Abstract
Much discussion of the concept of cyberwar, cyber conflict, and the changing dynamic of future security interactions is founded upon the study of what could be, conjured through spectacular flights of the imagination. The goal of this research article is to exhaustively collect information on cyber interactions between rival states in the last decade so that we can delineate the patterns of cyber conflict as reflected by evidence at the international level. The field of cyber security needs a clear return to social science in order to be able to definitively engage the cyber debate with facts, figures, and theory. To that end we provide a dataset of cyber incidents and cyber disputes that spans from 2001 to 2011. Our data include 110 cyber incidents and 45 cyber disputes. Further, we test our theory of cyber conflict which argues that restraint and regionalism should be expected, counter-intuitive to conventional wisdom. We find here that the actual magnitude and pace of cyber disputes among rivals does not match with popular perception; 20 of 126 active rivals engaged in cyber conflict. The interactions that are uncovered are limited in terms of magnitude and frequency suggesting cyber restraint. Further, most of the cyber disputes that are uncovered are regional in tone, defying the unbounded nature of cyberpower. The coming era of cyber conflict may continue to exhibit these patterns despite fears mentioned in the discourse by the media and cyber security professionals.
Get full access to this article
View all access options for this article.
References
Supplementary Material
Please find the following supplemental material available below.
For Open Access articles published under a Creative Commons License, all supplemental material carries the same license as the article it is associated with.
For non-Open Access articles published, all supplemental material carries a non-exclusive license, and permission requests for re-use of supplemental material or any part of supplemental material shall be sent directly to the copyright owner as specified in the copyright notice associated with the article.
