. Instead as "technical problem + humans," suggest should be conceptualized "social technology." conclude highlighting three ways forward for researchers, policymakers, practitioners: interdisciplinary research, public debate about set normative questions, need an discourse politics policymaking.

Language: Английский

Citations

12

Public Opinion and Cyberterrorism DOI Creative Commons
Ryan Shandler, Nadiya Kostyuk, Harry Oppenheimer

et al.

Public Opinion Quarterly, Journal Year: 2023, Volume and Issue: 87(1), P. 92 - 119

Published: Feb. 1, 2023

Research into cyber-conflict, public opinion, and international security is burgeoning, yet the field suffers from an absence of conceptual agreement about key terms. For instance, every time a cyberattack takes place, debate erupts as to whether it constitutes cyberterrorism. This bears significant consequences, seeing ascription "terrorism" label enables application heavy-handed counterterrorism powers heightens level perceived threat among public. In light widespread disagreement in cyberspace, we assert that opinion plays heightened role understanding nature cyber threats. We construct typological framework illuminate attributes drive classification attack cyberterrorism, which test through ratings-based conjoint experiment United States, Kingdom, Israel (N = 21,238 observations). find (1) refrains labeling attacks by unknown actors or hacker collectives cyberterrorism; (2) classifies disseminate sensitive data terrorism greater extent even than physically explosive attacks. Importantly, uniform perspectives across three countries challenge foundational tenet relations scholarship divided views elites on foreign policy matters will be reflected study concludes providing definitive baseline support future research topic.

Language: Английский

Citations

11

Elements of Deterrence DOI
Erik Gartzke, Jon R. Lindsay

Oxford University Press eBooks, Journal Year: 2024, Volume and Issue: unknown

Published: March 21, 2024

Abstract Global politics in the twenty-first century is complicated by dense interdependencies, rapid technological innovation, and fierce security competition. How should governments formulate grand strategy this complex environment? Many strategists look to deterrence as answer, but there are doubts about how much we can expect from deterrence. Classical theory developed response distinctive circumstances of Cold War. Since then, have sought apply a range threats on land, sea, air, space, cyber domains, with varying degrees success. If war continuation other means, then diversity technologies modern suggests political effects. Some military forces or postures particularly useful for “winning” wars. Other non-military tools more adept at “warning” adversaries consequences demonstrating resolve. Still others may accomplish these objectives reduced cost, greater strategic stability. As such, not single, coherent objective, bundle relationships between among several ends means. This book presents findings decade-long research program “cross-domain deterrence.” Through series theoretical empirical studies, it explores fundamental trade-offs that always been implicit practice yet be synthesized into general decision making under constraint pursuit peace. It integrates newly revised updated versions published work alongside new holistic framework understanding works—or fails work—in multiple domains.

Language: Английский

Citations

4