The role of effects, saliencies and norms in US Cyberwar doctrine

نویسندگان

  • Henry Farrell
  • Charles L. Glaser
چکیده

The US approach to cybersecurity implicitly rests on an effects-based logic. That is, it presumes that the key question determining how the US and others will respond to attacks is what effects they have. Whether the effects come about as a result of cyber means or kinetic means is largely irrelevant. In this article, we explore this logic further, focusing on the question of when the US should deploy cyber responses and when kinetic. We find that under a simple effects-based logic, kinetic responses will often be more effective than cyber responses, although we explain that cyber attacks that ’leave something to chance’ may be an effective deterrent under some circumstances. We next develop a richer understandings of actors’ expectations by employing the concepts of focal points and saliencies. In this framework, kinetic responses may be considered too escalatory, and therefore less attractive under many circumstances. If there are ’focal points’ emerging, under which cyber attacks are seen as qualitatively distinct from kinetic attacks, then crossing a saliency may appear escalatory, even if the actual effects of the kinetic and cyber attackes are identifical. Finally, we examine nascent norms around cyber, suggesting that the US may wish to consider promoting a norm against large scale attacks on civilian infrastructure, and evaluating the prospects for a norm against cyber attacks on nuclear command and control systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بررسی نقش سه عارف خطّه قومس در حفظ و استمرار اندیشه خسروانی و حکمت اشراق

Bayazid Bastami, Abu al-Hasan Kharaqāni and ‘Alā al-Dowlah Semnāni are three distinguished Iranian mystics who lived in Ghomess Province. They have significant places in Islamic mysticism. A dominant concept in their works is the concept of Light, which is even observable in the titles of their works. Bayazid and Kharaqani named their works al-Noor and Noor al-Oloom respectively. Relying ...

متن کامل

The Role of Sociolinguistics in Second Language Acquisition

Learning a new language also involves learning a broad system of norms for social relations.This study broadly showed how EFL learners’ speech act is conveyed from their nativecultures when they are communicating in English and demonstrated that there are somepossibilities of cross-cultural misunderstanding when interlocutors are engaged in the speechact of complimenting with native speakers of...

متن کامل

بررسی آموزه‌ی اثر دوگانه و نقش قصد در قضاوت اخلاقی

Ethical research and theories assign great importance to the role of intention in passing moral judgments about individuals’ actions. The doctrine of double effect is among ethical disciplines that differentiate between controversial medical situations such as end of life care or abortion, and intentional, premeditated damage, in that they consider the former impermissible and the latter permis...

متن کامل

The Intermediary Role of Motivation, Attitude, and Cognitive Norms in the Relationship between Personality Traits and Knowledge Sharing Behavior among High School Teachers

Knowledge sharing is a complex behavior. To show this complexity and ways of improving it, the intermediary role of attitudes, cognitive norms, and motivation seem to be important when considering the interaction between this complex behavior and personality traits. To show this relationship, a sample of 357 teachers from among all 570 high school teachers in Birjand was selected and then giv...

متن کامل

کودکان داعش: از درون‌فکنی ایستار تکفیری تا برون‌فکنی رفتار تسخیری

   Isis ideology to deny any historicity and changing and taking lessons in high position and unchanged trans-historical facts. The Group relies on self-regulation narrow interpretations of truth and legitimacy provides power supply and a different attitude and approach and outlines the political and social rules. According to The different, conservative and radical approach, this group  exploi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Cybersecurity

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2017