This thesis investigates variation in state responses to hostile cyber operations. The central argument is that states’ strategic cultures and historical experiences shape their risk attitudes in cyber attack scenarios, with important consequences for their willingness (or not) to carry out meaningful punishment. To guide the empirical investigation, the thesis develops a conceptual framework drawing from and adapting the “risk society” theory in Sociology – an approach that has not yet been applied in cyber studies. The thesis explains weak state responses as a result of cultural and historical forces that produce sensitivities to the inherent risks and uncertainties of the operational environment of cyberspace. It explains strong state re...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
Doctor of PhilosophySecurity StudiesJeffrey J. PickeringAs the Internet is progressively integrated ...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
This study identifies and explains variation in how states behave in the new security environment of...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
This dissertation consists of three parts and has a twofold research interest. The research interest...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-att...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Several high profile incidents have shaped both popular and government understanding of internationa...
The use of cyber operations as a foreign policy instrument continues to stimulate academic interest ...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
Doctor of PhilosophySecurity StudiesJeffrey J. PickeringAs the Internet is progressively integrated ...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...
This study identifies and explains variation in how states behave in the new security environment of...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
In 2007 Estonia faced a series of cyber-attacks on its cyber infrastructure, which caused widespread...
Over the last decade, cyber power has become an increasingly prominent concept and instrument of n...
This dissertation consists of three parts and has a twofold research interest. The research interest...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-att...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Several high profile incidents have shaped both popular and government understanding of internationa...
The use of cyber operations as a foreign policy instrument continues to stimulate academic interest ...
Thesis (Master's)--University of Washington, 2014Similar to the discovery of fission, the advent of ...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
Doctor of PhilosophySecurity StudiesJeffrey J. PickeringAs the Internet is progressively integrated ...
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of eng...