7,802
Views
25
CrossRef citations to date
0
Altmetric
Cyber Roundtable

How Probable is Cyber War? Bringing IR Theory Back In to the Cyber Conflict Debate

Pages 125-133 | Received 09 Oct 2012, Accepted 10 Oct 2012, Published online: 06 Feb 2013
 

Abstract

Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.

Acknowledgements

The author thanks Alex Weisiger, Jake Shapiro, Tom Mahnken, Joe Lin, and John Stevenson for their thoughts on earlier drafts.

Notes

1Thomas Rid, ‘Cyber War Will Not Take Place’, Journal of Strategic Studies 35/1 (Feb. 2012), 5–32; Adam Liff, ‘Cyberwar: A New “Absolute Weapon”? The Proliferation of Cyberwarfare Capabilities and Interstate War’, Journal of Strategic Studies 35/3 (June 2012), 401–28.

2Rid, ‘Cyber War Will Not Take Place’, 9.

3Ibid.

4Ibid., 6.

5Liff, ‘Cyberwar: A New “Absolute Weapon”?, 422

6Ibid., 421.

7Jack S. Levy, ‘The Causes of War and the Conditions of Peace’, Annual Review of Political Science 1 (1998), 139–65.

8James D. Fearon, ‘Rationalist Explanations for War’, International Organization 49/3 (Summer 1995), 379–414.

9David M. Kreps, A Course in Microeconomic Theory (Princeton UP 1990).

10Scott Sagan, The Limits of Safety (Princeton UP 1995).

11Vadim Koval, ‘Russian Missile Forces Have “Safe Busting” Sledgehammer’, Rianovosti, 2012.

12Stephen Van Evera, ‘The Cult of the Offensive and the Origins of the First World War’, International Security 9/1 (1984), 58–107.

13Andrea Shalal-Esa, ‘Ex-US general urges frank talk on cyber weapons’, Reuters, 6 Nov. 2011; David E. Sanger, Confront and Conceal (New York: Crown 2012), 191–3.

14Interview, South Korean Cyber Command officers, Seoul, January 2012.

15Yuliang Yuliang Zhang, The Study of Campaigns [Zhanyi xue] (Beijing: National Defense UP 2006), quoted in Roger Cliff et al., Shaking the Heavens and Splitting the Earth (Santa Monica, CA: RAND 2011), 98.

16For an introduction to variation in civil-military relations, see Peter Feaver, Armed Servants (Cambridge, MA: Harvard UP 2003).

17‘N. Korean Ministry behind July cyber attacks: spy chief’, Yonhap News Agency, 30 Oct. 2009; Kim Sue-Young, ‘Spy chief says cyber attacks work of N Korea’, Korea Times, 30 Oct. 2009.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 329.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.