{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:36:53Z","timestamp":1758893813961,"version":"3.41.2"},"reference-count":86,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,6,18]],"date-time":"2022-06-18T00:00:00Z","timestamp":1655510400000},"content-version":"vor","delay-in-days":168,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>This article investigates why states have launched so few cross-domain operations\u2014in this case, operations between cyber and military domains\u2014when they have launched so many cyberattacks. I explore a set of five hypotheses for why most cyberattacks do not occur at the same time as military strikes. My analysis reveals that of the five, two are compelling. First, state attackers make strategic decisions not to \u201ccross the domain\u201d for organizational reasons that are based on the internal division of labor. Second, many cyberattackers face significant technical challenges with cross-domain operations even if their cyber and military forces are integrated. The other three reasons are not as persuasive, including fear of conflict escalation, international law applied to cyberspace, and norms of cyberspace behavior.<\/jats:p>","DOI":"10.1093\/cybsec\/tyac002","type":"journal-article","created":{"date-parts":[[2022,6,18]],"date-time":"2022-06-18T01:30:06Z","timestamp":1655515806000},"source":"Crossref","is-referenced-by-count":7,"title":["Two explanations for the paucity of cyber-military, cross-domain operations"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4502-0497","authenticated-orcid":false,"given":"Nori","family":"Katagiri","sequence":"first","affiliation":[{"name":"Department of Political Science, Saint Louis University , St Louis, MO 63108, USA"}]}],"member":"286","published-online":{"date-parts":[[2022,6,17]]},"reference":[{"key":"2022121515095282700_bib1"},{"key":"2022121515095282700_bib2","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1080\/14781158.2020.1732899","article-title":"Hybrid war and cyber-attacks: creating legal and operational dilemmas","volume":"32","author":"Simons","year":"2020","journal-title":"Glob Change Peace Secur"},{"key":"2022121515095282700_bib3","doi-asserted-by":"crossref","first-page":"tyz008","DOI":"10.1093\/cybsec\/tyz008","article-title":"The implications of persistent (and permanent) engagement in cyberspace","volume":"5","author":"Healey","year":"2019","journal-title":"J Cybersecur"},{"key":"2022121515095282700_bib4","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1177\/0022002717737138","article-title":"Invisible digital front: can cyber attacks shape battlefield events?","volume":"63","author":"Kostyuk","year":"2019","journal-title":"J Conflict Resolut"},{"key":"2022121515095282700_bib5","article-title":"What's in a name? Metaphors and cybersecurity","volume-title":"International Organization","author":"Branch","year":"2020"},{"volume-title":"Joint Publication 3-12: Cyberspace Operations","year":"2018","author":"US Department of Defense","key":"2022121515095282700_bib6"},{"key":"2022121515095282700_bib7","first-page":"ii","article-title":"Lindsay and Gartzke define cross-domain deterrence as \u201cthe use of threats of one type, or some combination of different types, to dissuade a target from taking actions of another type to attempt to change the status quo","volume-title":"Cross-Domain Deterrence","author":""},{"key":"2022121515095282700_bib8","first-page":"65","volume-title":"CyberStrategy: The Evolving Character of Power and Coercion","author":"Valeriano","year":"2018"},{"journal-title":"Cyber Strategy","author":"Valeriano","key":"2022121515095282700_bib9"},{"key":"2022121515095282700_bib10","article-title":"Fundamentals of cross domain solutions"},{"journal-title":"Cross-Domain Solutions","author":"Martin","key":"2022121515095282700_bib11"},{"journal-title":"Breaking Defense","article-title":"Gen. Hyten on the new American way of war: all-domain operations","author":"Clark","key":"2022121515095282700_bib12"},{"author":"Healey","key":"2022121515095282700_bib13"},{"volume-title":"Cross-Domain Deterrence: Strategy in an Era of Complexity","year":"2019","author":"Lindsay","key":"2022121515095282700_bib14"},{"key":"2022121515095282700_bib15","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1080\/00396338.2019.1637122","article-title":"Cyber war and nuclear peace","volume":"61","author":"Gompert","year":"2019","journal-title":"Survival"},{"volume-title":"Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks","year":"2017","author":"Mandel","key":"2022121515095282700_bib16"},{"author":"Sweijs","key":"2022121515095282700_bib17","article-title":"A framework for cross-domain strategies against hybrid threats"},{"key":"2022121515095282700_bib18","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190204792.001.0001","volume-title":"Cyber War versus Cyber Realities: Cyber Conflict in the International System","author":"Valeriano","year":"2015"},{"key":"2022121515095282700_bib19","doi-asserted-by":"crossref","DOI":"10.1093\/cybsec\/tyz007","article-title":"Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics","volume":"5","author":"Kreps","year":"2019","journal-title":"J Cybersecur"},{"key":"2022121515095282700_bib20","first-page":"199","article-title":"Correlations between cyberspace attacks and kinetic attacks","volume-title":"20\/20 Vision: The Next Decade","author":"Libicki","year":"2020"},{"author":"Kostyuk","key":"2022121515095282700_bib21","article-title":"Invisible digital front"},{"key":"2022121515095282700_bib22","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1080\/01402390.2017.1288107","article-title":"A matter of time: on the transitory nature of cyberweapons","volume":"41","author":"Smeets","year":"2018","journal-title":"J Strateg Stud"},{"author":"","key":"2022121515095282700_bib23","article-title":"Correlations between cyberspace attacks and kinetic attacks"},{"journal-title":"Cyber Strategy","author":"Valeriano","key":"2022121515095282700_bib24"},{"journal-title":"Texas National Security Review","key":"2022121515095282700_bib25","article-title":"Policy roundtable: cyber conflict as an intelligence contest"},{"key":"2022121515095282700_bib26","article-title":"Why China has not caught up yet: military-technological superiority and the limits of imitation, reverse engineering, and cyber espionage","volume":"43","author":"Gilli","year":"2018\/19","journal-title":"International Security"},{"key":"2022121515095282700_bib27","article-title":"Burning Umbrella: an intelligence report on the winnti umbrella and associated state-sponsored attackers"},{"key":"2022121515095282700_bib28","first-page":"15","article-title":"Operation blockbuster: unraveling the long thread of the sony attack","author":"Novetta","year":"2016"},{"article-title":"How North Korean hackers rob banks around the world","year":"2020","author":"Buchanan","key":"2022121515095282700_bib29"},{"author":"Cyberscoop","key":"2022121515095282700_bib30","article-title":"US government exposes North Korean government ATM cashout hacking campaign"},{"key":"2022121515095282700_bib31","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1080\/23738871.2020.1820546","article-title":"Cybersecurity and cyber defence in the emerging democracies","volume":"5","author":"Solar","year":"2020","journal-title":"J Cyber Policy"},{"first-page":"333","article-title":"Invisible digital front","author":"Kostyuk","key":"2022121515095282700_bib32"},{"author":"Wired magazine","key":"2022121515095282700_bib33","article-title":"The confessions of Marcus Hutchins, the hacker who saved the internet"},{"key":"2022121515095282700_bib34","first-page":"113","article-title":"Decentralized cyberattack attribution","author":"Eichensehr","year":"2019","journal-title":"Am J Int Law Unbound"},{"key":"2022121515095282700_bib35","first-page":"31","volume-title":"Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations","author":"Buchanan","year":"2017"},{"key":"2022121515095282700_bib36","first-page":"126","article-title":"Cyber operations as imperfect tools of escalation","volume-title":"Strategic Studies Quarterly","author":"Borghard","year":"2019"},{"journal-title":"Cyber Strategy","first-page":"95","author":"Valeriano","key":"2022121515095282700_bib37"},{"first-page":"333","article-title":"Invisible digital front","author":"","key":"2022121515095282700_bib38"},{"key":"2022121515095282700_bib39","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1080\/09636412.2013.816122","article-title":"Stuxnet and the limits of cyber warfare","volume":"22","author":"Lindsay","year":"2013","journal-title":"Security Studies"},{"key":"2022121515095282700_bib40","first-page":"401","article-title":"Stuxnet and the limits of cyber warfare","volume":"398","author":"Lindsay"},{"key":"2022121515095282700_bib41"},{"author":"National Security Archive","key":"2022121515095282700_bib42","article-title":"USCYBERCOM after action assessments of Operation Glowing Symphony"},{"key":"2022121515095282700_bib43","first-page":"1","volume-title":"Information Technology and Military Power","author":"Lindsay","year":"2020"},{"key":"2022121515095282700_bib44","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198865995.001.0001","volume-title":"The Normative Order of the Internet: A Theory of Rule and Regulation Online","author":"Kettemann","year":"2020"},{"key":"2022121515095282700_bib45","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/00396338.2015.1008300","article-title":"Cyber house rules: on war, retaliation and escalation","volume":"57","author":"Cavaiola","year":"2015","journal-title":"Survival"},{"key":"2022121515095282700_bib46","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190665012.001.0001","volume-title":"The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations","author":"Buchanan","year":"2017"},{"key":"2022121515095282700_bib47","first-page":"8","author":"Optiv","year":"2019","journal-title":"2019 Cyber Threat Intelligence Estimate"},{"author":"Cyberscoop","key":"2022121515095282700_bib48","article-title":"Beazley: ransomware claims more than doubled in the last year"},{"key":"2022121515095282700_bib49","article-title":"A moment of truth for cyber insurance","author":"Levite","year":"2019","journal-title":"Lawfare"},{"first-page":"5","article-title":"Cyber security incentives and the role of cyber insurance","author":"Sullivan","key":"2022121515095282700_bib50"},{"key":"2022121515095282700_bib51","first-page":"11","article-title":"Citizens on cyberattacks: the digital peace now society's international cyberwarfare awareness report","author":"The Digital Peace Now","year":"2020"},{"author":"USA Today","key":"2022121515095282700_bib52","article-title":"Anxiety, depression and PTSD: the hidden epidemic of data breaches and cyber crimes"},{"journal-title":"Cyber Strategy","first-page":"76","author":"Valeriano","key":"2022121515095282700_bib53"},{"key":"2022121515095282700_bib86_1654686768283","first-page":"14","article-title":"CITIZENS ON CYBERATTACKS: The Digital Peace Now Society's International Cyberwarfare Awareness Report","author":"The\u00a0Digital","year":"2020"},{"key":"2022121515095282700_bib54","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1093\/oso\/9780190918309.001.0001","volume-title":"The Internet and Political Protest in Autocracies","author":"Weidmann","year":"2019"},{"volume-title":"Dictators at War and Peace","year":"2014","author":"Weeks","key":"2022121515095282700_bib55"},{"journal-title":"Cyber Strategy","first-page":"88","author":"Valeriano","key":"2022121515095282700_bib56"},{"author":"Jensen","key":"2022121515095282700_bib57","article-title":"What do we know about cyber escalation? Observations from simulations and surveys"},{"key":"2022121515095282700_bib58","doi-asserted-by":"crossref","DOI":"10.1017\/9781108954341.004","article-title":"De-escalation Pathways and Disruptive Technology: Cyber Operations as Off-Ramps to War","volume-title":"Cyber Peace: Charting a Path Towards a Sustainable, Stable, and Secure Cyberspace","author":"Valeriano","year":"2022"},{"author":"Gold","key":"2022121515095282700_bib59","article-title":"The Five Eyes and offensive cyber capabilities: building a \u2018cyber deterrence initiative\u2019"},{"key":"2022121515095282700_bib60","doi-asserted-by":"crossref","DOI":"10.1017\/9781108807050","volume-title":"Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution","author":"Lahmann","year":"2020"},{"key":"2022121515095282700_bib61","doi-asserted-by":"crossref","DOI":"10.1017\/9781316822524","volume-title":"Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations","author":"Schmitt","year":"2017"},{"key":"2022121515095282700_bib62","first-page":"704","article-title":"\u2018Below the Threshold\u2019 cyber operations: the countermeasures response option and international law","volume":"54","author":"Schmitt","year":"2014","journal-title":"Va J Int Law"},{"journal-title":"Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations","author":"Schmitt","key":"2022121515095282700_bib63"},{"key":"2022121515095282700_bib64","first-page":"503","article-title":"State responsibility to respect, protect and fulfill human rights obligations in cyberspace","volume":"8","author":"Rona","year":"2016","journal-title":"J Natl Secur Law Policy"},{"key":"2022121515095282700_bib65","first-page":"47","article-title":"Twenty years on: international humanitarian law and the protection of civilians against the effects of cyber operations during armed conflicts","author":"Gisel","year":"2020","journal-title":"Int Rev Red Cross"},{"key":"2022121515095282700_bib66","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1017\/CBO9781139227148.014","article-title":"Cyberattacks and international human rights law","volume-title":"Weapons under International Human Rights Law","author":"Fidler","year":"2014"},{"key":"2022121515095282700_bib67","first-page":"xii","article-title":"Introduction to the Series: Trialogical International Law","volume-title":"Self-Defence against Non-State Actors","author":"Peters"},{"first-page":"12","article-title":"French Ministry of the Armies, International Law Applied to Operations in Cyberspace","year":"2019","key":"2022121515095282700_bib68"},{"key":"2022121515095282700_bib69","article-title":"Manual of armed forces law","volume":"4","author":"New Zealand Defence Force","year":"2017","journal-title":"Law of Armed Conflict"},{"author":"New Zealand Ministry of Foreign Affairs and Trade","key":"2022121515095282700_bib70","article-title":"The Application of International Law to State Activity in Cyberspace"},{"journal-title":"US Department of Defence General Counsel, Remarks at US Cyber Command Legal Conference","year":"2020","author":"Ney","key":"2022121515095282700_bib71"},{"year":"2020","key":"2022121515095282700_bib72","article-title":"Commentary of the Russian Federation on the Initial \u2018Pre-draft\u2019 of the Final Report of the United Nations Open-Ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security"},{"key":"2022121515095282700_bib73"},{"key":"2022121515095282700_bib74","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1162\/002081898550789","article-title":"International norm dynamics and political change","volume":"52","author":"Finnemore","year":"1998","journal-title":"Int Organ"},{"key":"2022121515095282700_bib75","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1162\/002081898550789","article-title":"International norm dynamics and political change","volume":"52","author":"Finnemore","year":"1998","journal-title":"Int Organ"},{"key":"2022121515095282700_bib76","article-title":"From cyber norms to cyber rules: re-engaging states as law-makers","volume":"30","author":"The literature on this point is large. See Kubo Ma\u010d\u00e1k","year":"2017","journal-title":"Leiden J Int Law"},{"first-page":"60","article-title":"Deterrence and dissuasion in cyberspace","author":"Nye","key":"2022121515095282700_bib77"},{"volume-title":"2015 UN GGE Report: Major Players Recommending Norms of Behaviour, Highlighting Aspects of International Law","author":"The NATO Cooperative Cyber Defence Centre of Excellence","key":"2022121515095282700_bib78"},{"author":"Eichensehr","key":"2022121515095282700_bib79","article-title":"Decentralized cyberattack attribution"},{"key":"2022121515095282700_bib80","first-page":"855","article-title":"The law of cyber-attack","volume":"100","author":"Hathaway","year":"2011","journal-title":"Calif Law Rev"},{"key":"2022121515095282700_bib81","first-page":"109","article-title":"Incorporating offensive cyber operations into conventional deterrence strategies","author":"Fischerkeller","year":"2017","journal-title":"Survival"},{"first-page":"851","article-title":"The law of cyber-attack","author":"Hathaway","key":"2022121515095282700_bib82"},{"key":"2022121515095282700_bib83","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1017\/S0002930000016894","article-title":"Constructing norms for global cybersecurity","volume":"110","author":"Finnemore","year":"2016","journal-title":"Am J Int Law"},{"key":"2022121515095282700_bib84"},{"key":"2022121515095282700_bib85","doi-asserted-by":"crossref","DOI":"10.1093\/jogss\/ogab001","article-title":"Digital retaliation? denial-of-service attacks after sanction events","volume":"6","author":"Lutscher","year":"2021","journal-title":"J Glob Secur Stud"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac002\/47918673\/tyac002.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac002\/47918673\/tyac002.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T23:07:52Z","timestamp":1671145672000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyac002\/6610005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":86,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyac002","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyac002"}}