The Cumulative Cyber Deterrence
Turunen, M., & Kari, M. (2022). The Cumulative Cyber Deterrence. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security (17, pp. 433-439). Academic Conferences International. The proceedings of the 17th international conference on cyber warfare and security. https://doi.org/10.34190/iccws.17.1.55
Julkaistu sarjassa
The proceedings of the 17th international conference on cyber warfare and securityPäivämäärä
2022Tekijänoikeudet
© 2022 International Conference on Cyber Warfare and Security
The cumulative cyber deterrence can be seen as a concept in which increasing the weight of different means and their use increases the deterrent effect on a common level or on selected adversaries. Cumulative cyber deterrence may include all traditional options of deterrence, and can be active or passive. Active deterrence can be characterized as targeting specific threats and actors, as a deterrent consisting of several different methods, while passive deterrence is a form of deterrence commonly targeted at all the potential adversaries. The cumulative cyber deterrence can be an independent type of deterrence or part of a state’s overall deterrence. This paper approaches the concept of cumulative cyber deterrence from a military perspective. The purpose is to determine what factors can be formed by cumulative cyber deterrence. It describes how cumulative deterrence will change and be affected and what problems can be associated with that concept. The aim is to find answers to these questions by looking at the way how Israel and Russia use cumulative cyber deterrence as part of their overall deterrence. In its theoretical context, this paper is based on the theory of the character of war. Through the theory of character of war and utilizing the concept of reflexive control, an attempt is made to explain the position of cumulative cyber deterrence as part of overall deterrence. Integrative literature analysis has been used as the research method. The key conclusion of the paper is that creating a credible cyber deterrent is an affect and cost-effective way to increase overall deterrence. However, this presupposes that the state also has offensive cyber methods at its disposal and is able to credibly communicate their existence and the will to use them if necessary. The concept of cumulative cyber deterrence depends on the other means of deterrence available to the state. Both Israel and Russia have all these qualities. A key difference in the deterrence strategies of these states is that Israel uses cumulative methods to make it clear where the red lines are, while Russia’s strategic goal is to blur them
...
Julkaisija
Academic Conferences InternationalEmojulkaisun ISBN
978-1-914587-26-9Konferenssi
International Conference on Cyber Warfare and SecurityKuuluu julkaisuun
ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and SecurityISSN Hae Julkaisufoorumista
2048-9870Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/104577943
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Cyber deterrence and Russia’s active cyber defense
Turunen, Maija; Kari, Martti (Academic Conferences International, 2020) -
Theory of strategic culture : an analytical framework for Russian cyber threat perception
Kari, Martti J.; Pynnöniemi, Katri (Routledge, 2023)The strategic environment is evolving rapidly with the recognition of cyberspace as a domain of warfare. The increased interest in cyber as a part of defence has heightened the need for theoretical tools suitable to assess ... -
Protecting the besieged cyber fortress : Russia’s response to cyber threats
Kari, Martti (Academic Conferences International, 2019)The Information Security Doctrine of the Russian Federation (RF) defines the threat to information security as a complex of actions and factors that represent a danger to Russia in the information space. These threats can ... -
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
Siponen, Mikko; Soliman, Wael; Vance, Anthony (ACM, 2022)In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security ... -
Pelote Venäjän strategisissa asiakirjoissa
Hietanen, Leevi (2023)Pelote on tärkeä osa Venäjän strategista ajattelua, ja Venäjän Ukrainassa aloittama laiton hyökkäyssota on tuonut pelotteen tarkastelun uudestaan entistä ajankohtaisemmaksi. Näkyvin tapa, jolla Venäjä luo pelotettaan ovat ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.