A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate

I Agrafiotis, JRC Nurse, M Goldsmith… - Journal of …, 2018 - academic.oup.com
Technological advances have resulted in organizations digitalizing many parts of their
operations. The threat landscape of cyberattacks is rapidly changing and the potential …

Cyber warfare: Issues and challenges

M Robinson, K Jones, H Janicke - Computers & security, 2015 - Elsevier
The topic of cyber warfare is a vast one, with numerous sub topics receiving attention from
the research community. We first examine the most basic question of what cyber warfare is …

How social media is changing conflict

T Zeitzoff - Journal of Conflict Resolution, 2017 - journals.sagepub.com
Social media increasingly plays a role in conflict and contentious politics. Politicians,
leaders, insurgents, and protestors all have used it as a tool for communication. At the same …

[BOEK][B] Cyber mercenaries: The state, hackers, and power

T Maurer - 2018 - books.google.com
Cyber Mercenaries explores the secretive relationships between states and hackers. As
cyberspace has emerged as the new frontier for geopolitics, states have become …

Cyber security meets security politics: Complex technology, fragmented politics, and networked science

M Dunn Cavelty, A Wenger - Contemporary Security Policy, 2020 - Taylor & Francis
In the last decade, cyber incidents have become more expensive, more disruptive, and in
many cases more political, with a new body of theoretically informed research emerging in …

The hidden threat of cyber-attacks–undermining public confidence in government

R Shandler, MA Gomez - Journal of Information Technology & …, 2023 - Taylor & Francis
This paper argues that the primary threat posed by cyber-attacks is not cataclysmic physical
destruction-but rather more insidious societal risks such as reduced trust in government. To …

[BOEK][B] The cybersecurity dilemma: Hacking, trust, and fear between nations

B Buchanan - 2016 - books.google.com
Why do nations break into one another's most important computer networks? There is an
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …

Cyber campaigns and strategic outcomes

RJ Harknett, M Smeets - Journal of Strategic Studies, 2022 - Taylor & Francis
While much focus has remained on the concept of cyberwar, what we have been observing
in actual cyber behaviour are campaigns comprised of linked cyber operations, with the …

Publicly attributing cyber attacks: a framework

FJ Egloff, M Smeets - Journal of Strategic Studies, 2023 - Taylor & Francis
When should states publicly attribute cyber intrusions? Whilst this is a question governments
increasingly grapple with, academia has hardly helped in providing answers. This article …