Academia.eduAcademia.edu

Cyber Conflict

description158 papers
group8,068 followers
lightbulbAbout this topic
Cyber conflict refers to the use of digital attacks by state or non-state actors to disrupt, damage, or gain unauthorized access to information systems, networks, or data, often with the intent to achieve strategic objectives, influence political outcomes, or inflict harm on adversaries.
lightbulbAbout this topic
Cyber conflict refers to the use of digital attacks by state or non-state actors to disrupt, damage, or gain unauthorized access to information systems, networks, or data, often with the intent to achieve strategic objectives, influence political outcomes, or inflict harm on adversaries.

Key research themes

1. How do states develop and operationalize cyber forces amidst strategic culture, bureaucratic challenges, and threat perceptions?

This theme explores the complexities involved in the creation and operationalization of cyber military capabilities by states, with particular emphasis on internal institutional dynamics, strategic cultural understandings, and threat assessments that shape cyber force development. Understanding these factors is crucial for grasping why some states lag in cyber force development despite growing cyber threats and why cyber power remains inconsistently integrated into national defense strategies.

Key finding: This article asserts the foundational necessity of cyber capabilities for emerging military domains such as space forces, emphasizing that cyber domain control is a prerequisite for operational dominance in other... Read more

2. What frameworks and normative proposals exist to govern state conduct and deter escalation in cyberspace?

This theme investigates the theoretical and policy-oriented efforts to define ethics, laws, norms, and deterrence strategies regulating state behavior in cyberspace to maintain international stability and avoid uncontrolled escalation. It emphasizes the challenges posed by the unique features of cyber conflict—such as ambiguity of attack attribution, low barriers to entry, and continuity between peace and war—and the necessity for bespoke normative and strategic responses.

Key finding: The chapter proposes a theory of cyber deterrence and policy recommendations grounded in nuanced understanding of cyber attacks' nature and moral considerations distinct from kinetic warfare. It highlights the insufficiency... Read more
Key finding: This monograph critically examines the rapidly evolving interpretations surrounding cyber conflict episodes and highlights the emergent epistemological crisis in understanding cyberwarfare. It critiques existing international... Read more
Key finding: The article introduces the concept of cyber-peacekeeping as a novel mechanism to regulate state behavior and manage cyber conflicts within the UN framework. It identifies operational, legal, and logistical... Read more

3. How are cyber conflict and cybercrime transforming security dynamics in critical infrastructure and civil protection?

This theme focuses on the intersection of cyber conflict and cybercrime as they pertain to the security of national critical infrastructures and civil protection. It explores how cyber threats have evolved to target vital systems, the societal and economic impacts of these threats, and the governmental and institutional strategies developed to enhance resilience, risk reduction, and national security in the cyber age.

Key finding: This empirical study examines the impact of cybersecurity technologies, risk reduction practices, and government roles on civil protection in Greece, highlighting that cybersecurity is an essential prerequisite for protecting... Read more
Key finding: Through comparative analysis of 86 national cybersecurity strategies, this article identifies common convergence points regarding critical infrastructure protection, such as the integration of public and private stakeholders... Read more
Key finding: The updated overview documents the technological advancements—such as social media, cloud computing, IoT, and botnets—that have expanded cybercrime modalities and increased their systemic impact on critical infrastructures... Read more

All papers in Cyber Conflict

The classical theories of presidential and political power, most notably Richard Neustadt's concept of persuasion, have long shaped scholarly understanding of executive leadership. However, the 21st century presents fundamentally new... more
This appendix explains the foundations of the Third Generation in International Relations (IR3). It shows how international relations moved step by step: from IR1 (sovereignty and institutions) to IR2 (globalization), then IR2⁺ (populist... more
Ciberseguridad proactiva: de la reacción a la anticipación en un mundo cada vez más vulnerable
Este artículo analiza la reconfiguración que las tecnologías emergentes están produciendo en la relación entre organizaciones terroristas y grupos de crimen organizados en América Latina... more
Form Approved OMB No. 0704 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining... more
Cyberwarfare now poses an existential threat to national security, with adversaries exploiting digital systems to disrupt economies and undermine democratic institutions. This article analyzes the strategic gap in the United States' cyber... more
Cyberwarfare now poses an existential threat to national security, with adversaries exploiting digital systems to disrupt economies and undermine democratic institutions. This article analyzes the strategic gap in the United States' cyber... more
The emergence of the cyber domain and social media platforms has revolutionized the socio-political landscape, especially in the Middle East and the Arab countries. It provided a platform for dissent, advocacy, and communication amidst... more
Various critical infrastructure are vulnerable to cyber-attack from state and non-state actors. These infrastructures include electrical power grid, water, and transportation and communication network system. Protecting these systems from... more
The risk of cyberattacks in Armed Conflict has proven the evolving role of cyber operations in present day war inside the framework of international regulation. It delineates cyber assaults as planned movements geared toward compromising... more
Ensayo sobre el proceder de la diplomacia y decisiones políticas en una crisis internacional. El ejemplo de la Operación Fénix (Colombia/Ecuador).
As the Indian Army (IA) integrates new and emerging technologies, it will also need technical specialists for innovation and their effective application in peacetime and wartime. This analysis makes the case that the IA can create a... more
¿Qué lecciones puede extraer el Ejército Brasileño del conflicto entre Rusia y Ucrania en materia de ciberdefensa ante ataques contra infraestructuras críticas? Con la evolución del uso del ciberespacio, se ha... more
This article argues that security studies have evolved from the primary concern about states and how to prevent them from military attacks to its current diversity in which environmental, economic, human, etc., stand alongside military... more
Este ensayo explora cómo la guerra ha evolucionado desde el enfrentamiento físico tradicional hacia un conflicto multifacético que abarca el ciberespacio, la manipulación de la información y el uso de tecnologías avanzadas como la... more
During the second decade of current century, cybersecurity was consolidated as a priority issue of international security. With this framework, our objective is to identify and explain ten cyberattacks and cyberattacks that occurred in... more
for serving on my Supervisory Committee and giving advice over the last year. Thanks is also given to Dr. Ross Burkhart who I've known from the very beginning of my collegiate career and who encouraged me to pursue my master's degree. I... more
Vietnam is a key player in the ASEAN digital economy, focusing on digital integration and collaboration. The ASEAN Digital Integration Framework Action Plan 2019-2025 and the ASEAN Digital Masterplan 2025 outline... more
Los sistemas tecnológicos críticos del ciberespacio soportan servicios y operaciones que inciden agudamente en el funcionamiento regular de nuestras sociedades modernas. Además, desde décadas atrás su buena operatividad está en la mira de... more
Esta obra representa uma reflexao conjunta materializada por pesquisadores do Ipea e do Exercito com o intuito de pensar e debater a Forca Terrestre do pais. O livro sustenta-se em uma questao fundamental: quais os desafios impostos ao... more
This study explores and compares sensitive issues in China and the United States, focusing on core areas of societal, political, and cultural tension. It highlights how each country's governmental responses shape domestic policies, civil... more
The emergence of this unusual occurrence necessitated the intervention of international law, which looked for to regulate it through the prohibition or discouragement of its employment through force, as expressed in Article 4/2 of the... more
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
The paper aims to shed light the would illustrate how much Iran has developed and promoted its cyber-war capabilities. The study has reached numerous findings, most notably the fact that soon after the provision of Internet in the capital... more
The paper aims to shed light the would illustrate how much Iran has developed and promoted its cyber-war capabilities. The study has reached numerous findings, most notably the fact that soon after the provision of Internet in the capital... more
En "La adaptabilidad impuesta por la evolución de los conflictos se explora cómo la naturaleza cambiante de los conflictos contemporáneos obliga a las fuerzas armadas y a las organizaciones de seguridad a adaptarse rápidamente. Morales... more
Onion routing networks, or darknets, enable anonymous communication, protecting user privacy and attracting cybercriminals. This paper analyzes cybercrime in these networks, including drug trafficking, fraud, and hacking. The challenges... more
En el complejo y dinámico campo de la ciberseguridad global, la disuasión de los ciberataques ha emergido como un tema central de análisis y debate. Este libro, resultado de la colaboración entre 2 buenos colegas y amigos, Joseph Nye,... more
En el Ciberespacio se plantea nuevamente un escenario que remite a la historia de las naciones: se trazan líneas sobre un territorio, se pretenden soberanas y se empieza a defenderlas, o no. Esta idea resume la decisión que están tomando... more
at Madison. His last home institution was the University of Tennessee in Knoxville, where he served as dean of the College of Communications from 1991 to 2002 and continued to teach as a professor until he retired at the end of 2014. Dr.... more
Critical National Infrastructure (CNI) within Oman is becoming Inter-independent to each other, aiming to provide unified and faultless services from the perspective of economics, quality, and governance. The new structure of... more
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
La internet es una herramienta que ha facilitado el intercambio de información, obtención de productos y ampliación de los medios de comunicación por dar unos ejemplos. Sin embargo, también ha permitido la expansión de la guerra y el... more
This article describes how in recent years, Iran has joined the top ranks of the world powers in cyberspaceandhasdemonstratedtheabilitytoleveragecyberwarfareasasignificanttoolinitsarsenal... more
Cyber security is a sensitive issue that derives from recognizing the existence of some vulnerabilities within the system. The current study analyzes a number of five national cyber security strategies, with particular emphasis on the... more
Surgido de la indeterminación acerca de cómo se aplica el principio de proporcionalidad en los ciberataques en medio de un conflicto armado internacional, este capítulo examina si dicho principio es pertinente en estos nuevos escenarios... more
Profesor universitario a nivel de pregrado, especialización, maestría y doctorado en Colombia y varios países de Latinoamérica en temas como computación forense, evidencia digital, gobierno y gestión de la seguridad de la información,... more
Cybersecurity and Cyberwar-What everyone needs to know" written by P.W. Singer and Allan Friedman was issued at a time when the threats to personal and national security, determined by the uniqueness of information technology devices,... more
This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of... more
Executive Summary The last decade witnessed the highest rise in state-sponsored Cybercriminal activities, with the most recent Russian-linked SolarWinds breach that impacted most of the US governmental and non-governmental organizations,... more
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries... more
In the 21stcentury, cyber attacks are one of the biggest threats to international peace. The aim of this paper are to compare responses of different governments in this case Australia, People's Republic of China and India. Literature... more
La importancia del desarrollo de las funciones operacionales contra el crimen organizado en los espacios marítimos jurisdiccionales y de interés RESUMEN
Download research papers for free!