Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

How Rival States Employ Cyber Strategy

View through CrossRef
The central question of this book is: how do states use cyber strategies to influence their rivals? This chapter introduces a theory of cyber coercion that considers the three main types of cyber strategies: disruption, espionage, and degradation. As a form of covert action, cyber coercion can represent ambiguous signals designed to probe adversary intentions and manage escalation risks. This chapter dissects the core logic of coercion and coercive diplomacy as they apply to cyber operations. After defining coercion and establishing the expected threshold of concessions based on surveying multiple studies, it then highlights debates about power and resolve in the traditional coercion literature to extract important considerations for empirical investigation. The inherent ambiguity, primacy of signaling, and temporary effects in cyber operations distort power and resolve in the digital domain.
Title: How Rival States Employ Cyber Strategy
Description:
The central question of this book is: how do states use cyber strategies to influence their rivals? This chapter introduces a theory of cyber coercion that considers the three main types of cyber strategies: disruption, espionage, and degradation.
As a form of covert action, cyber coercion can represent ambiguous signals designed to probe adversary intentions and manage escalation risks.
This chapter dissects the core logic of coercion and coercive diplomacy as they apply to cyber operations.
After defining coercion and establishing the expected threshold of concessions based on surveying multiple studies, it then highlights debates about power and resolve in the traditional coercion literature to extract important considerations for empirical investigation.
The inherent ambiguity, primacy of signaling, and temporary effects in cyber operations distort power and resolve in the digital domain.

Related Results

The United States
The United States
This chapter analyzes US cyber strategy and coercion against rival states. First, the chapter situates the US approach to cyber in the larger intellectual history surrounding a pre...
Introduction
Introduction
This chapter evaluates the efficacy of modern cyber strategies and how states coerce rivals in the digital domain. It argues that these campaigns are neither as revolutionary nor a...
Conclusion
Conclusion
This book emerges from a critical gap in the cyber security literature. Scholars and policy makers alike have struggled to examine cyber coercion empirically. Despite limitations i...
The United States, Russia, and China
The United States, Russia, and China
In the brief experience the world has had during the post-9/11 era, much has been made of the need for sharing intelligence in the war on terror, and a lot of emphasis has been pla...
Nationalism: Past as Prologue
Nationalism: Past as Prologue
Nationalism: Past as Prologue began as a single volume being compiled by Ad Akande, a scholar from South Africa, who proposed it to me as co-author about two years ago. The origina...
Breaking Point
Breaking Point
The post-Cold War order established by the United States of America is currently at a crossroads. No longer is the liberal order and United States hegemonic power a given. Moscow a...
Cyber Defence
Cyber Defence
Europe confronts an enormous cyber threat. The continent hosted the first international cyber crisis—the 2007 attacks by Russian political activists that crashed computer infrastru...
Governing Cyberspace
Governing Cyberspace
Cyber norms and other ways to regulate responsible state behavior in cyberspace is a fast-moving political and diplomatic field. The academic study of these processes is varied and...

Back to Top