13,856
Views
82
CrossRef citations to date
0
Altmetric
Original Articles

Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War

Pages 401-428 | Published online: 15 May 2012

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (28)

Max Smeets. (2023) The challenges of military adaptation to the cyber domain: a case study of the Netherlands. Small Wars & Insurgencies 34:7, pages 1343-1362.
Read now
Samuel Zilincik & Isabelle Duyvesteyn. (2023) Strategic studies and cyber warfare. Journal of Strategic Studies 46:4, pages 836-857.
Read now
Florian J. Egloff & Max Smeets. (2023) Publicly attributing cyber attacks: a framework. Journal of Strategic Studies 46:3, pages 502-533.
Read now
Sally K. Burt. (2023) President Obama and China: cyber diplomacy and strategy for a new era. Journal of Cyber Policy 8:1, pages 48-66.
Read now
. (2022) From the editors. Journal of Strategic Studies 45:4, pages 507-510.
Read now
Richard J. Harknett & Max Smeets. (2022) Cyber campaigns and strategic outcomes. Journal of Strategic Studies 45:4, pages 534-567.
Read now
Bryan James Nakayama. (2022) Information vs the cyberspace domain. Journal of Cyber Policy 7:2, pages 213-229.
Read now
Ryan Shandler, Michael L. Gross & Daphna Canetti. (2021) A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel. Contemporary Security Policy 42:2, pages 135-162.
Read now
Miguel Alberto Gomez. (2021) Overcoming uncertainty in cyberspace: strategic culture and cognitive schemas. Defence Studies 21:1, pages 25-46.
Read now
Andrea Calderaro & Anthony J. S. Craig. (2020) Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third World Quarterly 41:6, pages 917-938.
Read now
Eugenio Lilli. (2020) President Obama and US cyber security policy. Journal of Cyber Policy 5:2, pages 265-284.
Read now
Myriam Dunn Cavelty & Andreas Wenger. (2020) Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy 41:1, pages 5-32.
Read now
Christian Leuprecht, Joseph Szeman & David B. Skillicorn. (2019) The Damoclean sword of offensive cyber: Policy uncertainty and collective insecurity. Contemporary Security Policy 40:3, pages 382-407.
Read now
Samuel Zilincik, Michael Myklin & Petr Kovanda. (2019) Cyber power and control: a perspective from strategic theory. Journal of Cyber Policy 4:2, pages 290-301.
Read now
Myriam Dunn Cavelty. (2019) The materiality of cyberthreats: securitization logics in popular visual culture. Critical Studies on Security 7:2, pages 138-151.
Read now
Kersti Larsdotter. (2019) Military strategy in the 21st century. Journal of Strategic Studies 42:2, pages 155-170.
Read now
Travis Sharp. (2017) Theorizing cyber coercion: The 2014 North Korean operation against Sony. Journal of Strategic Studies 40:7, pages 898-926.
Read now
Jeppe Teglskov Jacobsen & Jens Ringsmose. (2017) Cyber-bombing ISIS: why disclose what is better kept secret?. Global Affairs 3:2, pages 125-137.
Read now
. (2017) From the Editors:. Journal of Strategic Studies 40:1-2, pages 1-5.
Read now
Barney Warf & Emily Fekete. (2016) Relational geographies of cyberterrorism and cyberwar. Space and Polity 20:2, pages 143-157.
Read now
R. Guy Emerson. (2016) Limits to a cyber-threat. Contemporary Politics 22:2, pages 178-196.
Read now
Francis C. Domingo. (2015) Cyber War Versus Cyber Realities: Cyber Conflict in the International System by Brandon Valeriano and Ryan C. Maness. Journal of Information Technology & Politics 12:4, pages 399-401.
Read now
. (2015) From the Editors. Journal of Strategic Studies 38:1-2, pages 1-3.
Read now
. (2013) From the Editors. Journal of Strategic Studies 36:1, pages 1-3.
Read now
TimothyJ. Junio. (2013) How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate. Journal of Strategic Studies 36:1, pages 125-133.
Read now
AdamP. Liff. (2013) The Proliferation of Cyberwarfare Capabilities and Interstate War, Redux: Liff Responds to Junio. Journal of Strategic Studies 36:1, pages 134-138.
Read now

Articles from other publishers (54)

Ori Swed, Sachith Dassanayaka & Dimitri Volchenkov. (2024) Keeping it authentic: the social footprint of the trolls’ network. Social Network Analysis and Mining 14:1.
Crossref
Nadiya Kostyuk & Erik Gartzke. (2023) Fighting in Cyberspace: Internet Access and the Substitutability of Cyber and Military Operations. Journal of Conflict Resolution 68:1, pages 80-107.
Crossref
Gil Baram. (2023) Public Secrets: The Dynamics of Publicity and Secrecy in Offensive Cyber Operations. Journal of Global Security Studies 8:3.
Crossref
Tianjiao Jiang. (2022) The Shift of China’s Strategic Thinking on Cyberwarfare Since the 1990s. Journal of Chinese Political Science 28:1, pages 127-149.
Crossref
Liudmyla Kormych & Yuliia Zavhorodnia. (2023) The concept of modern political confrontation in cyber space. Journal of Cybersecurity 9:1.
Crossref
Kerstin Zettl. (2021) Macht im Cyberspace: Eine Übersicht der bisherigen Forschung und künftiger Perspektiven anhand des Proxy-Konzepts“Power in cyberspace: a review of previous research and future perspectives using the proxy concept.”. Zeitschrift für Friedens- und Konfliktforschung 11:1, pages 65-90.
Crossref
Fabio Massacci & Silvia Vidor. (2022) Building Principles for Lawful Cyber Lethal Autonomous Weapons. IEEE Security & Privacy 20:2, pages 101-106.
Crossref
Miguel Alberto Gomez & Christopher Whyte. (2022) Unpacking strategic behavior in cyberspace: a schema-driven approach. Journal of Cybersecurity 8:1.
Crossref
Sugandha Sharma, Rakesh Kumar, Amit Jain, Bharat Agarwal & Sujay Kumar Suman. (2021) Intensifying Practical Based Learning of Penetration Testing using CTF. Intensifying Practical Based Learning of Penetration Testing using CTF.
Miguel Alberto Gomez & Christopher Whyte. (2021) Breaking the Myth of Cyber Doom: Securitization and Normalization of Novel Threats. International Studies Quarterly 65:4, pages 1137-1150.
Crossref
Joseph M. Brown & Tanisha M. Fazal. (2021) #SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations. European Journal of International Security 6:4, pages 401-417.
Crossref
Lucas Kello. (2021) Cyber legalism: why it fails and what to do about it. Journal of Cybersecurity 7:1.
Crossref
Stefan Soesanto & Max Smeets. 2021. NL ARMS Netherlands Annual Review of Military Studies 2020. NL ARMS Netherlands Annual Review of Military Studies 2020 385 400 .
Alexander L. Fretz, Jose J. Padilla & Erika F. Frydenlund. 2021. Social, Cultural, and Behavioral Modeling. Social, Cultural, and Behavioral Modeling 174 183 .
Ido Sivan-Sevilla & Shani Sharvit. 2021. Regulation in Israel. Regulation in Israel 173 193 .
PAVEL VUK. (2020) CHALLENGES TO MILITARY STRATEGY IN THE 21ST CENTURY. CONTEMPORARY MILITARY CHALLENGES:Volume 2020, issue 22/1.
Crossref
Christopher Whyte. (2020) Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online. European Journal of International Security 5:2, pages 195-214.
Crossref
Michael C. Horowitz. (2020) Do Emerging Military Technologies Matter for International Politics?. Annual Review of Political Science 23:1, pages 385-400.
Crossref
Christopher J. Coyne. 2020. Defense, Peace, and War Economics. Defense, Peace, and War Economics.
Florian J Egloff. (2020) Public attribution of cyber intrusions. Journal of Cybersecurity 6:1.
Crossref
Siim Alatalu. 2020. Redesigning Organizations. Redesigning Organizations 27 43 .
Germán Alejandro Patiño Orozco. (2019) El sistema internacional cibernético: elementos de análisis. OASIS:30, pages 163-186.
Crossref
Miguel Alberto N. Gomez. (2019) Sound the alarm! Updating beliefs and degradative cyber operations. European Journal of International Security 4:2, pages 190-208.
Crossref
Yavuz Akdag. (2018) The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective. Journal of Chinese Political Science 24:2, pages 225-247.
Crossref
Nadiya Kostyuk & Yuri M. Zhukov. (2017) Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?. Journal of Conflict Resolution 63:2, pages 317-347.
Crossref
Miguel Alberto Gomez. (2019) Past behavior and future judgements: seizing and freezing in response to cyber operations. Journal of Cybersecurity 5:1.
Crossref
Michael Poznansky & Evan Perkoski. (2018) Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution. Journal of Global Security Studies 3:4, pages 402-416.
Crossref
Christopher Whyte. (2018) Dissecting the Digital World: A Review of the Construction and Constitution of Cyber Conflict Research. International Studies Review 20:3, pages 520-532.
Crossref
Jon Randall Lindsay. (2017) Restrained by design: the political economy of cybersecurity. Digital Policy, Regulation and Governance 19:6, pages 493-514.
Crossref
Daniel Ventre. 2017. Guerre, armées et communication. Guerre, armées et communication 147 166 .
Rebecca Slayton. (2017) What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment. International Security 41:3, pages 72-109.
Crossref
Daniel Hughes & Andrew Colarik. 2017. Intelligence and Security Informatics. Intelligence and Security Informatics 15 33 .
Markus Christen & Endre Bangerter. 2017. The Nature of Peace and the Morality of Armed Conflict. The Nature of Peace and the Morality of Armed Conflict 243 263 .
Anthimos Alexandros TsirigotisAnthimos Alexandros Tsirigotis. 2017. Cybernetics, Warfare and Discourse. Cybernetics, Warfare and Discourse 11 44 .
Anthony Craig & Brandon Valeriano. (2016) Conceptualising cyber arms races. Conceptualising cyber arms races.
David Ormrod, Benjamin Turnbull & Kent O'Sullivan. (2015) System of systems cyber effects simulation ontology. System of systems cyber effects simulation ontology.
Jon R. Lindsay. (2015) Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, pages tyv003.
Crossref
Byoung Won Min. (2015) International Politics of Cyberattacks and Cyberdeterrence: A Study of Their Regulations and New Paradigms. National Strategy 21:3, pages 37-62.
Crossref
Barney Warf. (2015) Cyberwar: A new frontier for political geography. Political Geography 46, pages 89-90.
Crossref
Alan Chong. 2015. Cybersecurity Policies and Strategies for Cyberwarfare Prevention. Cybersecurity Policies and Strategies for Cyberwarfare Prevention 383 396 .
Jon R. Lindsay. (2015) The Impact of China on Cybersecurity: Fiction and Friction. International Security 39:3, pages 7-47.
Crossref
Brian M. Mazanec & Bradley A. ThayerBrian M. Mazanec & Bradley A. Thayer. 2015. Deterring Cyber Warfare. Deterring Cyber Warfare 11 28 .
Lior Tabansky & Isaac Ben IsraelLior Tabansky & Isaac Ben Israel. 2015. Cybersecurity in Israel. Cybersecurity in Israel 63 69 .
Jon R. LindsayLucas Kello. (2014) Correspondence: A Cyber Disagreement. International Security 39:2, pages 181-192.
Crossref
David Ormrod. (2014) The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface. The Coordination of Cyber and Kinetic Deception for Operational Effect: Attacking the C4ISR Interface.
Amir Lupovici. (2014) The “Attribution Problem” and the Social Construction of “Violence”: Taking Cyber Deterrence Literature a Step Forward. International Studies Perspectives, pages n/a-n/a.
Crossref
David G. A. Ormrod. (2014) A ‘wicked problem’ — Predicting sos behaviour in tactical land combat with compromised C4ISR. A ‘wicked problem’ — Predicting sos behaviour in tactical land combat with compromised C4ISR.
Jeffrey S. Caso. (2014) The rules of engagement for cyber-warfare and the Tallinn Manual: A case study. The rules of engagement for cyber-warfare and the Tallinn Manual: A case study.
Nikitas Nikitakos & Panos Mavropoulos. 2014. Cyber-Development, Cyber-Democracy and Cyber-Defense. Cyber-Development, Cyber-Democracy and Cyber-Defense 259 277 .
Lucas Kello. (2013) The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security 38:2, pages 7-40.
Crossref
. (2013) Bibliography—Editors’ selection of current world literature. Current Orthopaedic Practice 24:2, pages i-iii.
Crossref
Gil Baram, Daniel Cohen, Zeev Shapira, Omree Wechsler, Nir Hight & Isaac Ben-Israel. (2018) Review: 2017 Strategic Trends in the Global Cyber Conflict. SSRN Electronic Journal.
Crossref
Michael Poznansky & Evan Perkoski. (2016) Clandestine or Covert? Rethinking Secrecy in Cyberspace. SSRN Electronic Journal.
Crossref
Trey Herr. (2013) PrEP: A Framework for Malware and Cyber Weapons. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.