2018
DOI: 10.2139/ssrn.2624926
|View full text |Cite
|
Sign up to set email alerts
|

Conceptualizing Cyber Deterrence by Entanglement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 6 publications
0
4
0
1
Order By: Relevance
“…Existing literature on public support for retaliation often attributes public attitudes to deterrence and escalation dynamics. Attitudes about deterrence and escalation have been theorized to differ between cyber and kinetic operations (Brantly 2018a; Borghard and Lonergan 2019; Fischerkeller and Harknett 2017; Libicki 2012; Lin 2012; Lindsay 2015). However, we find that respondents have the same views on deterrence and escalation in the cyber and physical domains.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing literature on public support for retaliation often attributes public attitudes to deterrence and escalation dynamics. Attitudes about deterrence and escalation have been theorized to differ between cyber and kinetic operations (Brantly 2018a; Borghard and Lonergan 2019; Fischerkeller and Harknett 2017; Libicki 2012; Lin 2012; Lindsay 2015). However, we find that respondents have the same views on deterrence and escalation in the cyber and physical domains.…”
Section: Resultsmentioning
confidence: 99%
“…Regardless of the means, receiving a more distant treatment is associated with depressed support for retaliation. Previous researchers have suggested delays in attribution make it harder to respond to cyber attacks (Brantly 2018a; Kello 2013). These delays can be the result of attribution challenges or intentional decisions by actors making attribution claims.…”
Section: Resultsmentioning
confidence: 99%
“…Better technical, legal, and social processes of attribution can clarify who was likely behind an attack. Entanglement and deterrence by denial can discourage attacks by manipulating the cost-benefit calculus of potential aggressors [13, 14,16]. Cross-domain deterrence postures can link cyber to the wider panoply of tools at the disposal of government [23,24].…”
Section: Discussionmentioning
confidence: 99%
“…The frequent failure of deterrence in cyberspace is well-documented, at least at the level of theory. In major ways, deterrence fails because of what is known as the "attribution problem" [11][12][13][14][15][16][17]. Stockpiled arsenals of guns, bombs, and cyber bullets can sometimes effectively deter opponents.…”
Section: Janus-faced Attribution Problemsmentioning
confidence: 99%
“…Den stadige tettere tilknytningen mellom aktører (stater, organisasjoner og mennesker) skaper flere potensielle sårbarheter, men det kan også gjøre det vanskelig å gjennomføre offensive cyberoperasjoner uten at det forårsaker utilsiktet skade. Ved å styrke globaliseringens fremvekst kan man redusere risikovilligheten hos mulige fiendtlige aktører: «By more thoroughly entangling both friend and foe the aggregate benefits for maintaining and enhancing good behavior within the cyberspace increase and reinforce risk averse behaviors» (Brantly, 2018). For småstater er dette praktisk sett kanskje en mer farbar vei fordi det ikke innebaerer paritet i offensive og defensive cyberkapasiteter for å ha effekt.…”
Section: Strategi For Avskrekking I Cyberdomenetunclassified