1,783
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Cyber power and cyber effectiveness: An analytic framework

Pages 426-436 | Published online: 30 Nov 2017
 

ABSTRACT

This article proposes a theoretical framework to evaluate a state's potential cyber power and cyber effectiveness. It identifies the domestic and structural variables that contribute to potential cyber power, and the attributes associated with cyber effectiveness. Translating potential cyber power into cyber effectiveness is done through technical, tactical, operational, and strategic means. Effectiveness is worthwhile only in comparison to other target states. Finally, future research questions are proposed.

Notes

1. Allan. R. Millett, Williamson Murray, and Kenneth H. Watman, “The Effectiveness of Military Organizations,” International Security 11, no. 1 (1986): 37.

2. The article is limited to consideration of a state's cyber power. While it recognizes that non-state actors, such as terrorist organizations, corporations, activist groups, and individuals act in cyberspace, that consideration is beyond this article's scope.

3. Millett et al., “The Effectiveness of Military Organizations,” 37.

4. Stephen Biddle, Military Power: Explaining Victory and Defeat in Modern Battle (Princeton: Princeton University Press, 2004), 7.

5. Risa A. Brooks, “The Impact of Culture, Society, Institutions, and International Forces of Military Effectiveness,” in Creating Military Power: The Sources of Military Effectiveness, edited by Risa A. Brooks and Elizabeth A. Stanley (Stanford: Stanford University Press, 2007), 1.

6. Colin S. Gray, Making Sense of Cyber Power: Why the Sky Is Not Falling (Carlisle, PA: Strategic Studies Institute, 2013), 9.

7. Daniel T. Kuehl, “From Cyberspace to Cyberpower: Defining the Problem,” in Cyberpower and National Security, edited by Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz (Washington, DC: Potomac Books, 2009), 38.

8. John B. Sheldon, “Deciphering Cyberpower: Strategic Purpose in Peace and War,” Journal of Strategic Studies (Summer 2011): 95, http://www.au.af.mil/au/ssq/2011/summer/sheldon.pdf.

9. Cybersecurity Capacity Portal, “Providing an Evidence-Based Framework,” Oxford University, https://www.sbs.ox.ac.uk/cybersecurity-capacity/explore/capacity_dimensions.

10. Curtis J. Milhaupt and Wentong Zheng, “Beyond Ownership: State Capitalism and the Chinese Firm,” Georgetown Law Journal 103, no. 665 (2015), http://scholarship.law.ufl.edu/facultypub/696.

11. Emily O. Goldman, “Military Diffusion and Transformation,” in The Information Revolution in Military Affairs in Asia, edited by Emily O. Goldman and Thomas G. Mahnken (New York: Palgrave MacMillan, 2004), 1–21.

12. Brooks, “The Impact of Culture.”

13. Millett et al., “The Effectiveness.”

Additional information

Notes on contributors

Robert “Jake” Bebber

LCDR Robert “Jake” Bebber USN ([email protected]) is a cryptologic warfare officer. He was assigned to U.S. Cyber Command from 2013–2017. The views expressed here do not represent those of the Department of Defense, Department of the Navy, or U.S. Cyber Command.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 264.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.