6,223
Views
21
CrossRef citations to date
0
Altmetric
Original Articles

US cyber deterrence: Practice guiding theory

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (9)

. (2024) From the editors. Journal of Strategic Studies 47:1, pages 1-4.
Read now
Daniel Arce. (2023) Cybersecurity For Defense Economists. Defence and Peace Economics 34:6, pages 705-725.
Read now
. (2023) From the editors. Journal of Strategic Studies 46:3, pages 497-501.
Read now
Sico van der Meer. (2022) Responding to large-scale cyberattacks: a toolbox for policymakers. Journal of Cyber Policy 7:2, pages 175-193.
Read now
Matus Halas. (2022) NATO’s sub-conventional deterrence: The case of Russian violations of the Estonian airspace. Contemporary Security Policy 43:2, pages 350-381.
Read now
Vladimir Rauta & Sean Monaghan. (2021) Global Britain in the grey zone: Between stagecraft and statecraft. Contemporary Security Policy 42:4, pages 475-497.
Read now
Mark Bryan F. Manantan. (2021) Advancing cyber diplomacy in the Asia Pacific: Japan and Australia. Australian Journal of International Affairs 75:4, pages 432-459.
Read now
Myriam Dunn Cavelty & Andreas Wenger. (2020) Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy 41:1, pages 5-32.
Read now

Articles from other publishers (12)

Milos Vukelic. (2024) Characteristics of cyberspace as a distinct domain of conflict: A case study of U.S. strategic operations. Medjunarodni problemi International problems 76:1, pages 55-86.
Crossref
Olufunsho I. Falowo & Jacques Bou Abdo. (2024) 2019–2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques. IEEE Access 12, pages 26759-26772.
Crossref
Calvin Nobles. 2023. Real-World Solutions for Diversity, Strategic Change, and Organizational Development. Real-World Solutions for Diversity, Strategic Change, and Organizational Development 1 25 .
James Johnson. (2023) Post-9/11 US thinking and approaches to nuclear deterrence: the Bush Doctrine and the role of nuclear weapons in US deterrence strategy. International Politics.
Crossref
Amir Lupovici. (2023) Deterrence through Inflicting Costs: Between Deterrence by Punishment and Deterrence by Denial. International Studies Review 25:3.
Crossref
Amir Lupovici. (2022) Ontological security, cyber technology, and states’ responses. European Journal of International Relations 29:1, pages 153-178.
Crossref
Amir Lupovici. (2021) The Dog That Did Not Bark, the Dog That Did Bark, and the Dog That Should Have Barked: A Methodology for Cyber Deterrence Research. International Studies Review 23:4, pages 1672-1698.
Crossref
Jithesh Arayankalam & Satish Krishnan. (2021) Relating foreign disinformation through social media, domestic online media fractionalization, government's control over cyberspace, and social media-induced offline violence: Insights from the agenda-building theoretical perspective. Technological Forecasting and Social Change 166, pages 120661.
Crossref
Tim Sweijs & Samuel Zilincik. 2021. NL ARMS Netherlands Annual Review of Military Studies 2020. NL ARMS Netherlands Annual Review of Military Studies 2020 129 158 .
Alex Wilner & Casey Babb. 2021. NL ARMS Netherlands Annual Review of Military Studies 2020. NL ARMS Netherlands Annual Review of Military Studies 2020 401 417 .
Christopher Whyte. (2020) Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online. European Journal of International Security 5:2, pages 195-214.
Crossref
Samuel Žilinčík. (2019) Public attribution as a regulator of emotion. Revista Científica General José María Córdova 17:28, pages 869-889.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.