Jump to ContentJump to Main Navigation
Cyber War versus Cyber RealitiesCyber Conflict in the International System$
Users without a subscription are not able to see the full content.

Brandon Valeriano and Ryan C. Maness

Print publication date: 2015

Print ISBN-13: 9780190204792

Published to Oxford Scholarship Online: May 2015

DOI: 10.1093/acprof:oso/9780190204792.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2017. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see http://www.oxfordscholarship.com/page/privacy-policy).date: 19 November 2017

Theories of Cyber Conflict

Theories of Cyber Conflict

Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era

Chapter:
(p.45) Chapter 3 Theories of Cyber Conflict
Source:
Cyber War versus Cyber Realities
Author(s):

Brandon Valeriano

Ryan C. Maness

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190204792.003.0003

This chapter will introduce a theory of cyber conflict centered on the concepts of restraint, regionalism, espionage, and state-sponsored terrorism. Though one expects to find that fears of retaliation dominate state thinking in cyber relations, states are not prone to use the tactic for fear of the consequences or blowback from the action. The chapter also suggests that regionalism dominates in cyber relations. Espionage is expected in cyberspace because it is an easier forum for states to steal information and documents from adversaries than traditional “boots on the ground” tactics. Less powerful states will also utilize cyber espionage to project power on the status quo states. Finally, cyber state terrorism is expected, but its impact will be minimal and will not change relations between rival states. These theories defy conventional wisdom but accurately explain the actual use of the tactics.

Keywords:   restraint, regionalism, espionage, terrorism, cyber conflict

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .