Cyberspace and International Relations 2013
DOI: 10.1007/978-3-642-37481-4_4
|View full text |Cite
|
Sign up to set email alerts
|

In Search of Cyber Stability: International Relations, Mutually Assured Destruction and the Age of Cyber Warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…It is nonetheless a fact that one of the most, or maybe the most, conspicuous feature(s) of cyber venues is its facilitatory role in the acts of espionage, DoS (denial of service), propaganda, identity theft, sabotage, etc. (Choucri, 2012c;Denning, 2001;Greathouse, 2014;Inkster, 2010;Kassab, 2014;Kremer & Müller, 2014;Luiijf, 2012;Steed, 2011). I accordingly point out that the primary takeaway from such works is that there is little to no debate about whether cyber world enables such malicious actions; the main point of controversy is to what extent states are willing to engage in extraordinary offensive measures against one another as a retaliatory response to the damage caused by such malicious actions.…”
Section: Relevant Workmentioning
confidence: 99%
“…It is nonetheless a fact that one of the most, or maybe the most, conspicuous feature(s) of cyber venues is its facilitatory role in the acts of espionage, DoS (denial of service), propaganda, identity theft, sabotage, etc. (Choucri, 2012c;Denning, 2001;Greathouse, 2014;Inkster, 2010;Kassab, 2014;Kremer & Müller, 2014;Luiijf, 2012;Steed, 2011). I accordingly point out that the primary takeaway from such works is that there is little to no debate about whether cyber world enables such malicious actions; the main point of controversy is to what extent states are willing to engage in extraordinary offensive measures against one another as a retaliatory response to the damage caused by such malicious actions.…”
Section: Relevant Workmentioning
confidence: 99%
“…I would therefore prefer to put his work on liberal line. On the other hand, it is a commonly accepted idea both in the camp of deniers and the camp of endorsers that one of the most, or maybe the most, conspicious feature(s) of cyber venues is its facilitatory role in the acts of espionage, DoS (denial of service), propoganda, identity theft, sabotage, and so forth (Choucri, 2012b;Denning, 2001;Greathouse, 2014;Inkster, 2010;Kassab, 2014;Kremer & Müller, 2014;Luiijf, 2012;Steed, 2011). I therefore point out that main inference that should be taken from such works is that there is no debate over whether cyber world facilitates such malignant actions; the main point of controversy is to what extend states bear to go for extraordinary offensive measures against one another as a consequence of these actions.…”
Section: Previous Relevant Workmentioning
confidence: 99%
“…I would therefore prefer to locate his work within the liberal theoretical tradition. On the other hand, it is a commonly accepted idea both in the camp of deniers and the camp of endorsers that one of the most, or maybe the most, conspicuous feature(s) of cyber venues is its facilitatory role in the acts of espionage, DoS (denial of service), propaganda, identity theft, sabotage, and so forth (Choucri, 2012b;Denning, 2001;Greathouse, 2014;Inkster, 2010;Kassab, 2014;Kremer and Müller, 2014;Luiijf, 2012;Steed, 2011). I therefore point out that the primary takeaway from such works is that there is little to no debate about whether cyber world enables such malicious actions; the main point of controversy is to what extent states bear to go for extraordinary offensive measures against one another as a consequence of these actions.…”
Section: Previous Relevant Workmentioning
confidence: 99%