Jump to ContentJump to Main Navigation
The Cybersecurity DilemmaHacking, Trust and Fear Between Nations$
Users without a subscription are not able to see the full content.

Ben Buchanan

Print publication date: 2017

Print ISBN-13: 9780190665012

Published to Oxford Scholarship Online: June 2017

DOI: 10.1093/acprof:oso/9780190665012.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see www.oxfordscholarship.com/page/privacy-policy).date: 18 November 2018

Limitations, Objections, and the Future of the Cybersecurity Dilemma

Limitations, Objections, and the Future of the Cybersecurity Dilemma

Chapter:
(p.141) 7 Limitations, Objections, and the Future of the Cybersecurity Dilemma
Source:
The Cybersecurity Dilemma
Author(s):

Ben Buchanan

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190665012.003.0008

This chapter considers three counterarguments to the cybersecurity dilemma logic. It shows that even if the cybersecurity threat does not pose an existential risk, it is vitally important and can animate the security dilemma. It shows that regardless of one’s views on attributing cyber attacks—many believe that attribution is difficult or impossible—the cybersecurity dilemma is likely to be a problem. It lastly shows that even though cyber weapons are different from kinetic ones, convergence is likely and the cybersecurity dilemma is still significant, and will likely grow in significance.

Keywords:   Cybersecurity dilemma, Attribution, Kinetic weapons, Existential risk

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .