1,851
Views
0
CrossRef citations to date
0
Altmetric
ARTICLES

Normal cyber accidents

Pages 114-130 | Received 12 Jan 2023, Accepted 23 Sep 2023, Published online: 13 Nov 2023

References

  • Allhoff, F., A. Henschke, and B. J. Strawser. 2016. Binary Bullets: The Ethics of Cyberwarfare. New York: Oxford University Press.
  • Arquilla, J., and D. Ronfeldt. 1993. “Cyberwar is Coming!.” Comparative Strategy 12 (2): 141–165. doi:10.1080/01495939308402915
  • Betz, D. J., and T. Stevens. 2013. “Analogical Reasoning and Cyber Security.” Sage (atlanta, Ga ) 44 (2).
  • Bonfanti, M. E. 2022. “Artificial Intelligence and the Offence-Defence Balance in Cyber Security.” In Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, edited by M. Dunn Cavelty and A. Wenger, 64–79. London: Routledge.
  • Borghard, E. D., and S. W. Lonergan. 2019. “Cyber Operations as Imperfect Tools of Escalation.” Strategic Studies Quarterly 13 (3): 122–145.
  • Brown, H. 2018. “Keeping the Lights On: A Comparison of Normal Accidents and High Reliability Organizations.” IEEE Technology and Society Magazine 37 (2): 62–70.
  • Bueger, C., and T. Liebetrau. 2021. “Protecting Hidden Infrastructure: The Security Politics of the Global Submarine Data Cable Network.” Contemporary Security Policy 42 (3): 391–413. doi:10.1080/13523260.2021.1907129
  • Burton, J., and G. Christou. 2021. “Bridging the Gap Between Cyberwar and Cyberpeace.” International Affairs 97 (6): 1727–1747. doi:10.1093/ia/iiab172
  • Burton, J., and C. Lain. 2020. “Desecuritising Cybersecurity: Towards a Societal Approach.” Journal of Cyber Policy 5 (3): 449–470. doi:10.1080/23738871.2020.1856903
  • Buzan, B., O. Waever, and J. de Wilde. 1998. Security: A New Framework for Analysis. London: Cambridge University Press Online.
  • Carrapico, H., and A. Barrinha. 2017. “The EU as a Coherent (Cyber) Security Actor?” JCMS May.
  • Center for Internet Security. 2021. “The SolarWinds Cyber-Attack: What You Need to Know.” Article accessed 2022. https://www.cisecurity.org/solarwinds.
  • Chen, T. M., L. Jarvis, and S. Macdonald, eds. 2014. Cyberterrorism: Understanding, Assessment, and Response. New York: Springer.
  • Christou, G. 2016. Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy. Basingstoke: Palgrave Macmillan.
  • Christou, G. 2019. “The Collective Securitisation of Cyberspace in the European Union.” West European Politics 42 (2): 278–301. doi:10.1080/01402382.2018.1510195
  • Clarke, R. A., and R. K. Knake. 2010. Cyber War: The Next Threat to National Security and What to do About it. New York: Ecco.
  • Davenport, T. 2015. “Submarine Cables, Cybersecurity and International Law: An Intersectional Analysis.” Cath. UJL & Tech 24: 57.
  • Dipert, R. R. 2010. “The Ethics of Cyberwarfare.” Journal of Military Ethics 9 (4): 384–410. doi:10.1080/15027570.2010.536404
  • Dunn Cavelty, M. 2008. “Cyber-terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate.” Journal of Information Technology & Politics 4 (1): 19–36. doi:10.1300/J516v04n01_03
  • Dunn Cavelty, M. 2010. “Cyber-security.” In The Routledge Handbook of New Security Studies, edited by J. P. Burgess, 154–162. New York: Routledge.
  • Dunn Cavelty, M. 2018. “Cybersecurity Research Meets Science and Technology Studies.” Politics and Governance 6 (2): 22–30. doi:10.17645/pag.v6i2.1385
  • Dunn Cavelty, M., and A. Wenger. 2022. Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, 286. New York: Taylor & Francis.
  • Eriksson, J., and G. Giacomello, eds. 2007. International Relations and Security in the Digital age (Vol. 52). New York: Routledge.
  • Eriksson, J., and G. Giacomello. 2022. “Cyberspace in Space: Fragmentation, Vulnerability, and Uncertainty.” In Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, edited by M. Dunn Cavelty and A. Wenger, 95–108. Obingdon: Routledge.
  • Feathers, M. C. 2005. Working Effectively with Legacy Code. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference.
  • Franken, J., T. Reinhold, L. Reichert, and C. Reuter. 2022. “The Digital Divide in State Vulnerability to Submarine Communications Cable Failure.” International Journal of Critical Infrastructure Protection 38: 100522. doi:10.1016/j.ijcip.2022.100522
  • Gjesvik, L., and K. Szulecki. 2023. “Interpreting Cyber-Energy-Security Events: Experts, Social Imaginaries, and Policy Discourses Around the 2016 Ukraine Blackout.” European Security 32 (1): 104–124. doi:10.1080/09662839.2022.2082838
  • Gold, J. 2020. The Five Eyes and Offensive Cyber Capabilities: Building a ‘Cyber Deterrence Initiative’. Tallinn, Estonia: NATO CCDCOE.
  • Goldin, I., and M. Mariathasan. 2014. “The Butterfly Defect: Why Globalization Creates Systemic Risks and What to do About it.” Journal of Risk Management in Financial Institutions 7 (4): 325–327.
  • Gomez, M. A., and C. Whyte. 2022. “Cyber Uncertainties: Observations from Cross-National War Games.” In Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, edited by M. Dunn Cavelty and A. Wenger, 111–127. Routledge.
  • Grossman, T., M. Kaminska, J. Shires, and M. Smeets. 2023. The Cyber Dimensions of the Russia-Ukraine War. ECCRI.
  • Hansen, L., and H. Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Studies Quarterly 53 (4): 1155–1175. doi:10.1111/j.1468-2478.2009.00572.x
  • Jacobsen, J. T. 2021. “Cyber Offense in NATO: Challenges and Opportunities.” International Affairs 97 (3): 703–720. doi:10.1093/ia/iiab010
  • Jenkins, R. 2016. “Cyberwarfare as Ideal War.” In Binary Bullets: The Ethics of Cyberwarfare, edited by Fritz Allhoff, Adam Henschke, and Bradley Jay Strawser. New York: Oxford Academic.
  • Kaseya. 2021. “Incident Overview and Technical Details.” Accessed 2022. https://helpdesk.kaseya.com/hc/en-gb/articles/4403584098961-Incident-Overview-Technical-Details.
  • Kello, L. 2017. The Virtual Weapon and International Order. New Haven, CT: Yale University Press.
  • Kerigan-Kyro, D. 2014. “NATO and Critical Infrastructure Resilience–Planning for the Unknown.” In Critical Infrastructure Protection, edited by M. Edwards, 1–12. IOS Press.
  • La Porte, T. 1994. “A Strawman Speaks up: Comments on the Limits of Safety.” Journal of Contingencies and Crisis Management 2 (4).
  • La Porte, T. 1996. “High Reliability Organizations: Unlikely, Demanding and At Risk.” Journal of Contingencies and Crisis Management 4 (2). doi:10.1111/j.1468-5973.1996.tb00078.x
  • Lawson, S. T. 2013. “Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats.” Journal of Information Technology & Politics 10 (1). doi:10.1080/19331681.2012.759059
  • Lawson, S. T. 2019. Cybersecurity Discourse in the United States: Cyber-Doom Rhetoric and Beyond. London: Routledge.
  • Le Coze, J.-C. 2015. “1984-2014. Normal Accidents. Was Charles Perrow Right for the Wrong Reasons?” Journal of Contingencies and Crisis Management 23 (4).
  • Le Coze, J.-C. 2021. Post Normal Accident: Revisiting Perrow's Classic. 1st Edition. Boca Raton: CRC Press.
  • Lehto, M. 2022. “Cyber-attacks Against Critical Infrastructure.” In Cyber Security. Computational Methods in Applied Sciences, edited by M. Lehto and P. Neittaanmäki, 3–42. Cham: Springer International Publishing.
  • Libicki, M. C. 2009. Cyberdeterrence and Cyberwar. Santa Monica, CA: RAND Corporation. xii-xvii.
  • Libicki, M. C., and Project Air Force (US). 2012. Crisis and Escalation in Cyberspace [Elektronisk Resurs] (1). Vancouver: RAND Corporation.
  • Liebetrau, T., K. K. Christensen, and K. K. 2021. “The Ontological Politics of Cyber Security: Emerging Agencies, Actors, Sites, and Spaces.” European Journal of International Security 6 (1): 25–43. doi:10.1017/eis.2020.10
  • Lin, H. S. 2012. “Escalation Dynamics and Conflict Termination in Cyberspace.” Strategic Studies Quarterly 6 (3): 46–70.
  • Michalec, O., S. Milyaeva, and A. Rashid. 2022. “When the Future Meets the Past: Can Safety and Cyber Security Coexist in Modern Critical Infrastructures?” Big Data & Society 9 (1). doi:10.1177/20539517221108369
  • Michels, J. D., and I. Walden. 2018. “How Safe is Safe Enough? Improving Cybersecurity in Europe's Critical Infrastructure Under the NIS Directive.” Improving Cybersecurity in Europe's Critical Infrastructure Under the NIS Directive, December 7. Queen Mary School of Law Legal Studies Research Paper 291.
  • Microsoft. 2022. Defending Ukraine: Early Lessons from the Cyber War.” Report. June.
  • Moore, D. 2022. Offensive Cyber Operations: Understanding Intangible Warfare. London: Hurst & Company.
  • Mullen, S. 2016. “Legacy isn’t a Bad Word.” Blog. https://samuelmullen.com/articles/legacy_isnt_a_bad_word.
  • National Cyber Force. 2023. “Responsible Cyber Power in Practice, April 4.” Gov.UK.
  • Nye, J. S. 2010. Cyber Power. Cambridge: Harvard Kennedy School, Belfer Center for Science and International Affairs. 1-24.
  • Ohlin, J. D., K. Govern, and C. Finkelstein, eds. 2015. Cyber War: Law and Ethics for Virtual Conflicts. 1st edition. Oxford: Oxford University Press.
  • Perrow, C. 1984. Normal Accidents: Living with High-Risk Technologies. New York: Basic Books.
  • Perrow, C. 1999. Normal Accidents: Living with High-Risk Technologies. revised edition. Princeton, NJ: Princeton University Press.
  • Rid, T. 2012. “Cyber War Will not Take Place.” Journal of Strategic Studies 35 (1): 5–32. doi:10.1080/01402390.2011.608939
  • Riebe, T., and C. Reuter. 2019. “Dual-Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.” In , Information Technology for Peace and Security, edited by C. Reuter, 163–183. Wiesbaden: Springer Vieweg.
  • Rijpma, J. A. 1997. “Complexity, Tight–Coupling and Reliability: Connecting Normal Accidents Theory and High Reliability Theory.” Journal of Contingencies and Crisis Management 5 (1): 15–23. doi:10.1111/1468-5973.00033
  • Rudner, M. 2013. “Cyber-threats to Critical National Infrastructure: An Intelligence Challenge.” International Journal of Intelligence and Counter Intelligence 26 (3): 453–481. doi:10.1080/08850607.2013.780552
  • Schmitz-Berndt, S., and M. D. Cole. 2022. “Towards an Efficient and Coherent Regulatory Framework on Cybersecurity in the EU: The Proposals for a NIS 2.0 Directive and a Cyber Resilience Act.” Applied Cybersecurity & Internet Governance 1 (1). doi:10.5604/01.3001.0016.1323
  • Smeets, M. 2018. “The Strategic Promise of Offensive Cyber Operations.” Strategic Studies Quarterly 12 (3): 90–113.
  • Smeets, M. 2022. No Shortcuts: Why States Struggle to Develop a Military Cyber-Force. New York, NY: Oxford University Press.
  • Smeets, M., and H. S. Lin. 2018. “Offensive Cyber Capabilities: To What Ends?” International Conference on Cyber Conflict (CYCON). May, 55–71.
  • Stevens, T. 2018. “Global Cybersecurity: New Directions in Theory and Methods.” Politics and Governance 6 (2): 1–4. doi:10.17645/pag.v6i2.1569
  • Truesec. 2021. “Kaseya Supply Chain Attack Targeting MSPs to Deliver REvil Ransomware.” Article accessed 2022. https://www.truesec.com/hub/blog/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware.
  • UK National Audit Office/Department of Health. 2018. “Investigation: WannaCry Cyber Attack and the NHS.” Report by the Controller and Auditor General. Session, 2017–2019.
  • US Government Accountability Office. 2021. “SolarWinds Cyberattack Demands Significant Federal and Private-Sector Response.” Article accessed 2023.https://www.gao.gov/blog/solarwinds-cyberattack-demands-significant-federal-and-private-sector-response-infographic.
  • Valeriano, B. G., and B. Jenson. 2019. “The Myth of the Cyber Offense: The Case for Cyber Restraint.” Cato Institute Policy Analysis 862.
  • Valeriano, B. G., and R. C. Maness. 2015. Cyber War Versus Cyber Realities: Cyber Conflict in the International System. New York: Oxford University Press.
  • Walker, S. 2020. “Legacy Systems in a Connected World: Securing Critical Infrastructure.” Article accessed 2022. https://manufacturingdigital.com/technology/legacy-systems-connected-world-securing-critical-infrastructure.
  • Willett, M. 2022. “The Cyber Dimension of the Russia–Ukraine War.” Survival 64 (5): 7–26. doi:10.1080/00396338.2022.2126193