ECPR

Install the app

Install this application on your home screen for quick and easy access when you’re on the go.

Just tap Share then “Add to Home Screen”

ECPR

Install the app

Install this application on your home screen for quick and easy access when you’re on the go.

Just tap Share then “Add to Home Screen”

Cybersecurity, Conflict and the State

Conflict
Cyber Politics
International Relations
Security
Internet
National Perspective
State Power
P098
Wolf J. Schünemann
University of Hildesheim
Myriam Dunn Cavelty
ETH Zurich

Building: VMP 9, Floor: 1, Room: B136

Friday 14:00 - 15:40 CEST (24/08/2018)

Abstract

While state authority has been challenged in almost the entire spectrum of internet governance issues, cybersecurity clearly differs in this respect. When it comes to cyber-attacks, espionage and all kinds of malevolent behavior online that might be included in a wide concept of cybersecurity the role of the state is still crucial. Even though attribution is often enough unclear or difficult, states appear as attackers or victims, often both as part of conflict dyads, as sponsors of hacktivism and propaganda, and of course as protectors of citizens and businesses on their territory against all kinds of ‘threats coming from abroad’. With this panel we combine a number of promising papers in order to discuss and redefine the role of states and inter-state conflict in cybersecurity. • How did states adapt to cybersecurity risks? • Which offensive or defensive capabilities do states develop? • How do they approach the challenge of attribution? • Which multilateral efforts do they take to avoid cyber conflict or arms race? We include theoretical or empirical papers that address one or several of the questions listed or cover related topics.

Title Details
Safeguarding Political IT-Infrastructures – Deterrence Revisited View Paper Details
The Politics of Public Attribution View Paper Details
Cybersecurities: Understanding Different Logics of German Cybersecurity Policies View Paper Details
Damned if You Do, Damned if You Don’t: An Experimental Analysis of State Response to Cyber Operations View Paper Details
International Cybersecurity Norm Development: The Role of States View Paper Details