dc.contributor.author | Turunen, Maija | |
dc.contributor.author | Kari, Martti | |
dc.contributor.editor | Griffin, Robert P. | |
dc.contributor.editor | Tatarand, Unal | |
dc.contributor.editor | Yankson, Benjamin | |
dc.date.accessioned | 2022-03-21T10:33:39Z | |
dc.date.available | 2022-03-21T10:33:39Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Turunen, M., & Kari, M. (2022). The Cumulative Cyber Deterrence. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), <i>ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security</i> (17, pp. 433-439). Academic Conferences International. The proceedings of the 17th international conference on cyber warfare and security. <a href="https://doi.org/10.34190/iccws.17.1.55" target="_blank">https://doi.org/10.34190/iccws.17.1.55</a> | |
dc.identifier.other | CONVID_104577943 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/80266 | |
dc.description.abstract | The cumulative cyber deterrence can be seen as a concept in which increasing the weight of different means and their use increases the deterrent effect on a common level or on selected adversaries. Cumulative cyber deterrence may include all traditional options of deterrence, and can be active or passive. Active deterrence can be characterized as targeting specific threats and actors, as a deterrent consisting of several different methods, while passive deterrence is a form of deterrence commonly targeted at all the potential adversaries. The cumulative cyber deterrence can be an independent type of deterrence or part of a state’s overall deterrence. This paper approaches the concept of cumulative cyber deterrence from a military perspective. The purpose is to determine what factors can be formed by cumulative cyber deterrence. It describes how cumulative deterrence will change and be affected and what problems can be associated with that concept. The aim is to find answers to these questions by looking at the way how Israel and Russia use cumulative cyber deterrence as part of their overall deterrence. In its theoretical context, this paper is based on the theory of the character of war. Through the theory of character of war and utilizing the concept of reflexive control, an attempt is made to explain the position of cumulative cyber deterrence as part of overall deterrence. Integrative literature analysis has been used as the research method. The key conclusion of the paper is that creating a credible cyber deterrent is an affect and cost-effective way to increase overall deterrence. However, this presupposes that the state also has offensive cyber methods at its disposal and is able to credibly communicate their existence and the will to use them if necessary. The concept of cumulative cyber deterrence depends on the other means of deterrence available to the state. Both Israel and Russia have all these qualities. A key difference in the deterrence strategies of these states is that Israel uses cumulative methods to make it clear where the red lines are, while Russia’s strategic goal is to blur them | en |
dc.format.extent | 645 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | The proceedings of the 17th international conference on cyber warfare and security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | cyber deterrence | |
dc.subject.other | Russia | |
dc.subject.other | Israel | |
dc.subject.other | red lines | |
dc.title | The Cumulative Cyber Deterrence | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202203211964 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tutkintokoulutus | fi |
dc.contributor.oppiaine | Degree Education | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-914587-26-9 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 433-439 | |
dc.relation.issn | 2048-9870 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 17 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2022 International Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | International Conference on Cyber Warfare and Security | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | valtiot | |
dc.subject.yso | kybersodankäynti | |
dc.subject.yso | turvallisuuspolitiikka | |
dc.subject.yso | pelotteet | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3215 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27779 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p9566 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p10846 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/iccws.17.1.55 | |
dc.type.okm | A4 | |