[HTML][HTML] Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era

A Adeyeri, H Abroshan - Information, 2024 - mdpi.com
As the digital environment progresses, the complexities of cyber threats also advance,
encompassing both hostile cyberattacks and sophisticated cyber espionage. In the face of …

Introduction: Cyber-conflict–Moving from speculation to investigation

R Shandler, D Canetti - Journal of Peace Research, 2024 - journals.sagepub.com
Investigating cyber conflict is enormously difficult. The domain is complex, quality data are
sparse, international affairs are shrouded in secrecy, and despite its seeming ubiquity, cyber …

Cyberattacks and public opinion–The effect of uncertainty in guiding preferences

E Jardine, N Porter, R Shandler - Journal of Peace …, 2024 - journals.sagepub.com
When it comes to cybersecurity incidents–public opinion matters. But how do voters form
opinions in the aftermath of cyberattacks that are shrouded in ambiguity? How do people …

[PDF][PDF] Offensive cyber capabilities and state violence: Three logics of integration

FJ Egloff, J Shires - Journal of Global Security Studies, 2022 - academic.oup.com
Offensive cyber capabilities (OCCs) are the combination of people, technologies, and
organizational attributes that jointly enable offensive cyber operations: the adversarial …

Cybersecurity and the politics of knowledge production: towards a reflexive practice

F Cristiano, X Kurowska, T Stevens, LM Hurel… - Journal of Cyber …, 2023 - Taylor & Francis
How does a reflexive scholarly practice matter for producing useful cybersecurity knowledge
and policy? We argue that staking relevance without engaging in reflexivity diminishes the …

The Blurring Politics of Cyber Conflict: A Critical Study of the Digital in Palestine and Beyond

F Cristiano - Cristiano, F.(2022). The Blurring Politics of Cyber …, 2022 - papers.ssrn.com
This thesis explores how the politics of cyber conflict redefine violence, sovereignty, and
territory in and through cyberspace. It does this by studying how the digital mediates different …

Cybersecurity in politics

T Marwala - Artificial intelligence, game theory and mechanism …, 2023 - Springer
This chapter delves into the delicate confluence between cybersecurity and politics, a topic
of rising importance in the digital age. Cybersecurity is no more a standalone concern; it has …

Democracy, firms, and cyber punishment: what cyberspace challenge do democracies face from the private sector?

N Katagiri - Australian Journal of International Affairs, 2023 - Taylor & Francis
ABSTRACT I explore four sets of explanations on what makes it hard for democracies to
penalise hackers for their digital actions. My analysis reveals that of the four challenges, two …

The (Il) legitimacy of cybersecurity. an application of just securitization theory to cybersecurity based on the principle of Subsidiarity

J Thumfart - Applied Cybersecurity & Internet Governance, 2022 - ceeol.com
The application of securitization theory to cybersecurity is useful since it subjects the emotive
rhetoric of threat construction to critical scrutiny. Floyd's just securitization theory (JST) …

Conceptual, Terminological, and Methodological Clarifications

J Thumfart - The Liberal Internet in the Postliberal Era: Digital …, 2024 - Springer
This chapter clarifies conceptual, terminological, and methodological aspects of the digital
sovereignty debate. It focusses on the meaning of sovereignty in international law and …