Although cyber conflict is no longer considered particularly unusual, significant uncertainties remain about the nature, scale, scope and other critical features of it. This study addresses a subset of these issues by developing an internally consistent framework and applying it to a series of 17 case studies. We present each case in terms of (a) its socio-political context, (b) technical features, (c) the outcome and inferences drawn in the sources examined. The profile of each case includes the actors, their actions, tools they used and power relationships, and the outcomes with inferences or observations. Our findings include: • Cyberspace has brought in a number of new players – activists, shady government contractors – to internationa...
This dissertation is a mixed method, empirical study on the causes and consequences of the prolifera...
Several high profile incidents have shaped both popular and government understanding of internationa...
Recent cyber defense studies has shown that there is a qualitative increase in the numbers of cyber-...
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future secur...
This thesis explores the implications of nation-state cyberwarfare and cyber conflict in the context...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
Objectives: This article explains the concepts of cyber conflict attributes in relation to the class...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
This study identifies and explains variation in how states behave in the new security environment of...
This study identifies and explains variation in how states behave in the new security environment of...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
Diplomatic action in international relations is a global security priority in the inter-connected wo...
This dissertation is a mixed method, empirical study on the causes and consequences of the prolifera...
Several high profile incidents have shaped both popular and government understanding of internationa...
Recent cyber defense studies has shown that there is a qualitative increase in the numbers of cyber-...
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future secur...
This thesis explores the implications of nation-state cyberwarfare and cyber conflict in the context...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
Objectives: This article explains the concepts of cyber conflict attributes in relation to the class...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
This study identifies and explains variation in how states behave in the new security environment of...
This study identifies and explains variation in how states behave in the new security environment of...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
This paper examines the causal relationship between cyber technology’s deep global integration and c...
Diplomatic action in international relations is a global security priority in the inter-connected wo...
This dissertation is a mixed method, empirical study on the causes and consequences of the prolifera...
Several high profile incidents have shaped both popular and government understanding of internationa...
Recent cyber defense studies has shown that there is a qualitative increase in the numbers of cyber-...