If you'd like to keep track of the latest scholarship in the field of cyber conflict, here's a list of all the articles published in the top 150 Poli Sci journals from Jan 2020 - Jul 2021:
@TobiasLiebetrau & Christensen, "The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces" 2021 - on complex and transformative dynamics of ICT and new actors - cambridge.org/core/journals/…
Lilli, "Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence," 2021 - on desirability of private sector contribution to cyber deterrence tandfonline.com/doi/full/10.10…
@DennisBroeders & @cristiano_fab "Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy" 2021, on international diplomacy on cyber terrorism based on UN dynamics tandfonline.com/doi/full/10.10…
Calcara &Marchetti, "State-industry relations and cybersecurity governance in Europe" 2021, focuses on role private sector companies in Europe (UK & FR focus) tandfonline.com/doi/full/10.10…
Benincasa, "The Case for Cyber ‘Disarmament’ in the European Union" 2021, On the importance of arms control treaties (for the EU). tandfonline.com/doi/full/10.10…
@william_akoto, "International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks" 2021, relationship between cyber ops and trade. journals.sagepub.com/doi/full/10.11…
Schandler, Gross and Canetti, "A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel" 2021, tandfonline.com/doi/full/10.10…
@CyberMyri@egflo "Hyper-Securitization, Everyday Security Practice and Technification: Cyber-Security Logics in Switzerland," 2021, case study of Swiss cyber security 'construction' - onlinelibrary.wiley.com/doi/full/10.11…
@egflo, "Contested public attributions of cyber incidents and the role of academia" , 2020, On role academia in relation to (public) attribution through 3 cases - Sony Pictures, DNC & NotPetya tandfonline.com/doi/full/10.10…
@miltonmueller, "Against sovereignty in cyberspace," `2020, on distinct characteristics of cyberspace, its relationship with to territoriality and sovereignty. academic.oup.com/isr/article-pd…
Wilner, "US cyber deterrence: Practice guiding theory," 2020, Implementation of US deterrence, tandfonline.com/doi/full/10.10…
@CyberMyri & Wenger, "Cyber security meets security politics: Complex technology, fragmented politics, and networked science" 2021, On the study of cyber security politics (and its future) tandfonline.com/doi/full/10.10…
@Ilina_Gva, The unexpected norm-setters: Intelligence agencies in cyberspace, 2020, On the intelligence agencies' role as norm setters in the cyber domain tandfonline.com/doi/full/10.10…
@DuncanHollis & Finnemore, "Beyond Naming and Shaming: Accusations and International Law in Cybersecurity", 2020, On how accusations offer actors a range of strategic options academic.oup.com/ejil/article/3…
@philutsc et al. "At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes" 2020, on how elections increase the number of DoS attacks in authoritarian countries journals.sagepub.com/doi/full/10.11…
@jonrlindsay "Demystifying the Quantum Threat: Infrastructure, Institutions, and Intelligence Advantage," 2020, On the promise of quantum computing, tandfonline.com/doi/full/10.10…
Schandler, Gross, Blackhouse, Canentti, "Cyber Terrorism and Public Support for Retaliation - A Multi-Country Survey Experiment," 2020, On whether exposure to cyber terrorism prompt calls for retaliatory military strikes cambridge.org/core/journals/…
Yan, "Bipolar Rivalry in the Early Digital Age," 2020, on the future of US -China rivalry, including the role of cyber ops academic.oup.com/cjip/article/1…
@jeppeteglskov, "Lacan in the US cyber defence: Between public discourse and transgressive practice," 2020, on the constitutive role of transgressive practices for security communities cambridge.org/core/journals/…
Whyte, "Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online” 2020, On escalation as second-order effect (through US 2016 case study) cambridge.org/core/journals/…
Giacomello, “Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True,” 2020, review last 15 years in cyberterrorism research, tandfonline.com/doi/full/10.10…
Barrinha and Renard, “Power and diplomacy in the post-liberal cyberspace.” 2020, On the geopolitics of cyberspace, 2020, academic.oup.com/ia/article/96/…
@leotanczt, "50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers," 2020, on the identities, practices, and behaviors of hackers tandfonline.com/doi/full/10.10…
There is a lot more great research out there – eg. JoCS, @TXNatSecReview, @CHCyberPolicy, @ccdcoe - not captured based on my search criteria. I might do a separate thread on this at a later point in time.
For my general observations on the latest 'wave' of scholarship:
Musing about the differences and similarities between paleontologists vs. threat intel – a thread with above all unanswered Qs.
1/7 In a wonderful TEDx talk palaeontologist Jack Horner asks the question: “where are all the baby dinosaurs?” "Why is there no smaller version of a Tyrannosaurus Rex in museums?"
2/7 The answer was first provided in an article published in 1975 by Prof. Peter Dodson. He revealed that dinosaurs didn’t grow like reptiles but instead grew like birds. Bird species quickly grow to 80% of their mature size before their crest starts to grow.