The Logic of Coercion in Cyberspace

@article{Borghard2017TheLO,
  title={The Logic of Coercion in Cyberspace},
  author={Erica D. Borghard and Shawn W. Lonergan},
  journal={Security Studies},
  year={2017},
  volume={26},
  pages={452 - 481}
}
ABSTRACT What are the dynamics of coercion in cyberspace? Can states use cyber means as independent tools of coercion to influence the behavior of adversaries? This article critically assesses traditional coercion theory in light of cyberspace's emergence as a domain in which states use force, or its threat, to achieve political objectives. First, we review the core tenets of coercion theory and identify the requisites of successful coercion: clearly communicated threats; a cost–benefit… 

Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation

  • J. Burton
  • Computer Science
    Baltic Journal of European Studies
  • 2019
TLDR
It is argued that the wider effects of cyber operations on political, civil and human rights have been underexplored in the cyber security literature; that cyber-attacks have adversely affected freedom of expression in the conflict in Ukraine and in other political disputes; and that the coercion concept is ill-suited to accounting for the socio-psychological impact of modern cyber operations.

Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online

Abstract At present, most scholarship on the potential for escalation in cyberspace couches analysis in terms of the technological dynamics of the domain for relative power maneuvering. The result

Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics

TLDR
This study suggests that cyberattacks create a threshold that restrains the escalation of conflict, and provides support for cyber strategies based on assumptions of cyber thresholds, while also casting doubt on the credibility of cyber deterrence by punishment.

The materiality of cyberthreats: securitization logics in popular visual culture

TLDR
This article traces securitization logics in popular visual culture to show how these representations make sense of technical incidents politically via material objects, showing a shift from depicting computers themselves as the main threat to the manipulation of data as exercise of power and finally, the wielding of code as weapon to create physical damage.

Rethinking Secrecy in Cyberspace

Secrecy is central to the strategic and political dynamics of cyberspace operations. The ease with which actors can launch attacks while masking their identity poses serious problems for both

Cyber Deterrence: The Past, Present, and Future

The question on whether and how deterring an adversary in or through cyberspace is feasible has provoked the minds of scholars and practitioners for decades. Today, cyber deterrence remains a

The Ethics of Cyber Attack: Pursuing Legitimate Security and the Common Good in Contemporary Conflict Scenarios

TLDR
It is concluded that the common good must be incorporated into developing state cyber strategies as well as the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict.

Breaking the Myth of Cyber Doom: Securitization and Normalization of Novel Threats

TLDR
Evidence is presented suggesting that the unique characteristics of a development (i.e., web-technology proliferation) matter in opinion formation, as sensitivity to digital threats to the polity is grounded on personal threat sensitivity.

Always in control? Sovereign states in cyberspace

Abstract For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals

Deterrence in the Cyber Realm: Public versus Private Cyber Capacity

TLDR
Using an incomplete-information model, it is demonstrated that cyber institutions sometimes deter adversarial strategic cyber operations by prevention and threat of punishment, and weak cyber states tend to sub-optimally over-invest resources in these institutions, whereas strong cyber states over- invest, which reduces their overall cyber capability.
...