2014
DOI: 10.1177/0022343313518940
|View full text |Cite
|
Sign up to set email alerts
|

The dynamics of cyber conflict between rival antagonists, 2001–11

Abstract: Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future security interactions is founded upon the study of what could be, conjured through spectacular flights of the imagination. The goal of this research article is to exhaustively collect information on cyber interactions between rival states in the last decade so that we can delineate the patterns of cyber conflict as reflected by evidence at the international level. The field of cyber security needs a clear return to s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
40
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 115 publications
(43 citation statements)
references
References 20 publications
2
40
0
1
Order By: Relevance
“…The top 12 countries (by volume of events) are plotted and the remaining 70 are grouped into the category “other” for visual clarity. The larger edges conform to the expectations of Valeriano and Maness (2014); regional pairs and rivals are apparent in the graph. The US is most active with China and Russia.…”
Section: Cylicon: a Cyber Event Datasetsupporting
confidence: 77%
“…The top 12 countries (by volume of events) are plotted and the remaining 70 are grouped into the category “other” for visual clarity. The larger edges conform to the expectations of Valeriano and Maness (2014); regional pairs and rivals are apparent in the graph. The US is most active with China and Russia.…”
Section: Cylicon: a Cyber Event Datasetsupporting
confidence: 77%
“…Finally, academia, so far, has not been a remedy, as researchers use the public record as the baseline for studying cyber conflict (see Valeriano & Maness, 2014). In order for academia to be a check on the biases introduced, it would have to establish itself as a trustworthy source of data and interpretation.…”
Section: Implications Of Contested Public Attributions For the Role Omentioning
confidence: 99%
“…While the majority of research in this area has focused on interstate wars (see e.g. Gartzke, 2013; Valeriano and Maness, 2014), many of the concepts are applicable to intra-state conflict as well. Ample evidence of distributed denial of service attacks as well as attempts at planting malicious software in the enemy’s military control systems in both the Ukrainian and Syrian conflicts confirm that “cyber” capabilities are becoming increasingly important during episodes of domestic political violence (Deibert, Rohozinski and Crete-Nishihata, 2012; Lee, 2016; Shevchenko, 2014).…”
Section: From Uprisings To Violencementioning
confidence: 99%