2013
DOI: 10.1080/01402390.2012.739561
|View full text |Cite
|
Sign up to set email alerts
|

How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(9 citation statements)
references
References 6 publications
0
8
0
1
Order By: Relevance
“…38 Rid's approach is ends-based and focuses on war when it emerges rather than what contributes to causing war. 39 From this perspective, the StuxNet attacks against Iran's nuclear programme would not be cyberwar because they lacked the critical element of lethal force. Further, the plausible deniability associated with cyberattcks makes determining the political, or instrumental, reasoning behind these acts difficult, reinforcing the Clausewitzian position.…”
Section: Attempts To Define Cyberwarmentioning
confidence: 99%
See 1 more Smart Citation
“…38 Rid's approach is ends-based and focuses on war when it emerges rather than what contributes to causing war. 39 From this perspective, the StuxNet attacks against Iran's nuclear programme would not be cyberwar because they lacked the critical element of lethal force. Further, the plausible deniability associated with cyberattcks makes determining the political, or instrumental, reasoning behind these acts difficult, reinforcing the Clausewitzian position.…”
Section: Attempts To Define Cyberwarmentioning
confidence: 99%
“…In following this logic, once cyberwar has begun, then cyberattacks fall under jus in bello, or the rules governing the process of warfare. How jus ad bellum and jus in bello apply to cyberwar is constrained within the existing United Nations charter (Articles 2 (4), 39,41,51), relevant international legal regimes, and norms of state behaviour. 8 However, existing legal frameworks are only partially relevant to actions which do not fall under jus ad bellum and jus in bello.…”
Section: Introductionmentioning
confidence: 99%
“…Prior research has called for more theoretical ( Junio, 2013) as well as empirical research into the logic and correlates of state-sponsored cyber conflict, particularly research that moves beyond single-case inferences to test hypotheses using datasets "drawing on the variety of known cases" of cyber conflict worldwide (Kello 2013, p. 15). Although obvious difficulties abound in large-n cyber conflict research, the persistence of so many contradictory theoretical claims clearly warrants further investigation.…”
Section: Empirical Expectationsmentioning
confidence: 99%
“…El debate se puede subdividir en dos grandes perspectivas. Por un lado, una perspectiva sostiene que la infraestructura interconectada hace que las potencias industriales avanzadas sean particularmente vulnerables a serias perturbaciones por parte de los Estados más débiles o incluso de actores no estatales, puesto que las herra-mientas de hackeo son cada vez de más fácil acceso (Nye, 2011;Borg, 2005;Brenner, 2011;Clarke & Knake, 2010;Junio, 2013;Kello, 2013;Petterson, 2013;Rattray, 2001).…”
Section: La Organización Del Sistema Internacional Cibernéticounclassified