2016
DOI: 10.1093/jcsl/krw015
|View full text |Cite
|
Sign up to set email alerts
|

‘Proxies’ and Cyberspace

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 0 publications
0
4
0
3
Order By: Relevance
“…To this end, proxy war scholarship has sought to explain the extent to which indirect war runs across 20 the strategic terrain of other forms of conflict. In doing so, it traced its links to hybrid (Rauta, 2019) and cyber warfare (Borghard & Lonergan 2016;Maurer, 2016), renewed great power competition (Lee, 2019), and, finally, new counterinsurgency paradigms the likes of the "by-with-through" model (Ayton, 2020;Votel & Keravouri, 2018).…”
Section: Discussionmentioning
confidence: 99%
“…To this end, proxy war scholarship has sought to explain the extent to which indirect war runs across 20 the strategic terrain of other forms of conflict. In doing so, it traced its links to hybrid (Rauta, 2019) and cyber warfare (Borghard & Lonergan 2016;Maurer, 2016), renewed great power competition (Lee, 2019), and, finally, new counterinsurgency paradigms the likes of the "by-with-through" model (Ayton, 2020;Votel & Keravouri, 2018).…”
Section: Discussionmentioning
confidence: 99%
“…Der Perspektivwechsel, hin zu nichtstaatlichen Akteuren, geht dabei auch auf die staatliche Zurückhaltung beim Einsatz ihrer Cyberkapazitäten zurück. In diesem Kontext stehen nicht nur nichtstaatliche Akteure allein im Mittelpunkt akademischer Aufmerksamkeit, vielmehr haben WissenschaftlerInnen begonnen das Verhältnis zwischen Staaten und solchen nichtstaatlichen Akteuren zu beleuchten, die entweder direkt in staatlichem Auftrag agieren oder von diesen zumindest geduldet werden (Proxies, siehe Maurer 2016Maurer , 2018Borghard/Lonergan 2016).…”
Section: Vergleichende Sicherheitspolitik-und Konfliktforschungunclassified
“…329 Multiple reports about the continued use of proxies by states to conduct cyberoperations, including in the case studies discussed above, and the limited response taken by victim states against host states in this connection are further indications of the limited reliance on the due diligence rule by states in their actual practice. 330 Experts in the field also appear to have little appetite for construing the Tallinn Rules as requiring permanent monitoring of "national" areas of cyberspace. 331 Indeed, the case studies discussed in this article illustrate the limited reliance of states on the due diligence rule in formulating their demands against the host states from which the operations emanated.…”
Section: A Rule Book On the Shelf?mentioning
confidence: 99%