Jump to ContentJump to Main Navigation
Cross-Domain DeterrenceStrategy in an Era of Complexity$
Users without a subscription are not able to see the full content.

Eric Gartzke and Jon R. Lindsay

Print publication date: 2019

Print ISBN-13: 9780190908645

Published to Oxford Scholarship Online: July 2019

DOI: 10.1093/oso/9780190908645.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 29 February 2020

Deterrence in and through Cyberspace

Deterrence in and through Cyberspace

Chapter:
(p.95) 5 Deterrence in and through Cyberspace
Source:
Cross-Domain Deterrence
Author(s):

Jacquelyn G. Schneider

Publisher:
Oxford University Press
DOI:10.1093/oso/9780190908645.003.0005

Most of the discussion of cyber deterrence has been plagued by ambiguity and a lack of precedent, and this imprecision has resulted in vague or partially implemented policies. This chapter reviews debates about the definition of cyber operations and cyber deterrence, distinguishing the use of cyberspace to support deterrence in other domains and the deterrence of actions in cyberspace itself. The author finds that uncertainty is a resounding theme in this literature, which poses both challenges and opportunities for cross-domain deterrence. Cyber-enabled military capabilities might both bolster U.S. deterrence policies and incentivize attack. In cyber as well as in space, the United States confronts a difficult paradox of capability and vulnerability.

Keywords:   cyberspace, cyber warfare, cyber deterrence, cyber operations, cyber exploitation, deterrence, cross-domain deterrence

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .