The Logic of Coercion in Cyberspace

@article{Borghard2017TheLO,
  title={The Logic of Coercion in Cyberspace},
  author={Erica D. Borghard and Shawn W. Lonergan},
  journal={Security Studies},
  year={2017},
  volume={26},
  pages={452 - 481}
}
ABSTRACT What are the dynamics of coercion in cyberspace? Can states use cyber means as independent tools of coercion to influence the behavior of adversaries? This article critically assesses traditional coercion theory in light of cyberspace's emergence as a domain in which states use force, or its threat, to achieve political objectives. First, we review the core tenets of coercion theory and identify the requisites of successful coercion: clearly communicated threats; a cost–benefit… 
Cyber-Attacks and Freedom of Expression: Coercion, Intimidation and Virtual Occupation
  • J. Burton
  • Computer Science
    Baltic Journal of European Studies
  • 2019
TLDR
It is argued that the wider effects of cyber operations on political, civil and human rights have been underexplored in the cyber security literature; that cyber-attacks have adversely affected freedom of expression in the conflict in Ukraine and in other political disputes; and that the coercion concept is ill-suited to accounting for the socio-psychological impact of modern cyber operations.
Can drones coerce? The effects of remote aerial coercion in counterterrorism
Weary of costly on-the-ground military interventions, Western nations have increasingly turned to “Remote Warfare” to address the continued threat of terrorism. Despite the centrality of drone
Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online
Abstract At present, most scholarship on the potential for escalation in cyberspace couches analysis in terms of the technological dynamics of the domain for relative power maneuvering. The result
The materiality of cyberthreats: securitization logics in popular visual culture
TLDR
This article traces securitization logics in popular visual culture to show how these representations make sense of technical incidents politically via material objects, showing a shift from depicting computers themselves as the main threat to the manipulation of data as exercise of power and finally, the wielding of code as weapon to create physical damage.
Rethinking Secrecy in Cyberspace
Secrecy is central to the strategic and political dynamics of cyberspace operations. The ease with which actors can launch attacks while masking their identity poses serious problems for both
Cyber Deterrence: The Past, Present, and Future
The question on whether and how deterring an adversary in or through cyberspace is feasible has provoked the minds of scholars and practitioners for decades. Today, cyber deterrence remains a
The Ethics of Cyber Attack: Pursuing Legitimate Security and the Common Good in Contemporary Conflict Scenarios
TLDR
It is concluded that the common good must be incorporated into developing state cyber strategies as well as the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict.
Escalation Firebreaks in the Cyber, Conventional, and Nuclear Domains: Moving Beyond Effects-Based Logics
Is nuclear strategist Herman Kahn’s effects-based escalation ladder still pertinent in the information age? Despite the growing literature on cyber security, most studies have sidestepped important
Breaking the Myth of Cyber Doom: Securitization and Normalization of Novel Threats
TLDR
Evidence is presented suggesting that the unique characteristics of a development (i.e., web-technology proliferation) matter in opinion formation, as sensitivity to digital threats to the polity is grounded on personal threat sensitivity.
Always in control? Sovereign states in cyberspace
Abstract For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals
...
...