2021
DOI: 10.1177/0022343320964549
|View full text |Cite
|
Sign up to set email alerts
|

International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks

Abstract: A state’s decision to engage in cyber operations has important implications for its trade. Successful cyber espionage could yield valuable trade secrets that could boost domestic production and spur economic growth. On the other hand, uncovered cyber operations could invite devastating sanctions that retard economic development. In spite of this, the nexus between trade and cyber attacks has received little attention in the literature. In this article, I explore how a state’s trade relations affect its propens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 17 publications
(21 citation statements)
references
References 35 publications
0
18
0
1
Order By: Relevance
“…On the other hand, without mentioning APTs, but using the term state-sponsored cyberattacks, [32] analysed incidents of such attacks regarding intra-and interindustry trade. e evaluation of the proposal involves variables such as cyberespionage campaigns, information about trade data, GDP per capita, or conflict data.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, without mentioning APTs, but using the term state-sponsored cyberattacks, [32] analysed incidents of such attacks regarding intra-and interindustry trade. e evaluation of the proposal involves variables such as cyberespionage campaigns, information about trade data, GDP per capita, or conflict data.…”
Section: Related Workmentioning
confidence: 99%
“…In light of existing studies, some of them focus on APTs and some other on social or sociopolitical matters related to cyberattacks, but no proposal has modelled and analysed relationships between APTs and GPE concerns. Moreover, in terms of methodology, [32] is the only proposal that applies regression models as in our proposal (introduced later in Section 3.2). However, their models are different as they are used for different purposes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Information gathered via proxies can enable states-particularly militarily weak ones-to gain a competitive advantage and prepare for war. Espionaged information may also be critical in helping states advance their military technologies, disrupt adversary's plans and favorably frame issues of contention (Akoto, 2021b).…”
Section: The Strategic Logic Of Using Cyber Proxiesmentioning
confidence: 99%
“…The use of cyber proxies has sparked a budding cyber politics literature that explores the relationship between cyber proxies and their state sponsors (see e.g. Akoto, 2021b;Borghard and Lonergan, 2016;Lotrionte, 2015;Maurer, 2018). However, scholars are yet to examine interstate variation in the use of cyber proxies.…”
Section: Introductionmentioning
confidence: 99%