831
Views
1
CrossRef citations to date
0
Altmetric
Articles

Overcoming uncertainty in cyberspace: strategic culture and cognitive schemas

Pages 25-46 | Received 15 Jul 2020, Accepted 12 Nov 2020, Published online: 27 Nov 2020

References

  • Arquilla, J., and D. Ronfeldt. 1993. “Cyberwar Is Coming!” Comparative Strategy 12 (2): 141–165. doi:10.1080/01495939308402915.
  • Axelrod, R., and R. Iliev. 2014. “Timing of Cyber Conflict.” Proceedings of the National Academy of Sciences 111 (4): 1298–1303. doi:10.1073/pnas.1322638111.
  • Baram, G., and K. Lim. 2020. “Foreign Policy.” https://foreignpolicy.com/2020/06/05/israel-and-iran-just-showed-us-the-future-of-cyberwar-with-their-unusual-attacks/
  • Bloomfield, A. 2012. “Time to Move On: Reconceptualizing the Strategic Culture Debate.” Contemporary Security Policy 33 (3): 437–461. doi:10.1080/13523260.2012.727679.
  • Borghard, E. D. 2019. “What a U.S. Operation against Russian Trolls Predicts about Escalation in Cyberspace.” In War on the Rocks. Texas National Security Review.
  • Borghard, E. D., and S. W. Lonergan. 2017. “The Logic of Coercion in Cyberspace.” Security Studies 26 (3): 452–481. doi:10.1080/09636412.2017.1306396.
  • Brantly, A. F. 2016. “The Decision to Attack: Military and Intelligence Cyber Decision-making.” In Studies in Security and International Affairs. Athens: University of Georgia Press.
  • Brantly, A. F. 2020. “Entanglement in Cyberspace: Minding the Deterrence Gap.” Democracy and Security 16 (3): 210–233. doi:10.1080/17419166.2020.1773807.
  • Buchanan, B. 2017. The Cybersecurity Dilemma: Hacking, Trust and Fear between Nations. London: Hurst & Company.
  • Chong, D. 2013. “Degree of Rationality in Politics.” In The Oxford Handbook of Political Psychology, edited by Huddy, L., 96–129. Oxford: Oxford University Press.
  • Clarke, R. A., and R. K. Knake. 2014. Cyber War. Old Saybrook: Tantor Media, Incorporated.
  • Cross, M. K. D. 2013. “Rethinking Epistemic Communities Twenty Years Later.” Review of International Studies 39 (1): 137–160. doi:10.1017/S0260210512000034.
  • DiMaggio, P. 1997. “Culture and Cognition.” Annual Review of Sociology 23 (1): 263–287. doi:10.1146/annurev.soc.23.1.263.
  • DOD. 2018. “Department of Defense Cyber Strategy 2018.”. Washington D.C.: Department of Defense.
  • Dueck, C. 2006. Reluctant Crusaders: Power, Culture, and Change in American Grand Strategy, 1–224. Princeton University Press.
  • Dunn Cavelty, M. 2013. “From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse.” International Studies Review 15 (1): 105–122. doi:10.1111/misr.12023.
  • Edwards, B., A. Furnas, S. Forrest, and R. Axelrod. 2017. “Strategic Aspects of Cyberattack, Attribution, and Blame.” Proceedings of the National Academy of Sciences 114 (11): 2825–2830. doi:10.1073/pnas.1700442114.
  • Egloff, F. 2020. “Public Attribution of Cyber Intrusion.”
  • Eyal, G., and L. Buchholz. 2010. “From the Sociology of Intellectuals to the Sociology of Interventions.” Annual Review of Sociology 36 (1): 117–137. doi:10.1146/annurev.soc.012809.102625.
  • Fearon, J. D. 1995. “Rationalist Explanations for War.” International Organization 49 (3): 379–414. doi:10.1017/S0020818300033324.
  • Finnemore, M., and D. B. Hollis. 2016. “Constructing Norms for Global Cybersecurity.” American Journal of International Law 110 (3): 425–479. doi:10.5305/amerjintelaw.110.3.0425.
  • Fischerkeller, M. P., and R. J. Harknett. 2017. “Deterrence Is Not a Credible Strategy for Cyberspace.” Orbis 61 (3): 381–393.
  • Fischerkeller, M. P., and R. J. Harknett. 2018a. “Persistent Engagement and Tacit Bargaining: A Path toward Constructing Norms in Cyberspace.” Lawfare.
  • Fischerkeller, M. P., and R. J. Harknett. 2018b. “Persistent Engagement, Agreed Competition, Cyberspace Interaction Dynamics and Escalation.” Orbis (Summer 2017) 61 (3): 381–393.
  • Fleishman, G. 2000. “Cartoon Captures Spirit of the Internet.” The New York Times. New York: New York Times.
  • Ford, T. E., and A. W. Kruglanski. 1995. “Effects of Epistemic Motivations on the Use of Accessible Constructs in Social Judgment.” Personality & Social Psychology Bulletin 21 (9): 950–962. doi:10.1177/0146167295219009.
  • Forsyth, J. W., and B. E. Pope. 2014. “Structural Causes and Cyber Effects Why International Order Is Inevitable in Cyberspace.” Strategic Studies Quarterly 8 (4): 112–128.
  • Gartzke, E. 2013. “The Myth of Cyberwar: Bringing War in Cyberspace Back down to Earth.” International Security 38 (2): 41–73. doi:10.1162/ISEC_a_00136.
  • Gartzke, E., and J. R. Lindsay. 2015. “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace.” Security Studies 24 (2): 316–348. doi:10.1080/09636412.2015.1038188.
  • Gartzke, E., and J. R. Lindsay. 2017. “Thermonuclear Cyberwar.” Journal of Cybersecurity 3 (1): 37–48.
  • George, A. L. 1969. “The” Operational Code”: A Neglected Approach to the Study of Political Leaders and Decision-making.” International Studies Quarterly 13 (2): 190–222. doi:10.2307/3013944.
  • Gilli, A., and M. Gilli. 2019. “Why China Has Not Caught up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.” International Security 43 (3): 141–189. doi:10.1162/isec_a_00337.
  • Goldgeier, J. M., and P. E. Tetlock. 2001. “Psychology and International Relations Theory.” Annual Review of Political Science 4: 67–92.
  • Gomez, M. A. 2019a. “Past Behavior and Future Judgements: Seizing and Freezing in Response to Cyber Operations.” Journal of Cybersecurity 5 (1): tyz012. doi:10.1093/cybsec/tyz012.
  • Gomez, M. A. 2019b. “Sound the Alarm! Updating Beliefs and Degradative Cyber Operations.” European Journal of International Security 4 (2): 190–208. doi:10.1017/eis.2019.2.
  • Gomez, M. A., and C. Whyte. 2020. “Cyber Uncertainties: Observations from Cross-National Wargames.”
  • Gomez, M. A., and C. T. Dai. 2018. “Challenges and Opportunities for Cyber Norms in ASEAN.” Journal of Cyber Policy 3 (2): 217–235. doi:10.1080/23738871.2018.1487987.
  • Gomez, M. A., and E. B. Villar. 2018. “Fear, Uncertainty, and Dread: Cognitive Heuristics and Cyber Threats.” Politics and Governance 6 (2): 61–72. doi:10.17645/pag.v6i2.1279.
  • Gray, C. S. 1981. “National Style in Strategy: The American Example.” International Security 6 (2): 21–47. doi:10.2307/2538645.
  • Gray, C. S. 1999. “Strategic Culture as Context: The First Generation of Theory Strikes Back.” Review of International Studies 25 (1): 49–69. doi:10.1017/S0260210599000492.
  • Gross, J. A. 2020. “Report: Israeli Cyberattack Caused Iran Nuclear Site Fire, F35s Hit Missile Base.” The Times of Israel. Accessed July 15. https://www.timesofisrael.com/report-israeli-cyberattack-caused-iran-nuclear-site-fire-f35s-hit-missile-base/
  • Gross, M. L., D. Canetti, and D. R. Vashdi. 2017. “Cyberterrorism: Its Effects on Psychological Well-being, Public Confidence and Political Attitudes.” Journal of Cybersecurity 3 (1): 49–58. doi:10.1093/cybsec/tyw018.
  • Haglund, D. G. 2009. “What Good Is Strategic Culture?” In Strategic Culture and Weapons of Mass Destruction: Culturally Based Insights into Comparative National Security Policymaking, edited by Johnson, J. L., K. M. Kartchner, and J. A. Larsen, 15–32. New York: Palgrave.
  • Hansen, L., and H. Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Studies Quarterly 53 (4): 1155–1175. doi:10.1111/j.1468-2478.2009.00572.x.
  • Harris, S. G. 1994. “Organizational Culture and Individual Sensemaking: A Schema-based Perspective.” Organization Science 5 (3): 309–321. doi:10.1287/orsc.5.3.309.
  • Healey, J. 2019. “The Implications of Persistent (And Permanent) Engagement in Cyberspace.” Journal of Cybersecurity 5 (1): tyz008. doi:10.1093/cybsec/tyz008.
  • Herrmann, R. K., J. F. Voss, T. Y. E. Schooler, and J. Ciarrochi. 1997. “Images in International Relations: An Experimental Test of Cognitive Schemata.” International Studies Quarterly 41 (3): 403–433. doi:10.1111/0020-8833.00050.
  • Iasiello, E. 2013. “Cyber Attack: A Dull Tool to Shape Foreign Policy.” In 2013 5th International Conference on Cyber Conflict, edited by Podins, K., J. Stinissen, and M. Maybaum, 451–470. Tallinn: IEEE.
  • Iasiello, E. 2016. “What Happens If Cyber Norms Are Agreed To?” Georgetown Journal of International Affairs 17 (3): 30–37. doi:10.1353/gia.2016.0034.
  • Jarvis, L., S. Macdonald, and A. Whiting. 2017. “Unpacking Cyberterrorism Discourse: Specificity, Status, and Scale in News Media Constructions of Threat.” European Journal of International Security 2 (1): 64–87. doi:10.1017/eis.2016.14.
  • Jervis, R. 1976. Perception and Misperception in International Politics. New ed. Princeton: Princeton University Press.
  • Jervis, R. 2009. “Understanding Beliefs and Threat Inflation.” American Foreign Policy and the Politics of Fear: Threat Inflation Since 9 (11): 16–39.
  • Johnston, A. I. 1995. “Thinking About Strategic Culture.” International Security 19 (4): 32–64. doi:10.2307/2539119.
  • Kahneman, D., P. Slovic, and A. Tversky. 1982. Judgment under Uncertainty: Heuristics and Biases. Cambridge; New York: Cambridge University Press.
  • Kalyuga, S. 2010. “Schema Acquisition and Sources of Cognitive Load.” In Cognitive Load Theory, edited by Plass, J. L., R. Moreno, and R. Brünken, 48–64, Cambridge University Press.
  • Kari, M. J., and P. Katri. 2019. “Theory of Strategic Culture: An Analytical Framework for Russian Cyber Threat Perception.” Journal of Strategic Studies 1–29. doi:10.1080/01402390.2019.1663411.
  • Keller, J. W., and Y. E. Yang. 2009. “Empathy and Strategic Interaction in Crises: A Poliheuristic Perspective.” Foreign Policy Analysis 5 (2): 169–189. doi:10.1111/j.1743-8594.2009.00088.x.
  • Kertzer, J. D., and J. Renshon. 2015. “Putting Things in Perspective: Mental Simulation in Experimental Political Science.”
  • Kier, E. 2017. Imagining War: French and British Military Doctrine between the Wars. Vol. 153. Princeton University Press.
  • Kitchen, N. 2010. “Systemic Pressures and Domestic Ideas: A Neoclassical Realist Model of Grand Strategy Formation.” Review of International Studies 36 (1): 117–143. doi:10.1017/S0260210509990532.
  • Klein, B. S. 1988. “Hegemony and Strategic Culture: American Power Projection and Alliance Defence Politics.” Review of International Studies 14 (2): 133–148. doi:10.1017/S026021050011335X.
  • Klein, Y. 1991. “A Theory of Strategic Culture.” Comparative Strategy 10 (1): 3–23. doi:10.1080/01495939108402827.
  • Kostyuk, N., and C. Wayne. 2020. “The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public.” Journal of Global Security Studies. doi:10.1093/jogss/ogz077.
  • Kruglanski, A. W., and D. M. Webster. 1996. “Motivated Closing of the Mind: ”Seizing” And ”Freezing”.” Psychological Review 103 (2): 263. doi:10.1037/0033-295X.103.2.263.
  • Kuehl, D. T. 2009. “From Cyberspace to Cyberpower: Defining the Problem.” In Cyberpower and National Security, edited by Franklin, D., S. Kramer, H. Stuart, and L. Wentz, 24–42. Dulles: Potomac Books.
  • Lantis, J. S. 2002. “Strategic Culture and National Security Policy.” International Studies Review 4 (3): 87–113. doi:10.1111/1521-9488.t01-1-00266.
  • Larson, D. W. 1994. “The Role of Belief Systems and Schemas in Foreign Policy Decision-making.” Political Psychology 15 (1): 17–33. doi:10.2307/3791437.
  • Lau, C.-M., L. M. Kilbourne, and R. W. Woodman. 2003. “A Shared Schema Approach to Understanding Organizational Culture Change.” Research in Organizational Change and Development 14: 225–256.
  • Lau, R. R., and D. P. Redlawsk. 2001. “Advantages and Disadvantages of Cognitive Heuristics in Political Decision Making.” American Journal of Political Science 45 (4): 951–971. doi:10.2307/2669334.
  • Legro, J. 1995. Cooperation Under Fire: Anglo-German Restraint During World War II. Cornell University Press.
  • Libel, T. 2016. “Explaining the Security Paradigm Shift: Strategic Culture, Epistemic Communities, and Israel’s Changing National Security Policy.” Defence Studies 16 (2): 137–156. doi:10.1080/14702436.2016.1165595.
  • Liff, A. P. 2012. “Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War.” Journal of Strategic Studies 35 (3): 401–428. doi:10.1080/01402390.2012.663252.
  • Lin, H. S. 2016. “Attribution of Malicious Cyber Incidents: From Soup to Nuts.” Journal of International Affairs 70 (1): 75–137.
  • Lindsay, J. R. 2014. “The Impact of China on Cybersecurity Fiction and Friction.” International Security 39 (3): 7. doi:10.1162/ISEC_a_00189.
  • Maitlis, S., and S. Sonenshein. 2010. “Sensemaking in Crisis and Change: Inspiration and Insights from Weick (1988).” Journal of Management Studies 47 (3): 551–580.
  • Maness, R. C., and B. Valeriano. 2016. “The Impact of Cyber Conflict on International Interactions.” Armed Forces and Society 42 (2): 301–323. doi:10.1177/0095327X15572997.
  • Maschmeyer, L., R. J. Deibert, and J. R. Lindsay. 2020. “A Tale of Two Cybers - How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society.” Journal of Information Technology & Politics 1–20. doi:10.1080/19331681.2020.1776658.
  • Mayer, D. 2012. “Ratio of Bugs per Line of Code.” In Continously Deployed.
  • McDermott, R. 2004. Political Psychology in International Relations. University of Michigan Press.
  • Meibauer, G. 2019. “Interests, Ideas, and the Study of State Behaviour in Neoclassical Realism.” Review of International Studies 1–17.
  • Mintz, A. 2004. “How Do Leaders Make Decisions? A Poliheuristic Perspective.” Journal of Conflict Resolution 48 (1): 3–13. doi:10.1177/00222002703261056.
  • Morgan, F. E. 2003. Compellence and the Strategic Culture of Imperial Japan Implications for Coercive Diplomacy in the Twenty-first Century. Westport, Conn.: Praeger.
  • Nye, J. S. 2017. “Deterrence and Dissuasion in Cyberspace.” International Security 41 (3): 44–71. doi:10.1162/ISEC_a_00266.
  • Perrow, C. 1984. Normal Accidents: Living with High-risk Technologies. Princeton, N.J.: Princeton University Press.
  • Posen, B. 1986. The Sources of Military Doctrine: France, Britain, and Germany between the World Wars. Cornell University Press.
  • Power, R. 2020. “The Solar Sunrise Case: Mak, Stimpy, and Analyzer Give the DoD a Run for Its Money.” Pearson. Accessed November 01. http://www.informit.com/articles/article.aspx?p=19603&seqNum=4
  • Poznansky, M., and E. Perkoski. 2018. “Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution.” Journal of Global Security Studies 3 (4): 402–416.
  • Pytlak, A., and G. E. Mitchell. 2016. “Power, Rivalry, and Cyber Conflict: An Empirical Analysis.” In Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, edited by Friis, K. and J. Ringsmose, 65–82. London: Routledge.
  • Rascagneres, P., and M. Lee. 2018. Who Wasn’t Responsible for Olympic Destroyer? Talos: Talos Intelligence.
  • Rathbun, B. C. 2007. “Uncertain about Uncertainty: Understanding the Multiple Meanings of a Crucial Concept in International Relations Theory.” International Studies Quarterly 51 (3): 533–557. doi:10.1111/j.1468-2478.2007.00463.x.
  • Rathbun, B. C., J. D. Kertzer, J. Reifler, P. Goren, and T. J. Scotto. 2016. “Taking Foreign Policy Personally: Personal Values and Foreign Policy Attitudes.” International Studies Quarterly 60 (1): 124–137. doi:10.1093/isq/sqv012.
  • Rid, T. 2012. “Cyber War Will Not Take Place.” Journal of Strategic Studies 35 (1): 5–32. doi:10.1080/01402390.2011.608939.
  • Rid, T. 2020. Active Measures: The Secret History of Disinformation and Political Warfare. London: Profile Books.
  • Rid, T., and B. Buchanan. 2015. “Attributing Cyber Attacks.” Journal of Strategic Studies 38 (1–2): 4–37. doi:10.1080/01402390.2014.977382.
  • Saltzman, I. 2013. “Cyber Posturing and the Offense-defense Balance.” Contemporary Security Policy 34 (1): 40–63. doi:10.1080/13523260.2013.771031.
  • Schelling, T. C. 1958. “The Strategy of Conflict. Prospectus for a Reorientation of Game Theory.” Journal of Conflict Resolution 2 (3): 203–264. doi:10.1177/002200275800200301.
  • Schneider, J. 2017. Cyber and Crisis Escalation: Insights from Wargaming. U.S.: Naval War College.
  • Schneider, J. 2019. “The Capability/Vulnerability Paradox and Military Revolutions: Implications for Computing, Cyber, and the Onset of War.” Journal of Strategic Studies 42 (6): 841–863. doi:10.1080/01402390.2019.1627209.
  • Schoka, A. 2019. “Cyber Command, the NSA, and Operating in Cyberspace: Time to End the Dual Hat.” War on the Rocks. Texas National Security Review.
  • Slayton, R. 2017. “What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment.” International Security 41 (3): 72–109. doi:10.1162/ISEC_a_00267.
  • Smeets, M. 2018. “The Strategic Promise of Offensive Cyber Operations.” Strategic Studies Quarterly 12 (3): 90–113.
  • Snyder, J. L. 1977. “The Soviet Strategic Culture. Implications for Limited Nuclear Operations.” In.: RAND CORP SANTA MONICA CALIF.
  • Stein, J. G. 1988. “Building Politics into Psychology - the Misperception of Threat.” Political Psychology 9 (2): 245–271. doi:10.2307/3790955.
  • Taber, C. S., M. Lodge, and J. Glathar. 2001. “The Motivated Construction of Political Judgments.” In Citizens and Politics: Perspectives from Political Psychology, edited by Kuklinski, J. H., 198–226. Cambridge: Cambridge University Press.
  • Tanczer, L. M. 2020. “50 Shades of Hacking: How IT and Cybersecurity Industry Actors Perceive Good, Bad, and Former Hackers.” Contemporary Security Policy 41 (1): 108–128. doi:10.1080/13523260.2019.1669336.
  • Tor, U. 2017. “Cumulative Deterrence’as a New Paradigm for Cyber Deterrence.” Journal of Strategic Studies 40 (1–2): 92–117.
  • UNIDIR. 2013. “The Cyber Index: International Security Trends and Realities.” In, edited by United Nations Institute for Disarmament Research, 9–90. Geneva: United Nations Institute for Disarmament Research.
  • Valeriano, B., and B. Jensen. 2019. “The Myth of the Cyber Offense: The Case for Restraint.” Cato Institute Policy Analysis 862.
  • Valeriano, B., B. Jensen, and R. C. Maness. 2018. Cyber Strategy: The Evolving Character of Power and Coercion. New York: Oxford University Press.
  • Valeriano, B., and R. C. Maness. 2014. “The Dynamics of Cyber Conflict between Rival Antagonists, 2001–11.” Journal of Peace Research 51 (3): 347–360. doi:10.1177/0022343313518940.
  • Waltz, K. N. 1979. Theory of International Politics. New York: Random House.
  • Weber, K., and M. A. Glynn. 2006. “Making Sense with Institutions: Context, Thought and Action in Karl Weick’s Theory.” Organization Studies 27 (11): 1639–1660. doi:10.1177/0170840606068343.
  • Wivel, A. 2005. “Explaining Why State X Made a Certain Move Last Tuesday: The Promise and Limitations of Realist Foreign Policy Analysis.” Journal of International Relations and Development 8 (4): 355–380. doi:10.1057/palgrave.jird.1800064.
  • Yee, A. S. 1996. “The Causal Effects of Ideas on Policies.” International Organization 50 (1): 69. doi:10.1017/S0020818300001673.
  • Yee, A. S. 1997. “Thick Rationality and the Missing “Brute Fact”: The Limits of Rationalist Incorporationsof Norms and Ideas.” Journal of Politics 59 (4): 1001–1039. doi:10.2307/2998589.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.