Cyber Security
- LAST REVIEWED: 07 July 2020
- LAST MODIFIED: 11 January 2017
- DOI: 10.1093/obo/9780199743292-0196
- LAST REVIEWED: 07 July 2020
- LAST MODIFIED: 11 January 2017
- DOI: 10.1093/obo/9780199743292-0196
Introduction
The Internet has expanded rapidly since its commercialization in the mid-1990s. In the early 21st century, a third of the world’s population has access to the technology, with another 1.5 billion expected to gain access by 2020. Moreover, the “Internet of Things” will lead to an exponential number of devices being connected to the network. As a result, the economic and political incentives to exploit the network for malicious purposes have also increased, and cybersecurity has reached head-of-state-level attention. In parallel, publications on the topic by academic, policy, industry, and military institutions have multiplied. Scholars within the international relations (IR) discipline and its subfields of security studies and strategic studies increasingly focus on the technology’s implications on national and international security. This includes studying its effect on related concepts such as power, sovereignty, global governance, and securitization. Meanwhile, the meaning of cybersecurity and information security has been highly contested. Broad definitions of the concept incorporate a wide range of cyberthreats and cyberrisks, including cyberwarfare, cyberconflict, cyberterrorism, cybercrime, and cyberespionage as well as cybercontent, while narrower conceptualizations focus on the more technical aspects relating to network and computer security. This article focuses on cybersecurity in the IR context from the perspective of political conflict, including the scholarship on cyberwarfare, cyberconflict, and cyberterrorism. The literature on cybercrime deserves a stand-alone article, as does cyberespionage from the perspective of surveillance and intelligence activities. This article references only a few publications from the latter two categories as they relate to cyberconflict. While scholars take the technology’s implications for international security increasingly seriously, they continue to disagree about the level and nature of threat and the appropriate policy responses that governments and other stakeholders should adopt. States also have very different perspectives on cyberspace and its appropriate use, with an increasing number developing offensive cybercapabilities. Cybersecurity has become an integral part of governments’ national defense and foreign and security policies and doctrines, contributing to the construction of cybersecurity as a new domain of warfare. Efforts to develop rules of the road for cyberspace focus on the applicability of existing international law, potential gaps, the development of norms, confidence-building measures, and postulating deterrence postures. As a consequence, a cybersecurity regime complex has evolved, encompassing multiple regional and international institutions that play pivotal roles in shaping policy responses. This article offers a selective list of relevant literature. The coauthors would like to thank the experts in China, India, Russia, Switzerland, and the United States who responded to their request to share their top-ten most relevant cybersecurity publications. The coauthors incorporated this feedback in their process for developing this article to reduce bias and to include international perspectives on the most-relevant English-language literature.
General Overviews
Since 2007, a number of in-depth, book-length studies have been published that build on the largely conceptual and hypothetical literature of the 1990s on information security and its evolution and focus on cybersecurity. There had been a noteworthy gap and shift in the literature following the 9/11 terrorist attacks, until the high-profile cyberincidents toward the end of the first decade of the 21st century reignited interest and scholarship on cybersecurity. Singer and Friedman 2014 offers a highly accessible introduction to definitions, relevance, and policies of cybersecurity. Segal 2016 describes how the expansion of the Internet reshapes traditional forms and rules of international power struggles more broadly and ushers in a new era of geopolitics. The history of this development is the focus of a strategic dossier compiled by the London-based International Institute for Strategic Studies (Tikk-Ringas 2015), detailing the technology’s evolution and political implications starting with the 1950s. Healey 2013, a historical account of cyberconflict, argues that the first cyberincident occurred in 1986, and it deduces lessons from ten major incidents that followed thereafter for early-21st-century cybersecurity debates. The limitations and benefits of various historical analogies to other military domains for understanding and improving cybersecurity are discussed extensively in Goldman and Arquilla 2014. In-depth discussions of the implications of cybersecurity include Libicki 2007, with Kramer, et al. 2009 providing a strategic framework for US cybersecurity policymaking. Clark, et al. 2014 presents a comprehensive catalogue of relevant research and policy questions informed by the authors’ technical expertise.
Clark, David, Thomas Berson, and Herbert Lin, eds. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues. Washington, DC: National Academic Press, 2014.
Reviews key cybersecurity policy challenges from a technically informed perspective of three leading scholars at the nexus of information technology and policy. Fully readable and highly accessible online.
Goldman, Emily O., and John Arquilla, eds. Cyber Analogies. Monterey, CA: Naval Postgraduate School, 2014.
Edited volume sponsored by the US Cyber Command assessing the value of historical and cross-domain analogies, ranging from military surprise attacks and nuclear planning to economic warfare, air defense, and offense-defense balances. Fascinating testimony of how analysts and practitioners seek to understand and solve problems in a nascent, understudied area perceived as vitally important.
Healey, Jason, ed. A Fierce Domain: Conflict in Cyberspace, 1986 to 2012. Vienna: Cyber Conflict Studies Association, 2013.
One of the first comprehensive historical accounts of cyberconflict, written from the practitioner’s perspective of a former member of the US Air Force. The edited volume includes systematic analyses of ten case studies of important cyberconflicts between 1986 and 2012.
Kramer, Franklin D., Stuart H. Starr, and Larry Wentz, eds. Cyberpower and National Security. Washington, DC: Potomac, 2009.
This comprehensive edited volume develops conceptual policy recommendations for how the US government should strategically use cyberpower to enhance its national and security interests. Key compendium of US military, scholarly, and industry voices on a broad range of policy issues.
Libicki, Martin C. Conquest in Cyberspace: National Security and Information Warfare. Cambridge, UK: Cambridge University Press, 2007.
An early and important analysis of the prospects for information warfare. The author contends that threats to information systems, including in the areas of defense and command and control, are exaggerated, since control over these is difficult to sustain.
Segal, Adam. The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. New York: PublicAffairs, 2016.
A nonalarmist account of how cyberconflict and competition evolve internationally, written by a China expert. Argues that cyberattacks pose less of a threat of bodily harm but more to infrastructures such as financial institutions, power grids, and security networks and that the post-pax digital Americana order will once again be dominated by geopolitical maneuvers.
Singer, Peter W., and Allan Friedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. What Everyone Needs to Know. Oxford: Oxford University Press, 2014.
Highly readable, informative, and accessible entry point, with its own website providing a detailed table of contents and discussion questions. Explores “How It All Works,” “Why It Matters,” and “What Can We Do?” Contends that transnational cyberthreats increasingly undermine the prospects for effective international cooperation, which requires building more-resilient systems.
Tikk-Ringas, Eneken, ed. Evolution of the Cyber Domain: The Implications for National and Global Security. London: Routledge, 2015.
This comprehensive historical analysis illustrates key developments and trends shaping cybersecurity since the inception of computer networking in the 1950s. Dedicates separate chapters to each decade as well as to the themes of Internet governance, normative approaches to cybersecurity, intelligence, and military affairs. Attaches appendixes on international instruments and standards.
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
Article
- Academic Theories of International Relations Since 1945
- Alliances
- Al-Qaeda in the Islamic Maghreb
- Al-Shabaab
- Arab-Israeli Wars
- Arab-Israeli Wars, 1967-1973, The
- Armed Conflicts/Violence against Civilians Data Sets
- Arms Control
- Arms Races
- Arms Trade
- Asylum Policies
- Audience Costs and the Credibility of Commitments
- Authoritarian Regimes
- Balance of Power Theory
- Bargaining Theory of War
- Battle
- Boko Haram
- Brazilian Foreign Policy, The Politics of
- Canadian Foreign Policy
- Case Study Methods in International Relations
- Casualties and Politics
- Causation in International Relations
- Central Europe
- Challenge of Communism, The
- China and Japan
- China's Defense Policy
- China’s Foreign Policy
- Chinese Approaches to Strategy
- Cities and International Relations
- Civil Resistance
- Civil Society in the European Union
- Cold War, The
- Colonialism
- Comparative Foreign Policy Security Interests
- Comparative Regionalism
- Complex Systems Approaches to Global Politics
- Conflict Behavior and the Prevention of War
- Conflict Management
- Conflict Management in the Middle East
- Constructivism
- Contemporary Shia–Sunni Sectarian Violence
- Corruption
- Counterinsurgency
- Countermeasures in International Law
- Coups and Mutinies
- Criminal Law, International
- Critical Theory of International Relations
- Cuban Missile Crisis, The
- Cultural Diplomacy
- Cyber Security
- Cyber Warfare
- Decision-Making, Poliheuristic Theory of
- Demobilization, Post World War I
- Democracies and World Order
- Democracy and Conflict
- Democracy in World Politics
- Deterrence Theory
- Development
- Diasporas
- Digital Diplomacy
- Diplomacy
- Diplomacy, Gender and
- Diplomacy, History of
- Diplomacy in the ASEAN
- Diplomacy, Public
- Disaster Diplomacy
- Diversionary Theory of War
- Drone Warfare
- Eastern Front (World War I)
- Economic Coercion and Sanctions
- Economics, International
- Embedded Liberalism
- Emerging Powers and BRICS
- Emotions
- Empirical Testing of Formal Models
- Energy and International Security
- Environmental Peacebuilding
- Epidemic Diseases and their Effects on History
- Ethics and Morality in International Relations
- Ethnicity in International Relations
- European Migration Policy
- European Security and Defense Policy, The
- European Union as an International Actor
- European Union, International Relations of the
- Experiments
- Face-to-Face Diplomacy
- Fascism, The Challenge of
- Feminist Methodologies in International Relations
- Feminist Security Studies
- Food Security
- Forecasting in International Relations
- Foreign Aid and Assistance
- Foreign Direct Investment
- Foreign Policy Decision-Making
- Foreign Policy of Non-democratic Regimes
- Foreign Policy of Saudi Arabia
- Foreign Policy, Theories of
- French Empire, 20th-Century
- From Club to Network Diplomacy
- Future of NATO
- Game Theory and Interstate Conflict
- Gender and Terrorism
- Genocide
- Genocide, Politicide, and Mass Atrocities Against Civilian...
- Genocides, 20th Century
- Geopolitics and Geostrategy
- Germany in World War II
- Global Citizenship
- Global Civil Society
- Global Constitutionalism
- Global Environmental Politics
- Global Ethic of Care
- Global Governance
- Global Justice, Western Perspectives
- Globalization
- Governance of the Arctic
- Grand Strategy
- Greater Middle East, The
- Greek Crisis
- Hague Conferences (1899, 1907)
- Hegemony
- Hezbollah
- Hierarchies in International Relations
- History and International Relations
- Human Nature in International Relations
- Human Rights
- Human Rights and Humanitarian Diplomacy
- Human Rights, Feminism and
- Human Rights Law
- Human Security
- Hybrid Warfare
- Ideal Diplomat, The
- Idealism
- Identity and Foreign Policy
- Ideology, Values, and Foreign Policy
- Illicit Trade and Smuggling
- Imperialism
- Indian Foreign Policy
- Indian Perspectives on International Relations, War, and C...
- Indigenous Rights
- Industrialization
- Intelligence
- Intelligence Oversight
- Internal Displacement
- International Conflict Settlements, The Durability of
- International Criminal Court, The
- International Economic Organizations (IMF and World Bank)
- International Health Governance
- International Justice, Theories of
- International Law
- International Monetary Relations, History of
- International Negotiation and Conflict Resolution
- International Nongovernmental Organizations
- International Norms for Cultural Preservation and Cooperat...
- International Organizations
- International Relations, Aesthetic Turn in
- International Relations as a Social Science
- International Relations, Practice Turn in
- International Relations, Research Ethics in
- International Relations Theory
- International Security
- International Society
- International Society, Theorizing
- International Support For Nonstate Armed Groups
- Internet Law
- Interstate Cooperation Theory and International Institutio...
- Intervention and Use of Force
- Interviews and Focus Groups
- Iran, Politics and Foreign Policy
- Iraq: Past and Present
- Japanese Foreign Policy
- Just War Theory
- Korean War
- Kurdistan and Kurdish Politics
- Law of the Sea
- Laws of War
- Leadership in International Affairs
- Leadership Personality Characteristics and Foreign Policy
- League of Nations
- Lean Forward and Pull Back Options for US Grand Strategy
- Liberalism
- Marxism
- Mediation and Civil Wars
- Mediation in International Conflicts
- Mediation via International Organizations
- Memory and World Politics
- Mercantilism
- Middle East, The Contemporary
- Middle East, The Contemporary
- Middle Powers and Regional Powers
- Military Science
- Minorities in the Middle East
- Minority Rights
- Morality in Foreign Policy
- Multilateralism (1992–), Return to
- National Liberation, International Law and Wars of
- National Security Act of 1947, The
- Nation-Building
- Nations and Nationalism
- NATO
- NATO, Europe, and Russia: Security Issues and the Border R...
- Natural Resources, Energy Politics, and Environmental Cons...
- Neorealism
- New Multilateralism in the Early 21st Century
- Nigeria
- Nonproliferation and Counterproliferation
- Nonviolent Resistance Datasets
- Normative Aspects of International Peacekeeping
- Normative Power Beyond the Eurocentric Frame
- Peace Education in Post-Conflict Zones
- Peace of Utrecht
- Peacebuilding, Post-Conflict
- Peacekeeping
- Piracy
- Political Demography
- Political Economy of National Security
- Political Extremism in Sub-Saharan Africa
- Political Learning and Socialization
- Political Psychology
- Politics and Islam in Turkey
- Politics and Nationalism in Cyprus
- Politics of Extraction: Theories and New Concepts for Crit...
- Politics of Resilience
- Popuism and Global Politics
- Popular Culture and International Relations
- Post-Civil War State
- Post-Conflict and Transitional Justice
- Post-Conflict Reconciliation in the Middle East and North ...
- Power Transition Theory
- Preventive War and Preemption
- Prisoners, Treatment of
- Private Military and Security Companies (PMSCs)
- Process Tracing Methods
- Pro-Government Militias
- Proliferation
- Prospect Theory in International Relations
- Psychoanalysis in Global Politics and International Relati...
- Psychology and Foreign Policy
- Public Opinion and Foreign Policy
- Public Opinion and the European Union
- Quantum Social Science
- Race and International Relations
- Realism
- Rebel Governance
- Reconciliation
- Reflexivity and International Relations
- Religion and International Relations
- Religiously Motivated Violence
- Reputation in International Relations
- Responsibility to Protect
- Rising Powers in World Politics
- Role Theory in International Relations
- Russian Foreign Policy
- Russian Revolutions and Civil War, 1917–1921
- Sanctions
- Sanctions in International Law
- Science Diplomacy
- Second Sino-Japanese War (1937-1945), The
- Secrecy and Diplomacy
- Securitization
- Self-Determination
- Shining Path
- Sinophone and Japanese International Relations Theory
- Social Scientific Theories of Imperialism
- Sovereignty
- Soviet Union in World War II
- Space Strategy, Policy, and Power
- Spatial Dependencies and International Mediation
- State Theory in International Relations
- Statehood
- Status in International Relations
- Strategic Air Power
- Strategic and Net Assessments
- Sub-Saharan Africa, Conflict Formations in
- Sustainable Development
- Systems Theory
- Teaching International Relations
- Territorial Disputes
- Terrorism
- Terrorism and Poverty
- Terrorism, Geography of
- Terrorist Financing
- Terrorist Group Strategies
- The Changing Nature of Diplomacy
- The Politics and Diplomacy of Neutrality
- The Politics and Diplomacy of the First World War
- The Queer in/of International Relations
- the Twenty-First Century, Alliance Commitments in
- The Vienna Conventions on Diplomatic and Consular Relation...
- Theories of International Relations, Feminist
- Theory, Chinese International Relations
- Time Series Approaches to International Affairs
- Trade Law
- Transnational Actors
- Transnational Law
- Transnational Social Movements
- Trust and International Relations
- Turkey
- UN Security Council
- United Nations, The
- United States and Asia, The
- Uppsala Conflict Data Program
- US and Africa
- US–UK Special Relationship
- Voluntary International Migration
- War
- War of the Spanish Succession (1701-1714)
- Weapons of Mass Destruction
- Western Balkans
- Western Front (World War I)
- Westphalia, Peace of (1648)
- Women and Peacemaking Peacekeeping
- World Economy 1919-1939
- World Polity School
- World War II Diplomacy and Political Relations
- World-System Theory