Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Behind the Mask – Attribution of antagonists in cyberspace and its implications on international conflicts and security issues
Halmstad University, School of Education, Humanities and Social Science, Research on Education and Learning within the Department of Teacher Education (FULL).ORCID iD: 0000-0003-4402-7232
Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
Halmstad University, School of Education, Humanities and Social Science, Center for Social Analysis (CESAM).
2015 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Cyber systems and critical infrastructure are changing the dynamics of international conflicts, security issues, and challenge traditional ways of understanding warfare. Early warning and attribution of who is accountable for a cyber-attack and what is the intention with the attack is crucial information. To be able to efficiently response to a cyber-antagonist the measure of response must be decided at network speed, which is far beyond what is possible with traditional attribution methods. The ongoing “cyber arm raze” push towards the development and use of autonomous cyber response systems. An autonomous cyber response would most probably use the complexity of attack vector as a tool for attribution, not considering the identity of the antagonist for deciding the measure of response. This will challenge traditional ways of understanding conflict, war, and how nation states handle different kinds of aggressions. This leads to a new kind of deterrence increasing the need to theorize cyber conflicts, as well as empirically study how different actors are acting and reacting in relation to this new threat. This paper initiates the discourse on the implications of the use of autonomous cyber response systems for the international system/relations.

Place, publisher, year, edition, pages
2015.
National Category
Social Sciences
Identifiers
URN: urn:nbn:se:hh:diva-28047OAI: oai:DiVA.org:hh-28047DiVA: diva2:800281
Conference
International Studies Association (ISA)’s 56th Annual, Convention – Global IR and Regional Worlds. A New Agenda for International Studies, New Orleans, Louisiana, United States, February 18-21, 2015
Available from: 2015-04-02 Created: 2015-04-02 Last updated: 2015-12-10Bibliographically approved

Open Access in DiVA

fulltext(371 kB)423 downloads
File information
File name FULLTEXT01.pdfFile size 371 kBChecksum SHA-512
c3a36c4f9f11528b5502b1b32a5e5bd443dc0050f82a7f08b44d14314f8491a976594ebe8fd22b40c51e1740d57e04487a71a49143d4e9f9c68003716f4a7a47
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Stranne, FridaBilstrup, UrbanEwertsson, Lena
By organisation
Research on Education and Learning within the Department of Teacher Education (FULL)Centre for Research on Embedded Systems (CERES)Center for Social Analysis (CESAM)
Social Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 423 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 778 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf