Activate Activate Activate
contact  
Hello. Sign in to personalize your visit. New user? Register now.  





In
By author

International Security

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

Erik Gartzke

Erik Gartzke is Associate Professor of Political Science at the University of California, San Diego, and Professor of Government at the University of Essex.

PDF (133.657 KB) | PDF Plus (200.541 KB) | ePub (172 KB) | Supplementary Material

Cyberwar has been described as a revolution in military affairs, a transformation of technology and doctrine capable of overturning the prevailing world order. This characterization of the threat from cyberwar, however, reflects a common tendency to conflate means and ends; studying what could happen in cyberspace (or anywhere else) makes little sense without considering how conflict over the internet is going to realize objectives commonly addressed by terrestrial warfare. To supplant established modes of conflict, cyberwar must be capable of furthering the political ends to which force or threats of force are commonly applied, something that in major respects cyberwar fails to do. As such, conflict over the internet is much more likely to serve as an adjunct to, rather than a substitute for, existing modes of terrestrial force. Indeed, rather than threatening existing political hierarchies, cyberwar is much more likely to simply augment the advantages of status quo powers.

Cited by

Fiona B. Adamson. (2016) Spaces of Global Security: Beyond Methodological Nationalism. Journal of Global Security Studies 119-35.
Online publication date: 1-Feb-2016.
CrossRef
Jon R. Lindsay. (2015) Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecuritytyv003.
Online publication date: 27-Nov-2015.
CrossRef
Michael Robinson, Kevin Jones, Helge Janicke. (2015) Cyber warfare: Issues and challenges. Computers & Security 4970-94.
Online publication date: 1-Mar-2015.
CrossRef
Jon R. Lindsay. (2015) The Impact of China on Cybersecurity: Fiction and Friction. International Security 39:37-47.
Online publication date: 18-Feb-2015.
Abstract | Full Text | PDF (389 KB) | PDF Plus (442 KB) | Supplementary Content | ePub (411 KB) 
Jon R. Lindsay, Lucas Kello. (2014) Correspondence: A Cyber Disagreement. International Security 39:2181-192.
Online publication date: 21-Nov-2014.
Citation | Full Text | PDF (77 KB) | PDF Plus (90 KB) | ePub (273 KB) 
Nir Kshetri. (2014) Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses. East Asia 31183-201.
Online publication date: 1-Sep-2014.
CrossRef
Tanisha M. Fazal. (2014) Dead Wrong?: Battle Deaths, Military Medicine, and Exaggerated Reports of War's Demise. International Security 39:195-125.
Online publication date: 28-Aug-2014.
Abstract | Full Text | PDF (172 KB) | PDF Plus (198 KB) | Supplementary Content | ePub (227 KB) 
Michael C. Horowitz. (2014) Coming next in military tech. Bulletin of the Atomic Scientists 7054-62.
Online publication date: 1-Jan-2014.
CrossRef
Michael Robinson, Kevin Jones, Helge Janicke. Cyber Warfare:. Cybersecurity Policies and Strategies for Cyberwarfare Prevention13-36.
CrossRef
Technology Partner - Atypon Systems, Inc.
  CrossRef member COUNTER member