The Impact of Cyber Conflict on International Interactions

@article{Maness2016TheIO,
  title={The Impact of Cyber Conflict on International Interactions},
  author={Ryan Maness and Brandon Valeriano},
  journal={Armed Forces \& Society},
  year={2016},
  volume={42},
  pages={301 - 323}
}
Analysts suggest that the rise of the cyber domain of combat has led to a revolution in military affairs and have greatly changed how society interacts with the Internet. The structure and content of interactions on the battlefield have supposedly changed in light of this development. In the rush to note the changing face of conflict, few scholars have actually examined the impact of cyber conflict on foreign policy relationships. Here we use weekly events data to examine exactly what happens… 

Figures and Tables from this paper

Positioning Diplomacy Within a Strategic Response to the Cyber Conflict Threat

. Background. Nation states unleash cyber attacks targeting other nation states (e.g. WannaCry, SolarWinds), termed “offensive cyber operations”. When such aggressions are deemed, according to the UN

Cyber security meets security politics: Complex technology, fragmented politics, and networked science

The intellectual history is provided to situate this literature in its broader evolutionary context and conclude that it is a vibrant and diverse biotope that is benefitting from its interdisciplinarity, its relevance for policy, and its cognizance of the interplay between technological possibilities and political choices of state actors.

The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective

  • Yavuz Akdag
  • Economics
    Journal of Chinese Political Science
  • 2018
The studies addressing cyberwar and depicting electronic doomsday scenarios, such as cyber version of 9/11, are immensely policy-driven. They lack a theoretical rigor in their explanations, causing a

Notes on the militarization of Brazilian cybersecurity: current state of affairs and perspectives on the near future

In this work, I reflect on the state of Brazilian cybersecurity practices, and how they have been conceptualized in laws and in official documents, such as national strategies. Based on literature

Breaking the Myth of Cyber Doom: Securitization and Normalization of Novel Threats

Evidence is presented suggesting that the unique characteristics of a development (i.e., web-technology proliferation) matter in opinion formation, as sensitivity to digital threats to the polity is grounded on personal threat sensitivity.

Arming Cyberspace: The Militarization of a Virtual Domain

A Assistant Professorial Lecturer, De La Salle University The increasing frequency of offensive cyberspace operations (OCOs) directed toward states, particularly the disclosure of Stuxnet in 2010

The Dark Side of Interconnectivity: Social Media as a Cyber–Weapon?

  • S. Geraldes
  • Political Science
    Advanced Sciences and Technologies for Security Applications
  • 2020
Traditional wisdom understands weapons as tools that cause or have the potential to cause damage or harm, whereas cyber-weapons relate to the use of computer code that causes or has the potential to

ASEAN Consensus and Forming Cybersecurity Regulation in Southeast Asia

  • Iqbal Ramadhan
  • Computer Science
    Proceedings of the 1st International Conference on Contemporary Risk Studies, ICONIC-RS 2022, 31 March-1 April 2022, South Jakarta, DKI Jakarta, Indonesia
  • 2022
This scientific article will examine how ASEAN can maximize the organization's consensus mechanism in order to reach an agreement on cyber security regulations in the Southeast Asian region.

The materiality of cyberthreats: securitization logics in popular visual culture

This article traces securitization logics in popular visual culture to show how these representations make sense of technical incidents politically via material objects, showing a shift from depicting computers themselves as the main threat to the manipulation of data as exercise of power and finally, the wielding of code as weapon to create physical damage.

Unpacking strategic behavior in cyberspace: a schema-driven approach

Using cross-national wargames, the article illustrates the schematic use of strategic culture as a basis for deriving strategic objectives and the means with which these are achieved.

References

SHOWING 1-10 OF 44 REFERENCES

The dynamics of cyber conflict between rival antagonists, 2001–11

The goal of this research article is to exhaustively collect information on cyber interactions between rival states in the last decade so that it can delineate the patterns of cyber conflict as reflected by evidence at the international level.

The Myth of Cyberwar Bringing War on the Internet Back Down to Earth ∗

Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable potentially of even overturning the prevailing world order. Yet, such conceptions

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

Abstract While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Some scholars presume that

Cyber war will not take place

For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never

Cyber insecurity as a national threat: overreaction from Germany, France and the UK?

The argument is that deterring criminals should have been at the core of tackling cyber insecurity but the defence strategies of France, Germany and the UK were instead focused on mitigating the effects of cyber attacks.

Cyber War: The Next Threat to National Security and What to Do About It

Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber

Stuxnet and the Limits of Cyber Warfare

The empirical facts of Stuxnet support an opposite interpretation; cyber capabilities can marginally enhance the power of stronger over weaker actors, the complexity of weaponization makes cyber offense less easy and defense more feasible than generally appreciated, and cyber options are most attractive when deterrence is intact.

Conflict escalation and conflict reduction in an international crisis: Suez, 1956

Conflict research has already advanced some very useful conceptual and empirical discoveries concerning the structure and process of international conflict escalation. Some of the more basic findings

Classification of Interstate Wars

One of the recent lessons suggested by the scientific study of war is that different wars have different causes. Related to this lesson is the belief that war is multicausal and that there are

The “Correlates of War” Project: Interim Report and Rationale

and behavioral (output) data and findings which emerge from this particular project. Some suggestive approaches are found in Bernard C. Cohen, The Political Process and Foreign Policy: The Maying of