2018
DOI: 10.1080/23738871.2018.1453526
|View full text |Cite
|
Sign up to set email alerts
|

Conceptualising conflicts in cyberspace

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 37 publications
0
6
0
2
Order By: Relevance
“…Quantitative observational studies increase external validity with incident-level event datasets from media reports. Authors use quantitative approaches to describe cyber conflict (Steiger et al, 2018;Valeriano and Maness, 2015), the impact of cybersecurity on battlefield operations (Kostyuk and Zhukov, 2019), conflict spillover (Maness and Valeriano, 2016), or show how states' economies shape industrial espionage (Akoto, 2024).…”
Section: Bias In Observational Researchmentioning
confidence: 99%
“…Quantitative observational studies increase external validity with incident-level event datasets from media reports. Authors use quantitative approaches to describe cyber conflict (Steiger et al, 2018;Valeriano and Maness, 2015), the impact of cybersecurity on battlefield operations (Kostyuk and Zhukov, 2019), conflict spillover (Maness and Valeriano, 2016), or show how states' economies shape industrial espionage (Akoto, 2024).…”
Section: Bias In Observational Researchmentioning
confidence: 99%
“…Elements associated with data breaches can be considered as: organizational factors, business process exposure factors, and technological security factors; Understanding these factors, and using computer security industry frameworks and healthcare standards, may help predict healthcare data breach weaknesses. Steiger et al (2018) propose that it is crucial to discuss hypothetical scenarios and analyse actual events, to achieve better understanding of cyber conflicts, and also: 1) Besides Western sources, also work with e.g. Russian and Chinese speaking coders; 2) Recognise the attribution made by actual conflict actors; 3) Rely on structured inclusion criteria to establish a dataset to evaluate cyber incidents; and 4) Build assessments on transparent indicators and develop criteria to gauge the intensity of cyberattacks that represent the severity of cyber incidents.…”
Section: Critical Infrastructures and Servicesmentioning
confidence: 99%
“…Vergleichende Studien, die verschiedene Fälle analysieren und dabei nicht nur die qualitativen Spitzen des Konfliktgeschehens abbilden, sind aber noch immer rar. Eine Folge dieser Kritik sind erste Projekte und Datensätze, die sich zum Ziel gemacht haben, politische Cyberangriffe strukturiert zu vermessen und so empirisch fundierte Analysen zu ermöglichen (Council on Foreign Relations, 2020;Steiger u. a., 2018;Valeriano und Maness, 2014).…”
Section: Forschungsstand Desiderate Und Fragestellungunclassified