The country’s strategy is no longer focused on deterrence and diplomacy, it’s about dominance and degradation.
Nathan J. Brown
{
"authors": [
"Tim Maurer",
"Hannes Ebert"
],
"type": "other",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace"
],
"collections": [
"Cyber and Digital Policy"
],
"englishNewsletterAll": "ctw",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "NPP",
"programs": [
"Nuclear Policy",
"Technology and International Affairs"
],
"projects": [],
"regions": [
"Iran"
],
"topics": [
"Security",
"Global Governance",
"Technology"
]
}Source: Getty
Interest in cybersecurity in the context of international relations has never been greater.
Source: Oxford University Press
Interest in cybersecurity in the context of international relations has never been greater. To provide a resource for interested decision- and policy-makers, academics, as well as the general public, Carnegie’s Tim Maurer, who co-directs Carnegie’s Cyber Policy Initiative, and Hannes Ebert, a research fellow at the German Institute of Global and Area Studies, developed a curated list of some of the most relevant literature published on this issue in the past years. This list is complemented by short descriptive commentary for each publication and was published by Oxford Bibliographies in January 2017. This resource includes selected works published by summer 2016 divided into the following categories:
The introductory text of the article is available below and the full resource at: http://oxfordbibliographiesonline.com/view/document/obo-9780199743292/obo-9780199743292-0196.xml?
The Internet has expanded rapidly since its commercialization in the mid-1990s. In the early 21st century, a third of the world’s population has access to the technology, with another 1.5 billion expected to gain access by 2020. Moreover, the “Internet of Things” will lead to an exponential number of devices being connected to the network. As a result, the economic and political incentives to exploit the network for malicious purposes have also increased, and cybersecurity has reached head-of-state-level attention. In parallel, publications on the topic by academic, policy, industry, and military institutions have multiplied. Scholars within the international relations (IR) discipline and its subfields of security studies and strategic studies increasingly focus on the technology’s implications on national and international security. This includes studying its effect on related concepts such as power, sovereignty, global governance, and securitization. Meanwhile, the meaning of cybersecurity and information security has been highly contested. Broad definitions of the concept incorporate a wide range of cyberthreats and cyberrisks, including cyberwarfare, cyberconflict, cyberterrorism, cybercrime, and cyberespionage as well as cybercontent, while narrower conceptualizations focus on the more technical aspects relating to network and computer security. This article focuses on cybersecurity in the IR context from the perspective of political conflict, including the scholarship on cyberwarfare, cyberconflict, and cyberterrorism. The literature on cybercrime deserves a stand-alone article, as does cyberespionage from the perspective of surveillance and intelligence activities. This article references only a few publications from the latter two categories as they relate to cyberconflict. While scholars take the technology’s implications for international security increasingly seriously, they continue to disagree about the level and nature of threat and the appropriate policy responses that governments and other stakeholders should adopt. States also have very different perspectives on cyberspace and its appropriate use, with an increasing number developing offensive cybercapabilities. Cybersecurity has become an integral part of governments’ national defense and foreign and security policies and doctrines, contributing to the construction of cybersecurity as a new domain of warfare. Efforts to develop rules of the road for cyberspace focus on the applicability of existing international law, potential gaps, the development of norms, confidence-building measures, and postulating deterrence postures. As a consequence, a cybersecurity regime complex has evolved, encompassing multiple regional and international institutions that play pivotal roles in shaping policy responses. This article offers a selective list of relevant literature. The coauthors would like to thank the experts in China, India, Russia, Switzerland, and the United States who responded to their request to share their top-ten most relevant cybersecurity publications. The coauthors incorporated this feedback in their process for developing this article to reduce bias and to include international perspectives on the most-relevant English-language literature.
The full text of this piece is available at Oxford University Press.
Tim Maurer
Former Senior Fellow, Technology and International Affairs Program
Dr. Tim Maurer was a senior fellow in Carnegie’s Technology and International Affairs program.
Hannes Ebert
Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
The country’s strategy is no longer focused on deterrence and diplomacy, it’s about dominance and degradation.
Nathan J. Brown
The countries in the region are managing the fallout from Iranian strikes in a paradoxical way.
Angie Omar
In an interview, Hassan Mneimneh discusses the ongoing conflict and the myriad miscalculations characterizing it.
Michael Young
In an interview, Nicole Grajewski discusses the military dimension of the U.S. and Israeli attacks on Iran.
Michael Young
In an interview, Naysan Rafati assesses the first week that followed the U.S. and Israeli attack on Iran.
Michael Young