You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book challenges the conventional wisdom-one that has long been asserted by policymakers and cyber experts alike-that cyberspace is a dangerous environment prone to escalation. Rather than triggering increasingly severe patterns of violence, the evidence shows that cyber actions and responses generally follow a proportionate, tit-for-tat dynamic. Therefore, this book offers a theoretical framework that draws on core conceptions in security studies and extends their logic to the cyber domain to explain the general absence of cyber escalation. In doing so, it draws on central characteristics of cyber operations that the authors argue mitigate pathways to escalation and dampen the potentia...
To what extent do cyberspace operations increase the risks of escalation between nation-state rivals? Scholars and practitioners have been concerned about cyber escalation for decades, but the question remains hotly debated. The issue is increasingly important for international politics as more states develop and employ offensive cyber capabilities, and as the international system is increasingly characterized by emergent multipolarity. In Escalation Dynamics in Cyberspace, Erica D. Lonergan and Shawn W. Lonergan tackle this question head-on, presenting a comprehensive theory that explains the conditions under which cyber operations may lead to escalation. In doing so, they challenge long-he...
This Research Handbook provides a rigorous analysis of cyberwarfare, a widely misunderstood field of contemporary conflict and geopolitical competition. Gathering insights from leading scholars and practitioners, it examines the actors involved in cyberwarfare, their objectives and strategies, and scrutinises the impact of cyberwarfare in a world dependent on connectivity.
How and why China has pursued information-age weapons to gain leverage against its adversaries How can states use military force to achieve their political aims without triggering a catastrophic nuclear war? Among the states facing this dilemma of fighting limited wars, only China has given information-age weapons such a prominent role. While other countries have preferred the traditional options of threatening to use nuclear weapons or fielding capabilities for decisive conventional military victories, China has instead chosen to rely on offensive cyber operations, counterspace capabilities, and precision conventional missiles to coerce its adversaries. In Under the Nuclear Shadow, Fiona Cu...
Survival, the IISS’s bimonthly journal, challenges conventional wisdom and brings fresh, often controversial, perspectives on strategic issues of the moment. In this issue: • Benjamin Rhode examines the threat of Europe’s security guarantor of the past 80 years stepping back • Ellen Laipson and Douglas Ollivant explore how the Gaza war has threatened Iraq’s balancing act between the US and Iran • Nigel Gould-Davies cautions that, despite the West’s economic superiority over Russia, it is starting to look like the balance of resolve in the Ukraine war favours Russia • Dana H. Allin and Jonathan Stevenson examine the mystery of why new aid for Ukraine is blocked in the US Congress in spite of bipartisan support • And eight more thought-provoking pieces, as well as our regular Book Reviews and Noteworthy column. Editor: Dr Dana Allin Managing Editor: Jonathan Stevenson Associate Editor: Carolyn West Editorial Assistant: Conor Hodges
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. How much should we worry about cyber threats and their impact on our lives, society and international affairs? Are these security concerns real, exaggerated or just poorly understood? In this fully revised and updated second edition of their popular text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity today. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they...
Cyberspace has become the ultimate frontier and central issue of international conflict, geopolitical competition, and security. Emerging threats and technologies continuously challenge the prospect of an open, secure, and free cyberspace. Additionally, the rising influence of technology on society and culture increasingly pushes international diplomacy to establish responsible state behavior in cyberspace and internet governance against the backdrop of fragmentation and polarization. In this context, novel normative practices and actors are emerging both inside and outside the conventional sites of international diplomacy and global governance. In Hybridity, Conflict, and the Global Politic...
If you take an interest in military and national security affairs, you have probably read the works of Clausewitz, Sun Tzu, and Thucydides. But what about the books of the underappreciated military strategist Theodor Geisel, also known as Dr. Seuss? Until Dr. Seuss & National Security, the military aspect of Ted Geisel’s biography and his books have been overlooked by scholars and critics alike. Yet Dr. Seuss books possess direct relevance to national security in part because Ted Geisel’s service in the the US Army during WWII made a lasting impact on his worldview. Numerous traces of Ted Geisel’s intense and dangerous wartime experiences can be found in his children’s books. Tucked ...
Rethinking Cyber Warfare provides a fresh understanding of the role that digital disruption plays in contemporary international security and proposes a new approach to more effectively restrain and manage cyberattacks.