If you'd like to keep track of the latest scholarship in the field of cyber conflict, here's a list of all the articles published in the top 150 Poli Sci journals from Jan 2020 - Jul 2021:
@Prof_J_Branch , "What's in a Name? Metaphors and Cybersecurity" 2021 - On the cyber domain as a foundational metaphor. cambridge.org/core/journals/…
@TobiasLiebetrau & Christensen, "The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces" 2021 - on complex and transformative dynamics of ICT and new actors - cambridge.org/core/journals/…
Lilli, "Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence," 2021 - on desirability of private sector contribution to cyber deterrence tandfonline.com/doi/full/10.10…
@jeppeteglskov, "Cyber offense in NATO: Challenges and opportunities", 2021 On NATO's role in the cyber domain and ways to adapt. academic.oup.com/ia/article/97/…
@DennisBroeders & @cristiano_fab "Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy" 2021, on international diplomacy on cyber terrorism based on UN dynamics tandfonline.com/doi/full/10.10…
Calcara &Marchetti, "State-industry relations and cybersecurity governance in Europe" 2021, focuses on role private sector companies in Europe (UK & FR focus) tandfonline.com/doi/full/10.10…
@egflo @Maxwsmeets "Publicly attributing cyber attacks: a framework", 2021, Provides (policy) framework for state-level public attribution, tandfonline.com/doi/full/10.10…
Benincasa, "The Case for Cyber ‘Disarmament’ in the European Union" 2021, On the importance of arms control treaties (for the EU). tandfonline.com/doi/full/10.10…
@william_akoto, "International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks" 2021, relationship between cyber ops and trade. journals.sagepub.com/doi/full/10.11…
Schandler, Gross and Canetti, "A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel" 2021, tandfonline.com/doi/full/10.10…
@CyberMyri @egflo "Hyper-Securitization, Everyday Security Practice and Technification: Cyber-Security Logics in Switzerland," 2021, case study of Swiss cyber security 'construction' - onlinelibrary.wiley.com/doi/full/10.11…
@egflo, "Contested public attributions of cyber incidents and the role of academia" , 2020, On role academia in relation to (public) attribution through 3 cases - Sony Pictures, DNC & NotPetya tandfonline.com/doi/full/10.10…
@miltonmueller, "Against sovereignty in cyberspace," `2020, on distinct characteristics of cyberspace, its relationship with to territoriality and sovereignty. academic.oup.com/isr/article-pd…
Wilner, "US cyber deterrence: Practice guiding theory," 2020, Implementation of US deterrence, tandfonline.com/doi/full/10.10…
@CyberMyri & Wenger, "Cyber security meets security politics: Complex technology, fragmented politics, and networked science" 2021, On the study of cyber security politics (and its future) tandfonline.com/doi/full/10.10…
@harknett_uc & @Maxwsmeets, "Cyber campaigns and strategic outcomes," 2020, on cyber campaigns below the threshold of armed attack, tandfonline.com/doi/full/10.10…
@Ilina_Gva, The unexpected norm-setters: Intelligence agencies in cyberspace, 2020, On the intelligence agencies' role as norm setters in the cyber domain tandfonline.com/doi/full/10.10…
@DuncanHollis & Finnemore, "Beyond Naming and Shaming: Accusations and International Law in Cybersecurity", 2020, On how accusations offer actors a range of strategic options academic.oup.com/ejil/article/3…
@philutsc et al. "At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes" 2020, on how elections increase the number of DoS attacks in authoritarian countries journals.sagepub.com/doi/full/10.11…
@jonrlindsay "Demystifying the Quantum Threat: Infrastructure, Institutions, and Intelligence Advantage," 2020, On the promise of quantum computing, tandfonline.com/doi/full/10.10…
Schandler, Gross, Blackhouse, Canentti, "Cyber Terrorism and Public Support for Retaliation - A Multi-Country Survey Experiment," 2020, On whether exposure to cyber terrorism prompt calls for retaliatory military strikes cambridge.org/core/journals/…
Yan, "Bipolar Rivalry in the Early Digital Age," 2020, on the future of US -China rivalry, including the role of cyber ops academic.oup.com/cjip/article/1…
@jeppeteglskov, "Lacan in the US cyber defence: Between public discourse and transgressive practice," 2020, on the constitutive role of transgressive practices for security communities cambridge.org/core/journals/…
Whyte, "Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online” 2020, On escalation as second-order effect (through US 2016 case study) cambridge.org/core/journals/…
Giacomello, “Research Note: More Bucks, Still No Bangs? Why a Cost-Benefit Analysis of Cyberterrorism Still Holds True,” 2020, review last 15 years in cyberterrorism research, tandfonline.com/doi/full/10.10…
@jamessshires, “Cyber-noir: Cybersecurity and popular culture, 2020, on the incorporation of noir elements in cybersecurity expert discourses, tandfonline.com/doi/full/10.10…
Barrinha and Renard, “Power and diplomacy in the post-liberal cyberspace.” 2020, On the geopolitics of cyberspace, 2020, academic.oup.com/ia/article/96/…
@leotanczt, "50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers," 2020, on the identities, practices, and behaviors of hackers tandfonline.com/doi/full/10.10…
For an overview of earlier scholarship, here’s my initial review with @rgorwa osf.io/preprints/soca…
There is a lot more great research out there – eg. JoCS, @TXNatSecReview, @CHCyberPolicy, @ccdcoe - not captured based on my search criteria. I might do a separate thread on this at a later point in time.
For my general observations on the latest 'wave' of scholarship:

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Max Smeets

Max Smeets Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @SmeetsMWE

6 Sep
A few (initial) general observations about recent scholarship in the field of cyber conflict:
1. Massive increase in European journals & scholars publishing on cyber conflict related topics - eg @CSP_journal , @EJIntSec, @BJPolS
2. Case studies & illustrative examples have diversified (not unrelated to previous point).
Read 8 tweets
22 Mar 20
Musing about the differences and similarities between paleontologists vs. threat intel – a thread with above all unanswered Qs.
1/7 In a wonderful TEDx talk palaeontologist Jack Horner asks the question: “where are all the baby dinosaurs?” "Why is there no smaller version of a Tyrannosaurus Rex in museums?"
2/7 The answer was first provided in an article published in 1975 by Prof. Peter Dodson. He revealed that dinosaurs didn’t grow like reptiles but instead grew like birds. Bird species quickly grow to 80% of their mature size before their crest starts to grow.
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(