• Research
  • Emissary
  • About
  • Experts
Carnegie Global logoCarnegie lettermark logo
DemocracyIran
  • Donate
{
  "authors": [
    "Tim Maurer",
    "Hannes Ebert"
  ],
  "type": "other",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "Cyber and Digital Policy"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "NPP",
  "programs": [
    "Nuclear Policy",
    "Technology and International Affairs"
  ],
  "projects": [],
  "regions": [
    "Iran"
  ],
  "topics": [
    "Security",
    "Global Governance",
    "Technology"
  ]
}

Source: Getty

Other

International Relations and Cyber Security: Carnegie Contribution to Oxford Bibliographies

Interest in cybersecurity in the context of international relations has never been greater.

Link Copied
By Tim Maurer and Hannes Ebert
Published on Jan 11, 2017
Program mobile hero image

Program

Nuclear Policy

The Nuclear Policy Program aims to reduce the risk of nuclear war. Our experts diagnose acute risks stemming from technical and geopolitical developments, generate pragmatic solutions, and use our global network to advance risk-reduction policies. Our work covers deterrence, disarmament, arms control, nonproliferation, and nuclear energy.

Learn More
Program mobile hero image

Program

Technology and International Affairs

The Technology and International Affairs Program develops insights to address the governance challenges and large-scale risks of new technologies. Our experts identify actionable best practices and incentives for industry and government leaders on artificial intelligence, cyber threats, cloud security, countering influence operations, reducing the risk of biotechnologies, and ensuring global digital inclusion.

Learn More

Source: Oxford University Press

Interest in cybersecurity in the context of international relations has never been greater. To provide a resource for interested decision- and policy-makers, academics, as well as the general public, Carnegie’s Tim Maurer, who co-directs Carnegie’s Cyber Policy Initiative, and Hannes Ebert, a research fellow at the German Institute of Global and Area Studies, developed a curated list of some of the most relevant literature published on this issue in the past years. This list is complemented by short descriptive commentary for each publication and was published by Oxford Bibliographies in January 2017. This resource includes selected works published by summer 2016 divided into the following categories:

  • General Overviews
  • Journals
  • Online Resources and Blogs
  • International-Relations Perspectives on Cybersecurity
  • Cyberthreats and Cyberrisks
  • Geopolitics of Cybersecurity
  • Laws, Norms, and Response Mechanisms in Cybersecurity
  • International Institutions

The introductory text of the article is available below and the full resource at: http://oxfordbibliographiesonline.com/view/document/obo-9780199743292/obo-9780199743292-0196.xml?

Introduction

The Internet has expanded rapidly since its commercialization in the mid-1990s. In the early 21st century, a third of the world’s population has access to the technology, with another 1.5 billion expected to gain access by 2020. Moreover, the “Internet of Things” will lead to an exponential number of devices being connected to the network. As a result, the economic and political incentives to exploit the network for malicious purposes have also increased, and cybersecurity has reached head-of-state-level attention. In parallel, publications on the topic by academic, policy, industry, and military institutions have multiplied. Scholars within the international relations (IR) discipline and its subfields of security studies and strategic studies increasingly focus on the technology’s implications on national and international security. This includes studying its effect on related concepts such as power, sovereignty, global governance, and securitization. Meanwhile, the meaning of cybersecurity and information security has been highly contested. Broad definitions of the concept incorporate a wide range of cyberthreats and cyberrisks, including cyberwarfare, cyberconflict, cyberterrorism, cybercrime, and cyberespionage as well as cybercontent, while narrower conceptualizations focus on the more technical aspects relating to network and computer security. This article focuses on cybersecurity in the IR context from the perspective of political conflict, including the scholarship on cyberwarfare, cyberconflict, and cyberterrorism. The literature on cybercrime deserves a stand-alone article, as does cyberespionage from the perspective of surveillance and intelligence activities. This article references only a few publications from the latter two categories as they relate to cyberconflict. While scholars take the technology’s implications for international security increasingly seriously, they continue to disagree about the level and nature of threat and the appropriate policy responses that governments and other stakeholders should adopt. States also have very different perspectives on cyberspace and its appropriate use, with an increasing number developing offensive cybercapabilities. Cybersecurity has become an integral part of governments’ national defense and foreign and security policies and doctrines, contributing to the construction of cybersecurity as a new domain of warfare. Efforts to develop rules of the road for cyberspace focus on the applicability of existing international law, potential gaps, the development of norms, confidence-building measures, and postulating deterrence postures. As a consequence, a cybersecurity regime complex has evolved, encompassing multiple regional and international institutions that play pivotal roles in shaping policy responses. This article offers a selective list of relevant literature. The coauthors would like to thank the experts in China, India, Russia, Switzerland, and the United States who responded to their request to share their top-ten most relevant cybersecurity publications. The coauthors incorporated this feedback in their process for developing this article to reduce bias and to include international perspectives on the most-relevant English-language literature.

Read Full Text

The full text of this piece is available at Oxford University Press.

About the Authors

Tim Maurer

Former Senior Fellow, Technology and International Affairs Program

Dr. Tim Maurer was a senior fellow in Carnegie’s Technology and International Affairs program.

Hannes Ebert

Authors

Tim Maurer
Former Senior Fellow, Technology and International Affairs Program
Tim Maurer
Hannes Ebert
SecurityGlobal GovernanceTechnologyIran

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Endowment for International Peace

  • Article
    India’s Oil Security Strategy: Structural Vulnerabilities and Strategic Choices

    This piece argues that the present Indian strategy, based on opportunistic diversification and utilization of limited strategic reserves, remains inadequate when confronting supply disruptions. It evaluates India’s options in the short, medium, and long terms.

      Vrinda Sahai

  • flood wall
    Commentary
    Emissary
    BRIC Is Critical for U.S. National Security. After a Yearlong Legal Battle, It’s Back.

    Its reinstatement should be celebrated, but it retains some major shortcomings.

      Leonardo Martinez-Diaz

  • Article
    Leveraging Internal Security Cooperation with Vietnam Offers a Glimpse of Future Chinese Diplomacy with Southeast Asia

    Despite long-standing differences, China and Vietnam are reinforcing common ground for collaboration, especially in public security. This internal security–centered diplomacy offers a strengthened road map for how China moves forward with Southeast Asia.

      Sophie Zhuang

  • Aerial shot of island community
    Commentary
    One Year After the Great Aid Recession, Investments in Climate Mobility Offer Cost-Effective Returns

    Climate mobility interventions can vary, but they all present opportunities to unlock transformative results that mitigate costs associated with inaction.

      • Alejandro Rodriguez

      Alejandro Martin Rodriguez

  • Commentary
    Carnegie Politika
    Is There a Place for Russia in the New Race Back to the Moon?

    Despite having the resources and expertise, the Russian space industry missed the opportunity to offer the United States or China a mutually rewarding partnership in the lunar race.

      Georgy Trishkin

Get more news and analysis from
Carnegie Endowment for International Peace
Carnegie global logo, stacked
1779 Massachusetts Avenue NWWashington, DC, 20036-2103Phone: 202 483 7600Fax: 202 483 1840
  • Research
  • Emissary
  • About
  • Experts
  • Donate
  • Programs
  • Events
  • Blogs
  • Podcasts
  • Contact
  • Annual Reports
  • Careers
  • Privacy
  • For Media
  • Government Resources
Get more news and analysis from
Carnegie Endowment for International Peace
© 2026 Carnegie Endowment for International Peace. All rights reserved.