1,101
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

How cyberspace affects international relations: The promise of structural modifiers

ORCID Icon & ORCID Icon

References list

  • Adams, J. (2001). Virtual defense. Foreign Affairs, 80(3), 98–112. doi:10.2307/20050154
  • Areng, L. (2014). Lilliputian states in digital affairs and cyber security. NATO Cooperative Cyber Defence Centre of Excellence Tallinn.
  • Arquilla, J. (2021). Blitskrieg: The new challenge of cyberwarfare. Polity Press.
  • Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming!. Comparative Strategy, 12(2), 141–165. doi:10.1080/01495939308402915
  • Baldwin, D. A. (1999). The sanctions debate and the logic of choice. International Security, 24(3), 80–107. doi:10.1162/016228899560248
  • Blunden, B., & Cheung, V. (2014). Behold a pale farce: Cyberwar, threat inflation, & the malware industrial complex. Walterville, OR: Trine Day.
  • Borghard, E. D., & Lonergan, S. W. (2017). The logic of coercion in cyberspace. Security Studies, 26(3), 452–481. doi:10.1080/09636412.2017.1306396
  • Brantley, A. F. (2018). The cyber deterrence problem. 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.
  • Buchanan, B. (2016). The cybersecurity dilemma: Hacking, trust, and fear between nations. C. Hurst & Co.
  • Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics (2022, Fourth printing ed.). Harvard University Press.
  • Burton, J. (2013). Small states and cyber security. Political Science, 65(2), 216–238. doi:10.1177/0032318713508491
  • Buzan, B., Jones, C., & Little, R. (1993). The logic of anarchy: Neorealism to structural realism. Columbia University Press.
  • Buzan, B., & Little, R. (1996). Reconceptualizing anarchy: Structural realism meets world history. European Journal of International Relations, 2(4), 403–438. doi:10.1177/1354066196002004001
  • Choucri, N., & Clark, D. D. (2019). International relations in the cyber age: The co-evolution dilemma. The MIT Press.
  • Christensen, T. J., & Snyder, J. (1990). Chain gangs and passed bucks: Predicting alliance patterns in multipolarity. International Organization, 44(2), 137–168. doi:10.1017/S0020818300035232
  • Cyberspace Solarium Commission. (2022). Cyberspace solarium commission report. https://www.solarium.gov/report
  • Danielson, A., & Hedling, E. (2022). Visual diplomacy in virtual summitry: Status signalling during the coronavirus crisis. Review of International Studies, 48(2), 243–261. doi:10.1017/S0260210521000607
  • Devanny, J., Goldoni, L. R. F., & Medeiros, B. P. (2022). Strategy in an uncertain domain: Threat and response in cyberspace. Journal of Strategic Security, 15(2), 34–47. doi:10.5038/1944-0472.15.2.1954
  • Donnelly, J. (2023). Systems, relations, and the structures of international societies. Cambridge University Press.
  • Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105–122. doi:10.1111/misr.12023
  • Dunn Cavelty, M. (2018). Aligning security needs for order in cyberspace. In H. W. Maull (Ed.), The rise and decline of the post-cold War international order (Vol. 2018 (2018 ed, pp. 104–122). Oxford University Press.
  • Dunn Cavelty, M. (2020). Book review: International relations in the cyber age: The co-evolution dilemma. Perspectives on Politics, 18(2), 692–693. doi:10.1017/S1537592720000560
  • Dyer-Witheford, N., & Matviyenko, S. (2019). Cyberwar and revolution: Digital subterfuge in global capitalism. University of Minnesota Press.
  • Egloff, F. J., & Dunn Cavelty, M. (2021). Attribution and knowledge creation assemblages in cybersecurity politics. Journal of Cybersecurity, 7(1), 1–12. doi:10.1093/cybsec/tyab002
  • Fischerkeller, M. P., Goldman, E. O., & Harknett, R. J. (2022). Cyber persistence theory: Redefining national security in cyberspace. Oxford University Press.
  • Foulon, M. (2015). Neoclassical realism: Challengers and bridging identities. International Studies Review, 17(4), 635–661.
  • Foulon, M. (2023). Interdependence and overall US-China rivalry. In B. G. Carlson & O. Thränert (Eds.), US-China Interdependence: Implications for Switzerland (pp. 1–17). Center for Security Studies, ETH Zurich.
  • Foulon, M., & Meibauer, G. (2020). Realist avenues to global international relations. European Journal of International Relations, 26(4), 1203–1229. doi:10.1177/1354066120926706
  • Foulon, M., Thompson, J., Breslin, S., Posen, B. R., Smeets, M., Sus, M., Fiott, D., Carlson, B. G., Palm, T., van Hooft, P., Larsen, H., Criekemans, D., & Biscop, S. (2021). The future of European strategy in a changing geopolitical environment: Challenges and prospects. December 2021. https://hcss.nl/wp-content/uploads/2021/12/HCSS-Forum-European-Strategy-Dec.-2021-V1.pdf
  • Freilich, C. D., Cohen, M. S., & Siboni, G. (2023). Israel and the cyber threat: How the startup nation became a global cyber power. Oxford University Press.
  • Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, 38(2), 41–73. doi:10.1162/ISEC_a_00136
  • Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: Offense, defense,and deception in cyberspace. Security Studies, 24(2), 316–348. doi:10.1080/09636412.2015.1038188
  • Gartzke, E., & Lindsay, J. R. (2024). Elements of deterrence. Oxford University Press.
  • Gilli, A., & Gilli, M. (2019). Why China has not caught up yet: Military-technological superiority and the limits of imitation, reverse engineering, and cyber espionage. International Security, 43(3), 141–189. doi:10.1162/isec_a_00337
  • Gilpin, R. (1981). War and change in world politics (Reprint 2002 ed.). Cambridge University Press.
  • Harknett, R. J., & Smeets, M. (2022). Cyber campaigns and strategic outcomes. Journal of Strategic Studies, 45(4), 534–567. doi:10.1080/01402390.2020.1732354
  • Hedling, E., & Bremberg, N. (2021). Practice approaches to the digital transformations of diplomacy: Toward a New research agenda. International Studies Review, 23(4), 1595–1618. doi:10.1093/isr/viab027
  • Herbert, L. (2019). The existential threat from cyber-enabled information warfare. Bulletin of the Atomic Scientists, 75(4), 187–196. doi:10.1080/00963402.2019.1629574
  • Huth, P. K. (1999). Deterrence and international conflict: Empirical findings and theoretical debates. Annual Review of Political Science, 2(1), 25–48. doi:10.1146/annurev.polisci.2.1.25
  • Jervis, R. (1978). Cooperation under the security dilemma. World Politics, 30(2), 167–214. doi:10.2307/2009958
  • Joint Chiefs of Staff. (2013). Cyberspace Operations (Joint Publication 3-12). https://irp.fas.org/doddir/dod/jp3_12.pdf
  • Jordan, T. (1999). Cyberpower: The culture and politics of cuberspace and the internet (2003 ed.). Routledge.
  • Junio, T. J. (2013). How probable is cyber War? Bringing IR theory back in to the cyber conflict debate. Journal of Strategic Studies, 36(1), 125–133. doi:10.1080/01402390.2012.739561
  • Kello, L. (2017). The virtual weapon and international order. Yale University Press.
  • Kello, L. (2022). Striking back: The end of peace in cyberspace - And how to restore it. Yale University Press.
  • Klimburg, A. (2011). Mobilising cyber power. Survival: Global Politics and Strategy, 53(1), 41–60.
  • Kostyuk, N. (2021). Deterrence in the cyber realm: Public versus private cyber capacity. International Studies Quarterly, 65(4), 1151–1162. doi:10.1093/isq/sqab039
  • Kreps, S., & Schneider, J. (2019). Escalation firebreaks in the cyber, conventional, and nuclear domains: Moving beyond effects-based logics. Journal of Cybersecurity, 5(1), 1–11. doi:10.1093/cybsec/tyz007
  • Lake, D. A. (2009). Hierarchy in international relations. Cornell University Press.
  • Libicki, M. C. (2007). Conquest in cyberspace: National security and information warfare. Cambridge University Press.
  • Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. RAND.
  • Liff, A. P. (2012). Cyberwar: A new ‘absolute weapon’? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 35(3), 401–428. doi:10.1080/01402390.2012.663252
  • Lindsay, J. R. (2020). Information technology and military power. Cornell University Press.
  • Lindsay, J. R., & Gartzke, E. (2018). Coercion through cyberspace: The stability-instability paradox revisited. In K. M. Greenhill & P. Krause (Eds.), The power to hurt: Coercion in theory and in practice (Vol. 2018, pp. 179–203). Oxford University Press.
  • Lobell, S. E. (2017). Structural realism/offensive and defensive realism. Oxford Research Encyclopedia of Politics.
  • Lobell, S. E. (2018). A granular theory of balancing. International Studies Quarterly, 62(3), 593–605. doi:10.1093/isq/sqy011
  • Lonergan, E., & Montgomery, M. (2021). What is the future of cyber deterrence? SAIS Review of International Affairs, 41(2), 61–73. doi:10.1353/sais.2021.0018
  • Lonergan, E. D., & Schneider, J. (2023). The power of beliefs in US cyber strategy: The evolving role of deterrence, norms, and escalation. Journal of Cybersecurity, 9(1), 1–10.
  • Mallett, E., & Juneau, T. (2023). A neoclassical realist theory of overbalancing. Global Studies Quarterly, 3(2), 1–12. doi:10.1093/isagsq/ksad023
  • Maschmeyer, L. (2021). The subversive trilemma: Why cyber operations fall short of expectations. International Security, 46(2), 51–90. doi:10.1162/isec_a_00418
  • Maschmeyer, L. (2023). Subversion, cyber operations, and reverse structural power in world politics. European Journal of International Relations, 29(1), 79–103. doi:10.1177/13540661221117051
  • McConnell, M. (2009). Cyberwar is the new atomic age. New Perspectives Quarterly, 26(3), 72–77. doi:10.1111/j.1540-5842.2009.01103.x
  • Mearsheimer, J. J. (2003/2014). The tragedy of great power politics (Updated edition. Reprint 2014 ed.). W. W. Norton & Company.
  • Meibauer, G. (2023). Neorealism, neoclassical realism and the problem(s) of history. International Relations, 37(2), 348–369. doi:10.1177/00471178211033943
  • Meibauer, G., Desmaele, L., Onea, T., Kitchen, N., Foulon, M., Reichwein, A., & Sterling-Folker, J. (2020). Forum: Rethinking neoclassical realism at theory’s End. International Studies Review, 23(1), 268–295. doi:10.1093/isr/viaa018
  • Ministry of Defence. (2023). The national cyber force: Responsible cyber power in practice. https://assets.publishing.service.gov.uk/media/642a8886fbe620000c17dabe/Responsible_Cyber_Power_in_Practice.pdf.
  • Moore, D. (2022). Offensive cyber operations: Understanding intangible warfare. C. Hurst, & Co.
  • Naylor, T. (2020). All that’s lost: The hollowing of summit diplomacy in a socially distanced world. The Hague Journal of Diplomacy, 15(4), 583–598. doi:10.1163/1871191X-BJA10041
  • NDS. (2022). National defense strategy of the United States of America. https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF.
  • Nye, J. S. (2010). Cyber power. Belfer Center for Science and International Affairs. https://apps.dtic.mil/sti/citations/ADA522626.
  • Nye, J. S. (2011). Nuclear lessons for cyber security? Strategic Studies Quarterly, 5(4), 18–38. https://www.jstor.org/stable/26270536.
  • Nye, J. S. (2013). From bombs to bytes: Can our nuclear history inform our cyber future? Bulletin of the Atomic Scientists, 69(5), 8–14. doi:10.1177/0096340213501338
  • Nye, J. S. (2016/17). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44–71. doi:10.1162/ISEC_a_00266
  • Periroth, N. (2012). In cyberattack on Saudi firm, U.S. sees Iran firing back. https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html
  • Pickering, T. (1999). Oral presentation to the Chinese government regarding the accidental bombing of The P.R.C. embassy in Belgrade. https://www.fmprc.gov.cn/mfa_eng/wjb_663304/wjbz_663308/2461_663310/.
  • Rathbun, B. C. (2007). Uncertain about uncertainty: Understanding the multiple meanings of a crucial concept in international relations theory. International Studies Quarterly, 51(3), 533–557. doi:10.1111/j.1468-2478.2007.00463.x
  • Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32. doi:10.1080/01402390.2011.608939
  • Ripsman, N. M., Taliaferro, J. W., & Lobell, S. E. (2016). Neoclassical realist theory of international politics. Oxford University Press.
  • Rosenau, J. N. (1990). Turbulence in world politics: A theory of change and continuity. Princeton University Press.
  • Saltzman, I. (2013). Cyber posturing and the offense-defense balance. Contemporary Security Policy, 34(1), 40–63. doi:10.1080/13523260.2013.771031
  • Shandler, R., & Gomez, M.A. (2022). The hidden threat of cyber-attacks – Undermining public confidence in government. Journal of Information Technology & Politics, 20(4), 359–374. doi:10.1080/19331681.2022.2112796
  • Simon, H. A. (1945). Administrative behavior: A study of decision-making processes in administrative organizations (4th edition, 1997 ed.). The Free Press.
  • Smeets, M. (2018a). A matter of time: On the transitory nature of cyberweapons. Journal of Strategic Studies, 41(1-2), 6–32. doi:10.1080/01402390.2017.1288107
  • Smeets, M. (2018b). The strategic promise of offensive cyber operations. Strategic Studies Quarterly, 12(3), 90–113. https://www.jstor.org/stable/26481911
  • Smeets, M. (2022). No shortcuts: Why states struggle to develop a military cyber-force. Oxford University Press.
  • Smith, K. (2019). Recollecting a lost dialogue: Structural realism meets neoclassical realism. International Relations, 33(3), 494–513. doi:10.1177/0047117819834636
  • Snyder, G. H. (1996). Process variables in neorealist theory. In B. Frankel (Ed.), Realism: Restatements and renewal (Vol. 1996, pp. 167–192). Frank Cass and Company.
  • Soesanto, S. (2022). Cyber deterrence revisited (CPP-8). https://www.airuniversity.af.edu/Portals/10/AUPress/Papers/CPP_0008_Soesanto_Cyber_Deterrence_Revisited.pdf
  • Sterling-Folker, J. (1997). Realist environment, liberal process, and domestic-level variables. International Studies Quarterly, 41(1), 1–25. doi:10.1111/0020-8833.00031
  • Strategy, C. (2023). Cyber strategy of the department of defense. https://media.defense.gov/2023/Sep/12/2003299076/-1/-1/1/2023_DOD_Cyber_Strategy_Summary.PDF
  • Valeriano, B., Jensen, B., & Maness, R. C. (2020). Cyber strategy: The evolving character of power and coercion. Oxford University Press.
  • Valeriano, B., & Maness, R. C. (2014). The dynamics of cyber conflict between rival antagonists, 2001-2011. Journal of Peace Research, 51(3), 347–360. doi:10.1177/0022343313518940
  • Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.
  • Van Evera, S. (1999). Causes of war: Power and the roots of conflict. Cornell University Press.
  • von Clausewitz, C. (1832). On war (J. J. Graham Trans, New and revised edition, third impression, volume I, 1918. ed.). Kegan Paul, Trench, Trubner & Co.
  • Waltz, K. N. (1979). Theory of international politics (Reissued 2010 ed.). Waveland Press.
  • Waltz, K. N. (1986). Reflections on theory of international politics: A response to my critics. In R. O. Keohane (Ed.), Neorealism and its critics (Vol. 1986, pp. 322–346). Columbia University Press.
  • Waters, R., Nuttall, C., Menn, J., Palmer, M., & Hille, K. (2010). Google takes on China on censorship. https://www.ft.com/content/f65a4ba6-ffd7-11de-ad8c-00144feabdc0
  • Wendt, A. (1999). Social theory of international politics (Reprint 2003 ed.). Cambridge University Press.
  • Whyte, C. (2019). Can We change the topic, please? Assessing the theoretical construction of international relations scholarship. International Studies Quarterly, 63(2), 432–447. doi:10.1093/isq/sqy050
  • Wight, C. (2006). Agents, structures and international relations: politics as ontology (Online publication 2009 ed.). Cambridge University Press.