Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide …
J Healey, R Jervis - 2020 - repositories.lib.utexas.edu
As the United States shifts to a new military strategy of defending forward against adversaries in cyberspace, research into the role of cyber capabilities in crisis stability is …
MM Leal, P Musgrave - Conflict Management and Peace …, 2023 - journals.sagepub.com
Theorists offer many predictions about how Americans will respond to significant cyberattacks but systematic evaluations of American public opinion regarding these issues …
E Lin-Greenberg - The Journal of Politics, 2023 - journals.uchicago.edu
Escalation is central to many international relations theories. Despite its cornerstone role, conceptualizing and measuring escalation has become increasingly complicated as …
MC Libicki, O Tkacheva - Cyber Threats and NATO 2030: Horizon …, 2020 - ccdcoe.org
In any domain, deliberate escalation or de-escalation is an important tool in the management of crisis and conflict. Adroit use of such a tool to communicate intention and …
C Whyte - European Journal of International Security, 2020 - cambridge.org
At present, most scholarship on the potential for escalation in cyberspace couches analysis in terms of the technological dynamics of the domain for relative power maneuvering. The …
S Chen, J Taw - The Cyber Defense Review, 2023 - JSTOR
O n July 27, 2021, President Joe Biden warned, in a speech at the Office of Director of National Intelligence, that “I think it's more than likely we're going to end up, if we end up in a …
CE Beckerman - Journal of Cybersecurity, 2022 - academic.oup.com
In recent years, scholars, commentators and politicians have discussed the prospect of a 'cyber security dilemma'. If states race to develop superior cyberattacks, how far might this …
A wide range of actors have publicly identified cyber stability as a key policy goal but the meaning of stability in the context of cyber policy remains vague and contested. Vague …