• Research
  • Emissary
  • About
  • Experts
Carnegie Global logoCarnegie lettermark logo
DemocracyIran
  • Donate
{
  "authors": [
    "Tim Maurer",
    "Hannes Ebert"
  ],
  "type": "other",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "Cyber and Digital Policy"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "NPP",
  "programs": [
    "Nuclear Policy",
    "Technology and International Affairs"
  ],
  "projects": [],
  "regions": [
    "Iran"
  ],
  "topics": [
    "Security",
    "Global Governance",
    "Technology"
  ]
}

Source: Getty

Other

International Relations and Cyber Security: Carnegie Contribution to Oxford Bibliographies

Interest in cybersecurity in the context of international relations has never been greater.

Link Copied
By Tim Maurer and Hannes Ebert
Published on Jan 11, 2017
Program mobile hero image

Program

Nuclear Policy

The Nuclear Policy Program aims to reduce the risk of nuclear war. Our experts diagnose acute risks stemming from technical and geopolitical developments, generate pragmatic solutions, and use our global network to advance risk-reduction policies. Our work covers deterrence, disarmament, arms control, nonproliferation, and nuclear energy.

Learn More
Program mobile hero image

Program

Technology and International Affairs

The Technology and International Affairs Program develops insights to address the governance challenges and large-scale risks of new technologies. Our experts identify actionable best practices and incentives for industry and government leaders on artificial intelligence, cyber threats, cloud security, countering influence operations, reducing the risk of biotechnologies, and ensuring global digital inclusion.

Learn More

Source: Oxford University Press

Interest in cybersecurity in the context of international relations has never been greater. To provide a resource for interested decision- and policy-makers, academics, as well as the general public, Carnegie’s Tim Maurer, who co-directs Carnegie’s Cyber Policy Initiative, and Hannes Ebert, a research fellow at the German Institute of Global and Area Studies, developed a curated list of some of the most relevant literature published on this issue in the past years. This list is complemented by short descriptive commentary for each publication and was published by Oxford Bibliographies in January 2017. This resource includes selected works published by summer 2016 divided into the following categories:

  • General Overviews
  • Journals
  • Online Resources and Blogs
  • International-Relations Perspectives on Cybersecurity
  • Cyberthreats and Cyberrisks
  • Geopolitics of Cybersecurity
  • Laws, Norms, and Response Mechanisms in Cybersecurity
  • International Institutions

The introductory text of the article is available below and the full resource at: http://oxfordbibliographiesonline.com/view/document/obo-9780199743292/obo-9780199743292-0196.xml?

Introduction

The Internet has expanded rapidly since its commercialization in the mid-1990s. In the early 21st century, a third of the world’s population has access to the technology, with another 1.5 billion expected to gain access by 2020. Moreover, the “Internet of Things” will lead to an exponential number of devices being connected to the network. As a result, the economic and political incentives to exploit the network for malicious purposes have also increased, and cybersecurity has reached head-of-state-level attention. In parallel, publications on the topic by academic, policy, industry, and military institutions have multiplied. Scholars within the international relations (IR) discipline and its subfields of security studies and strategic studies increasingly focus on the technology’s implications on national and international security. This includes studying its effect on related concepts such as power, sovereignty, global governance, and securitization. Meanwhile, the meaning of cybersecurity and information security has been highly contested. Broad definitions of the concept incorporate a wide range of cyberthreats and cyberrisks, including cyberwarfare, cyberconflict, cyberterrorism, cybercrime, and cyberespionage as well as cybercontent, while narrower conceptualizations focus on the more technical aspects relating to network and computer security. This article focuses on cybersecurity in the IR context from the perspective of political conflict, including the scholarship on cyberwarfare, cyberconflict, and cyberterrorism. The literature on cybercrime deserves a stand-alone article, as does cyberespionage from the perspective of surveillance and intelligence activities. This article references only a few publications from the latter two categories as they relate to cyberconflict. While scholars take the technology’s implications for international security increasingly seriously, they continue to disagree about the level and nature of threat and the appropriate policy responses that governments and other stakeholders should adopt. States also have very different perspectives on cyberspace and its appropriate use, with an increasing number developing offensive cybercapabilities. Cybersecurity has become an integral part of governments’ national defense and foreign and security policies and doctrines, contributing to the construction of cybersecurity as a new domain of warfare. Efforts to develop rules of the road for cyberspace focus on the applicability of existing international law, potential gaps, the development of norms, confidence-building measures, and postulating deterrence postures. As a consequence, a cybersecurity regime complex has evolved, encompassing multiple regional and international institutions that play pivotal roles in shaping policy responses. This article offers a selective list of relevant literature. The coauthors would like to thank the experts in China, India, Russia, Switzerland, and the United States who responded to their request to share their top-ten most relevant cybersecurity publications. The coauthors incorporated this feedback in their process for developing this article to reduce bias and to include international perspectives on the most-relevant English-language literature.

Read Full Text

The full text of this piece is available at Oxford University Press.

About the Authors

Tim Maurer

Former Senior Fellow, Technology and International Affairs Program

Dr. Tim Maurer was a senior fellow in Carnegie’s Technology and International Affairs program.

Hannes Ebert

Authors

Tim Maurer
Former Senior Fellow, Technology and International Affairs Program
Tim Maurer
Hannes Ebert
SecurityGlobal GovernanceTechnologyIran

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Endowment for International Peace

  • Article
    Continental Asia and the Rise of Portfolio Politics

    “Central Asia” as an analytical category is itself part of the problem. The term is a Soviet administrative inheritance, drawn along lines that served the convenience of Moscow. The Central Asian states the Soviets named no longer see themselves through this category alone and are not aligning across political blocs but are instead building external partnerships sector by sector, assigning different partners to different functions.

      Jennifer B. Murtazashvili

  • Commentary
    Carnegie Politika
    In Russia, Private Companies Have Been Left to Pick Up the Tab for Ukrainian Drone Attacks

    The cost of air defense has become an unregistered tax on revenue for businesses. While military rents are consolidated in the federal budget, the costs of defense are being spread across the balance sheets of companies and regional governments.

      Alexandra Prokopenko

  • Commentary
    The Unresolved Challenges in U.S.–India Semiconductor Cooperation

    The U.S.–India semiconductor cooperation story is well-stocked with top-level strategic intent. What remains unresolved, however, are some underlying challenges that will determine whether the cooperation actually functions. Three such friction points stand out.

      Shruti Mittal

  • Commentary
    Diwan
    Corrupted by Absolute Power

    In an interview, Marc Lynch discusses his new book decrying the post-1990 U.S.-dominated order in the Middle East.

      Michael Young

  • Tiananmen Gate with US and Chinese flags
    Commentary
    Emissary
    Trump and Xi Should Tackle a Previously Impossible AI Conversation

    Previous dialogues ended in failure. This time could be different.

      Scott Singer

Get more news and analysis from
Carnegie Endowment for International Peace
Carnegie global logo, stacked
1779 Massachusetts Avenue NWWashington, DC, 20036-2103Phone: 202 483 7600
  • Research
  • Emissary
  • About
  • Experts
  • Donate
  • Programs
  • Events
  • Blogs
  • Podcasts
  • Contact
  • Annual Reports
  • Careers
  • Privacy
  • For Media
  • Government Resources
Get more news and analysis from
Carnegie Endowment for International Peace
© 2026 Carnegie Endowment for International Peace. All rights reserved.