Oxford Scholarship Online 2018
DOI: 10.1093/oso/9780190618094.001.0001
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Strategy

Abstract: This book examines how states integrate cyber capabilities with other instruments of power to achieve foreign policy outcomes. Given North Korea’s use of cyber intrusions to threaten the international community and extort funds for its elites, Chinese espionage and the theft of government records through the Office of Personal Management (OPM) hack, and the Russian hack on the 2016 US election, this book is a timely contribution to debates about power and influence in the 21st century. Its goal is to understan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
43
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 93 publications
(44 citation statements)
references
References 0 publications
1
43
0
Order By: Relevance
“…Indeed, for a variety of reasons, some scholars have urged that it is premature to give up on the liberal world just yet. 5 The chapters in this volume together address three key dimensions of this tumultuous period in Europe-Russia security in the shadow of a new transatlantic divide. First, how and why the power status quo that had been maintained since the end of the Cold War has changed in recent years, as evidenced by Russia's newly aggressive posturing.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, for a variety of reasons, some scholars have urged that it is premature to give up on the liberal world just yet. 5 The chapters in this volume together address three key dimensions of this tumultuous period in Europe-Russia security in the shadow of a new transatlantic divide. First, how and why the power status quo that had been maintained since the end of the Cold War has changed in recent years, as evidenced by Russia's newly aggressive posturing.…”
mentioning
confidence: 99%
“…Most recently, Mitchell Orenstein's book takes, at the same time, both a broader and more micro perspective on Russia's relations with the West, tracing how various forms of domestic-level hybrid attacks by Russia against Western countries have led to the breakdown in the relationship between the two, as well as polarization in the larger international system. 8 We also draw out the long-term lessons from this period with the aim of shedding light on how increasing cooperation between global actors can turn into rapidly escalating conflict. Beyond this, we seek to take into account the new political landscape that the isolationist foreign policy of the Trump administration made far more turbulent and unpredictable.…”
mentioning
confidence: 99%
“…When the individual feels that his failures in his work will lead to deprivation of the reward, or will result in a deterrent punishment imposed on him, whether the punishment is material or moral, then the fear here will belong to the individual, so we say in this case that the source of strength is the fear of the president if the individual committed An act punishable (Valeriano et al, 2018).…”
Section: -The Power Of Coercionmentioning
confidence: 99%
“…The act of swaggering can resolve uncertainties around the capabilities of the threat maker and may have a cumulative effect over time. In this sense, the intent of cyber swaggering is not necessarily to achieve a direct result, but to increase pressure and influence in a long running confrontation between two strategic adversaries (Valeriano, Jensen, & Maness, 2018).…”
Section: Baltic Journal Of European Studiesmentioning
confidence: 99%
“…In this scenario, targeted cyber-attacks are conducted against government websites, and the targeting of financial systems, for example. These are usually low-cost, low-risk efforts to harass a target and to attempt to influence their calculus (Valeriano, Jensen, & Maness, 2018), although the risk to the attacker may increase as responses to such efforts become more coordinated. The effect of such disruptions may be to signal intent on the part of the attacker, to signal the ability to inflict costs on an ongoing basis, to induce the target to question their own security and level of vulnerability, and to alter its decision making.…”
Section: Baltic Journal Of European Studiesmentioning
confidence: 99%