R Shandler, D Canetti - Journal of Peace Research, 2024 - journals.sagepub.com
Investigating cyber conflict is enormously difficult. The domain is complex, quality data are sparse, international affairs are shrouded in secrecy, and despite its seeming ubiquity, cyber …
When it comes to cybersecurity incidents–public opinion matters. But how do voters form opinions in the aftermath of cyberattacks that are shrouded in ambiguity? How do people …
FJ Egloff, J Shires - Journal of Global Security Studies, 2022 - academic.oup.com
Offensive cyber capabilities (OCCs) are the combination of people, technologies, and organizational attributes that jointly enable offensive cyber operations: the adversarial …
How does a reflexive scholarly practice matter for producing useful cybersecurity knowledge and policy? We argue that staking relevance without engaging in reflexivity diminishes the …
F Cristiano - Cristiano, F.(2022). The Blurring Politics of Cyber …, 2022 - papers.ssrn.com
This thesis explores how the politics of cyber conflict redefine violence, sovereignty, and territory in and through cyberspace. It does this by studying how the digital mediates different …
T Marwala - Artificial intelligence, game theory and mechanism …, 2023 - Springer
This chapter delves into the delicate confluence between cybersecurity and politics, a topic of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …
N Katagiri - Australian Journal of International Affairs, 2023 - Taylor & Francis
ABSTRACT I explore four sets of explanations on what makes it hard for democracies to penalise hackers for their digital actions. My analysis reveals that of the four challenges, two …
The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd's just securitization theory (JST) …
J Thumfart - The Liberal Internet in the Postliberal Era: Digital …, 2024 - Springer
This chapter clarifies conceptual, terminological, and methodological aspects of the digital sovereignty debate. It focusses on the meaning of sovereignty in international law and …