[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

Who spies on whom? Unravelling the puzzle of state-sponsored cyber economic espionage

W Akoto - Journal of Peace Research, 2024 - journals.sagepub.com
Traditional conceptions of state-sponsored cyber economic espionage suggest that
countries with different product profiles should experience high levels of espionage between …

[图书][B] Cyber strategy: The evolving character of power and coercion

B Valeriano, B Jensen, RC Maness - 2018 - books.google.com
Some pundits claim cyber weaponry is the most important military innovation in decades, a
transformative new technology that promises a paralyzing first-strike advantage difficult for …

Cyber security meets security politics: Complex technology, fragmented politics, and networked science

M Dunn Cavelty, A Wenger - Contemporary Security Policy, 2020 - Taylor & Francis
In the last decade, cyber incidents have become more expensive, more disruptive, and in
many cases more political, with a new body of theoretically informed research emerging in …

[图书][B] Cyber war versus cyber realities: Cyber conflict in the international system

B Valeriano, RC Maness - 2015 - books.google.com
In 2011, the United States government declared a cyber attack as equal to an act of war,
punishable with conventional military means. Cyber operations, cyber crime, and other …

Cyber campaigns and strategic outcomes

RJ Harknett, M Smeets - Journal of Strategic Studies, 2022 - Taylor & Francis
While much focus has remained on the concept of cyberwar, what we have been observing
in actual cyber behaviour are campaigns comprised of linked cyber operations, with the …

Weaving tangled webs: offense, defense, and deception in cyberspace

E Gartzke, JR Lindsay - Security Studies, 2015 - Taylor & Francis
It is widely believed that cyberspace is offense dominant because of technical characteristics
that undermine deterrence and defense. This argument mistakes the ease of deception on …

Introduction: Cyber-conflict–Moving from speculation to investigation

R Shandler, D Canetti - Journal of Peace Research, 2024 - journals.sagepub.com
Investigating cyber conflict is enormously difficult. The domain is complex, quality data are
sparse, international affairs are shrouded in secrecy, and despite its seeming ubiquity, cyber …

Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack

JR Lindsay - Journal of Cybersecurity, 2015 - academic.oup.com
Cyber attackers rely on deception to exploit vulnerabilities and obfuscate their identity, which
makes many pessimistic about cyber deterrence. The attribution problem appears to make …

Invisible digital front: Can cyber attacks shape battlefield events?

N Kostyuk, YM Zhukov - Journal of Conflict Resolution, 2019 - journals.sagepub.com
Recent years have seen growing concern over the use of cyber attacks in wartime, but little
evidence that these new tools of coercion can change battlefield events. We present the first …