Using Military Cyber Operations as a Deterrent
Publiceringsår
2023
Upphovspersoner
Keinonen, Maria
Abstrakt
The Deterrence theory was formed after the World War II to describe the tensions between nuclear-armed states. Because of its origins, deterrence is mainly researched from the point of view of powerful states. However, deterrence nowadays is essential for any state to include in their strategies. The ever-increasing dependence on technology forces states to protect their sovereignty in cyberspace as well as in other domains. Cyber operations should be considered not just as a means to protect the cyber domain, but as means of deterrence. Cross domain deterrence (CDD) is a theory that includes all the warfighting domains in creating deterrence, including cyberspace. Despite these new perspectives, the use of military cyber operations as a deterrent has been studied mainly in terms of offensive strategies. Incorporating all types of military cyber operations into deterrence strategies is understudied. This study focuses on the possibilities of a small state to use cyber operations to create deterrence. The research question is: “How can a small state use cyber operations as a deterrent?” According to the Finnish understanding, cyber operations can be divided into three types: offensive, defensive and supportive operations. Using Finland as a case study, this paper argues that using military cyber operations is noteworthy for any state dependent on cyberspace, not only for military purposes, but for building CDD. The CDD theory and characteristics of cyber operations are studied in order to form better understanding of the topic and provide ideas for academic discussion. The research methods are content and SWOT analysis. The key observation presented is that each type of cyber operation has a role in forming CDD. For a small state, it´s profitable to use every type of cyber operations and thus expand the tool box for deterrence.
Visa merOrganisationer och upphovspersoner
Försvarshögskolan
Keinonen Maria
Publikationstyp
Publikationsform
Artikel
Moderpublikationens typ
Konferens
Artikelstyp
Annan artikel
Målgrupp
VetenskapligKollegialt utvärderad
Kollegialt utvärderadUKM:s publikationstyp
A4 Artikel i en konferenspublikationPublikationskanalens uppgifter
Moderpublikationens namn
Proceedings of the 18th international conference on cyber warfare and security
Moderpublikationens redaktörer
Wilson, Richard; Curran, Brendan
Förläggare
Volym
18
Nummer
1
Sidor
489-496
ISSN
ISBN
Publikationsforum
Publikationsforumsnivå
1
Öppen tillgång
Öppen tillgänglighet i förläggarens tjänst
Ja
Öppen tillgång till publikationskanalen
Helt öppen publikationskanal
Licens för förläggarens version
CC BY NC ND
Parallellsparad
Nej
Övriga uppgifter
Vetenskapsområden
Övriga samhällsvetenskaper
Nyckelord
[object Object],[object Object],[object Object],[object Object]
Förlagets internationalitet
Internationell
Språk
engelska
Internationell sampublikation
Nej
Sampublikation med ett företag
Nej
DOI
10.34190/iccws.18.1.1025
Publikationen ingår i undervisnings- och kulturministeriets datainsamling
Ja