Abstract
Cyber attacks pose an increasing threat to the international system. However, not all states are involved in cyber attacks to the same degree. This chapter asks how we might best explain variation in the involvement of states in cyber attacks across the international system. Conceiving the inter-state system as a social network, we hypothesize that as the global interconnectedness of a state increases so will its involvement in cyber attacks. Our regression models provide support for the contention that the more connected a state is to other states in the international system, the more likely it is to be involved in cyber attacks.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Libicki, M.: Cyber Deterrence and Cyber War. Rand Publishing, Santa Monica (2009)
Clarke, R.: Cyber War: The Next Threat to National Security and What to Do about It. Haper Collins, New York (2010)
Alperovitch, D.: Towards the Establishment of Cyberspace Deterrence Strategy. CCD COE Publications, Tallinn (2011)
Arquilla, J.: From Blitzkrieg to Bitskrieg: the military encounters with computers. Commun. ACM 10, 54 (2011)
Eijndhoven, D.: Cyber Deterrence: Methods and Effectiveness. Argent Consulting, Zeist (2010)
Kramer, F., Stuart, S., Wentz, L.: Cyberpower and National Security. Center for Technology and National Security. National Defense University Press, Washington, DC (2009)
Raduege, H.: Fighting Weapons of Mass Disruption: Why America Needs a Cyber Triad. The East West Institute, New York (2010)
Embassy Pages: Embassies and Consulates Around the World. www.embassypages.com (2012)
Commercial Airline Traffic Data (CATD): International Civil Aviation Organization. http://www.icaodata.com/Trial/Links.aspx (2010)
TeleGeography: Global Traffic Map 2010. http://www.telegeography.com/assets/website/images/maps/global-traffic-map-2010/global-traffic-map-2010-l.jpg (2010)
TeleGeography: Submarine Cable Map. http://www.submarinecablemap.com/ (2012)
Arnson, C.J., Fuentes, C., Aravena, F.R., Varat, J.: Energy and Development in South America: Conflict and Cooperation. Woodrow Wilson Center for International Studies (2008)
Central Intelligence Agency (CIA) Electricity—Consumption. https://www.cia.gov/library/publications/the-world-factbook/rankorder/2042rank.html (2010)
Central Intelligence Agency (CIA) Electricity—Exports. https://www.cia.gov/library/publications/the-world-factbook/fields/2044.html (2010)
Central Intelligence Agency (CIA) Electricity—Imports. https://www.cia.gov/library/publications/the-world-factbook/fields/2043.html (2010)
Lang, M., Mutschler, U.: BDEW: Germany Remains Electricity Exporter, But Imports Increase Significantly. German Energy Blog. http://www.germanenergyblog.de/?p=7218 (2011)
National Energy Grid Map Index: National Energy Grid. http://www.geni.org/globalenergy/library/national_energy_grid/index.shtml (2012)
News from Uzbekistan: UzNews.net. http://www.uznews.net/news_single.php?lng=en (2012)
Patel, T.: Germany Becomes Net Power Importer From France After Atomic Halt. Bloomberg. http://www.bloomberg.com/news/2011-05-30/germany-becomes-net-power-importer-from-france-after-atomic-halt.html (2011)
RGCE SG Network Models and Forecast Tools: Indicative values for Net Transfer Capacities (NTC) in Continental Europe Winter 2010/11, working day, peak hours (non binding values) (2010)
Tajikistan, Pakistan Discuss Electricity Exports: RadioFreeEurope/RadioLiberty. http://www.rferl.org/content/tajikistan_pakistan_discuss_electricity_exports/24441274.html (2012)
Borgatti, S.P., Everett, M.G., Freeman, L.C.: Ucinet for Windows: Software for Social Network Analysis. Analytic Technologies, Harvard (2002)
Jackson, M.: Social and Economic Networks. Princeton University Press, Princeton (2008)
Akamai: The State of the Internet. http://www.akamai.com/stateoftheinternet/ (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Fischer, E.N. et al. (2014). Explaining Variation in State Involvement in Cyber Attacks: A Social Network Approach. In: Pedrycz, W., Chen, SM. (eds) Social Networks: A Framework of Computational Intelligence. Studies in Computational Intelligence, vol 526. Springer, Cham. https://doi.org/10.1007/978-3-319-02993-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-02993-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-02992-4
Online ISBN: 978-3-319-02993-1
eBook Packages: EngineeringEngineering (R0)