{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T12:04:09Z","timestamp":1777377849345,"version":"3.51.4"},"reference-count":142,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":261,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>In recent years, scholars, commentators and politicians have discussed the prospect of a \u2018cyber security dilemma\u2019. If states race to develop superior cyberattacks, how far might this escalate? Are state-led cyberattacks likely to provoke a full war? To address these related questions, I apply a multi-level Neoclassical Realist framework that progresses from systemic logic to an assessment of leader cues and cognition. This contributes much-needed coherence to debates about escalation and cyber warfare and demonstrates the framework\u2019s utility for addressing contemporary and evolving problems in international affairs. The framework reveals that, according to both a systemic and societal cue analysis, fears regarding unchecked escalation from state competition in cyberspace to kinetic warfare are largely unfounded. Nevertheless, it also points toward one caveat and direction for further research in that cyber warfare directed at foreign leaders\u2019 political survival may be unexpectedly provocative in a way not currently addressed by escalation models.<\/jats:p>","DOI":"10.1093\/cybsec\/tyac012","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T11:22:01Z","timestamp":1663672921000},"source":"Crossref","is-referenced-by-count":9,"title":["Is there a cyber security dilemma?"],"prefix":"10.1093","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8088-7956","authenticated-orcid":false,"given":"Carly E","family":"Beckerman","sequence":"first","affiliation":[{"name":"Institute of Hazard, Risk and Resilience, School of Government and International Affairs, Durham University , Al Qasimi Building, Elvet Hill Road, Durham DH1 3TU , UK"}]}],"member":"286","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"2022121515104992200_bib1","doi-asserted-by":"crossref","DOI":"10.1515\/9780804767422-008","article-title":"The war on terrorism and the balance of power: the paradoxes of American hegemony","volume-title":"Balance of Power: Theory and Practice in the 21st Century","author":"Layne","year":"2004"},{"key":"2022121515104992200_bib2","volume-title":"Perception and Misperception in International Politics: New Edition","author":"Jervis","year":"2017"},{"key":"2022121515104992200_bib3","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1017\/S0043887100014763","article-title":"The security dilemma revisited","volume":"50","author":"Glaser","year":"1997","journal-title":"World Polit"},{"key":"2022121515104992200_bib4","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190665012.003.0002","volume-title":"The Cyber Security Dilemma: Hacking, Trust, and Fear Between Nations","author":"Buchanan","year":"2017"},{"key":"2022121515104992200_bib5","author":"Pomerleau","year":"2020","journal-title":"Why More Research is Needed to Craft Good Cyber Policy"},{"key":"2022121515104992200_bib6","article-title":"\u2018What do we know about cyber escalation? observations from simulations and surveys,\u2019 Scowcroft Centre for Strategy and Security","author":"Jensen","year":"2019"},{"key":"2022121515104992200_bib7","volume-title":"Cyber War Will Not Take Place","author":"Rid","year":"2013"},{"key":"2022121515104992200_bib8","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1080\/01402390.2012.733312","article-title":"The proliferation of cyberwarfare capabilities and interstate war, redux: Liff responds to Junio","volume":"36","author":"Liff","year":"2013","journal-title":"J Strateg Stud"},{"key":"2022121515104992200_bib9","doi-asserted-by":"crossref","DOI":"10.1093\/wentk\/9780199918096.001.0001","volume-title":"Cybersecurity and Cyberwar: What Everyone Needs to Know","author":"Singer","year":"2014"},{"key":"2022121515104992200_bib10","first-page":"122","article-title":"Cyber operations as imperfect tools of escalation","volume":"13","author":"Borghard","year":"2019","journal-title":"Strateg Stud Quart"},{"key":"2022121515104992200_bib11","article-title":"Cyber and crisis escalation: insights from wargaming","author":"Schneider","year":"2017"},{"key":"2022121515104992200_bib12","article-title":"Applicability of traditional deterrence concepts and theory to the cyber realm","volume-title":"Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy","author":"Morgan","year":"2010"},{"key":"2022121515104992200_bib13","article-title":"Ex-U.S. general urges frank talk on cyber weapons","author":"Shalal-Esa","year":"2011"},{"key":"2022121515104992200_bib14","article-title":"How the United States can win the cyberwar of the future","author":"Singer","year":"2015"},{"key":"2022121515104992200_bib15","article-title":"Trump talks \u2018the cyber\u2019","author":"Starks","year":"2020"},{"key":"2022121515104992200_bib16","article-title":"Joe Biden warns he will be tough on state sponsors of cyberattacks, as U.S. suffers massive hack","author":"Wilke","year":"2020"},{"key":"2022121515104992200_bib17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/cybsec\/tyz007","article-title":"Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics","volume":"5","author":"Kreps","year":"2019","journal-title":"J Cybersecur"},{"key":"2022121515104992200_bib18","article-title":"Nuclear Posture Review","author":"Department of Defense","year":"2018"},{"key":"2022121515104992200_bib19","author":"United States of American Cyberspace Solarium Commission","year":"2020"},{"key":"2022121515104992200_bib20","first-page":"49","article-title":"Cyberwarfare and deterrence: trends and challenges in research","volume":"3","author":"Lupovici","year":"2011","journal-title":"Milit Strat Aff"},{"key":"2022121515104992200_bib21","volume-title":"Deterrence of Cyberattacks and US National Security","author":"Glaser","year":"2011"},{"key":"2022121515104992200_bib22","volume-title":"Cyberspace and the State: Toward a Strategy for Cyber Power","author":"Betz","year":"2011"},{"key":"2022121515104992200_bib23","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/13523260.2013.771031","article-title":"Cyber posturing and the offense-defense balance","volume":"34","author":"Saltzman","year":"2013","journal-title":"Contemp Secur Policy"},{"key":"2022121515104992200_bib24","volume-title":"Cyber War","author":"Clarke","year":"2014"},{"key":"2022121515104992200_bib25","volume-title":"Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks","author":"Mandel","year":"2017"},{"key":"2022121515104992200_bib26","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1162\/ISEC_a_00267","article-title":"What is the cyber offense-defense balance? Conceptions, causes, and assessment","volume":"41","author":"Slayton","year":"2017","journal-title":"Int Secur"},{"key":"2022121515104992200_bib27","article-title":"Global consequences of escalating US-Russia cyber relations","author":"Olejnik","year":"2019"},{"key":"2022121515104992200_bib28","article-title":"The Rise of the Global Cyber War Threat","author":"Lindsay","year":"2019"},{"key":"2022121515104992200_bib29","article-title":"Cyber warfare will explode in 2020 (because it's cheap, easy and effective","author":"Andriole","year":"2020"},{"key":"2022121515104992200_bib30","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1162\/daed_a_01794","article-title":"Cyber warfare and inadvertent escalation","volume":"149","author":"Acton","year":"2020","journal-title":"Daedalus"},{"key":"2022121515104992200_bib31","article-title":"Cyber battles, nuclear outcomes? Dangerous new pathways to escalation","author":"Klare","year":"2019"},{"key":"2022121515104992200_bib32","article-title":"The future of war: cyber is expanding the clausewitzian spectrum of conflict","author":"Maurer","year":"2014"},{"key":"2022121515104992200_bib33","first-page":"17","article-title":"Keeping cool: steps for avoiding conflict and escalation in cyberspace","author":"Hurwitz","year":"2013","journal-title":"Georget J Int Aff"},{"key":"2022121515104992200_bib34","first-page":"46","article-title":"Escalation dynamics and conflict termination in cyberspace","volume":"6","author":"Lin","year":"2012","journal-title":"Strateg Stud Quart"},{"key":"2022121515104992200_bib35","article-title":"Bounding cyber power: escalation and restraint in global cyberspace","volume-title":"Organized Chaos: Reimagining the Internet","author":"Deibert","year":"2014"},{"key":"2022121515104992200_bib36","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/00396338.2015.1008300","article-title":"Cyber house rules: on war, retaliation and escalation","volume":"57","author":"Cavaiola","year":"2015","journal-title":"Survival"},{"key":"2022121515104992200_bib37","first-page":"123","article-title":"Determinants of the cyber escalation ladder","volume":"3","author":"Kostyuk","year":"2018","journal-title":"Cyber Def Rev"},{"key":"2022121515104992200_bib38","volume-title":"This Is How They Tell Me the World Ends: The Cyber Weapons Arms Race","author":"Perlroth","year":"2021"},{"key":"2022121515104992200_bib39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.23919\/CYCON.2019.8756890","article-title":"Rough-and-ready: a policy framework to determine if cyber deterrence is working or failing","volume-title":"Proceedings of the 2019 11th International Conference on Cyber Conflict (CyCon)","author":"Healey","year":"2019"},{"key":"2022121515104992200_bib40","volume-title":"Crisis and Escalation in Cyberspace","author":"Libicki","year":"2012"},{"key":"2022121515104992200_bib41","volume-title":"Strategic Cyber Deterrence: The Active Cyber Defense Option","author":"Jasper","year":"2017"},{"key":"2022121515104992200_bib42","doi-asserted-by":"crossref","DOI":"10.4324\/9781315636504","volume-title":"Understanding Cyber Warfare: Politics, Policy and Strategy","author":"Whyte","year":"2018"},{"key":"2022121515104992200_bib43","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780190618094.001.0001","volume-title":"Cyber Strategy: The Evolving Character of Power and Coercion","author":"Valeriano","year":"2018"},{"key":"2022121515104992200_bib44","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1080\/01402390.2012.739561","article-title":"How probable is cyber war? Bringing IR Theory back into the cyber conflict debate","volume":"36","author":"Junio","year":"2013","journal-title":"J Strateg Stud"},{"key":"2022121515104992200_bib45","first-page":"7","article-title":"The role of effects, saliencies and norms in US cyberwar doctrine","volume":"3","author":"Farrell","year":"2017","journal-title":"J Cybersecur"},{"key":"2022121515104992200_bib46","first-page":"66","article-title":"Some thoughts on deterrence in the cyber era","volume":"15","author":"Jervis","year":"2016","journal-title":"J Inf Warf"},{"key":"2022121515104992200_bib47","doi-asserted-by":"crossref","DOI":"10.1515\/9781400837403","volume-title":"On War","author":"Clausewitz","year":"1976"},{"key":"2022121515104992200_bib48","volume-title":"Foreign Policy Analysis: Classica and Contemporary Theory","author":"Hudson","year":"2006"},{"key":"2022121515104992200_bib49","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1093\/isr\/viaa018","article-title":"Forum: rethinking neoclassical realism at theory's end","volume":"23","author":"Meibauer","year":"2020","journal-title":"Int Stud Rev"},{"key":"2022121515104992200_bib50","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1080\/09636410802098917","article-title":"A rose by any other name: neoclassical realism as the logical and necessary extension of structural realism","volume":"17","author":"Rathbun","year":"2008","journal-title":"Secur Stud"},{"key":"2022121515104992200_bib51","first-page":"99","article-title":"Enemy at the gates: a neoclassical realist explanation of Russia's baltic policy","volume":"15.1","author":"G\u00f6tz","year":"2019","journal-title":"Foreign Pol Anal"},{"key":"2022121515104992200_bib52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/09636419708429321","article-title":"Beyond victory: offensive realism and the expansion of war aims","volume":"6","author":"Labs","year":"1997","journal-title":"Secur Stud"},{"key":"2022121515104992200_bib53","first-page":"125","article-title":"America's quest for global hegemony: offensive realism, the bush doctrine, and the 2003 Iraq war","volume":"110","author":"Yordan","year":"2006","journal-title":"Theor J Soc Polit Theory"},{"key":"2022121515104992200_bib54","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1177\/03058298050330031401","article-title":"Competing realist conceptions of power","volume":"33","author":"Schmidt","year":"2005","journal-title":"Millenn J Int Stud"},{"key":"2022121515104992200_bib55","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1057\/palgrave.jird.1800065","article-title":"John J. Mearsheimer: an offensive realist between geopolitics and power","volume":"8","author":"Toft","year":"2005","journal-title":"J Int Relat Dev"},{"key":"2022121515104992200_bib56","volume-title":"Neoclassical Realism, the State, and Foreign Policy","author":"Lobell","year":"2014"},{"key":"2022121515104992200_bib57","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1057\/ip.2012.14","article-title":"Using the neo-classical realism paradigm to predict Russian foreign policy behaviour as a complement to using resources","volume":"49","author":"Nygren","year":"2012","journal-title":"Int Polit"},{"key":"2022121515104992200_bib58","first-page":"21","article-title":"Realist thought and neorealist theory","volume-title":"The Evolution of Theory in International Relations","author":"Waltz","year":"1992"},{"key":"2022121515104992200_bib59","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1177\/1354066110373949","article-title":"The tragedy of offensive realism: classical realism and the rise of China","volume":"18","author":"Kirshner","year":"2012","journal-title":"Eur J Int Relat"},{"key":"2022121515104992200_bib60","volume-title":"The Tragedy of Great Power Politics","author":"Mearsheimer","year":"2001"},{"key":"2022121515104992200_bib61","first-page":"160","article-title":"Get smart: combining hard and soft power","volume":"88","author":"Nye","year":"2009","journal-title":"Foreign Aff"},{"key":"2022121515104992200_bib62","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2307\/2538540","article-title":"Alliance formation and the balance of world power","volume":"9","author":"Walt","year":"1985","journal-title":"Int Secur"},{"key":"2022121515104992200_bib63","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-41012-8","volume-title":"Realism and Fear in International Relations","author":"Pashakhanlou","year":"2017"},{"key":"2022121515104992200_bib64","doi-asserted-by":"crossref","DOI":"10.1515\/9780804767422-004","article-title":"Introduction: the enduring axioms of balance of power theory and their contemporary relevance","volume-title":"Balance of Power: Theory and Practice in the 21st Century","author":"Paul","year":"2004"},{"key":"2022121515104992200_bib65","article-title":"Introduction","volume-title":"The Origin and Prevention of Major Wars","author":"Nye","year":"1989"},{"key":"2022121515104992200_bib66","article-title":"John Bolton, Cyber Warrior","author":"Bennett","year":"2018"},{"key":"2022121515104992200_bib67","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1017\/S0043887100007814","article-title":"Neoclassical realism and theories of foreign policy","volume":"51","author":"Rose","year":"1998","journal-title":"World Polit"},{"key":"2022121515104992200_bib68","first-page":"301","article-title":"Psychology and foreign policy decision-making","volume-title":"Oxford Handbook of Political Psychology","author":"Levy","year":"2013","edition":"2nd edn"},{"key":"2022121515104992200_bib69","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/09636419608429297","article-title":"Horses for courses: why nor neorealist theories of foreign policy?","volume":"6","author":"Ellman","year":"1996","journal-title":"Secur Stud"},{"key":"2022121515104992200_bib70","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1086\/696882","article-title":"Can neoclassical realism become a genuine theory of international relations?","volume":"80","author":"Smith","year":"2018","journal-title":"J Polit"},{"key":"2022121515104992200_bib71","article-title":"Cyber capabilities and national power: a net assessment","author":"The International Institute for Strategic Studies (IISS)","year":"2021"},{"key":"2022121515104992200_bib72","article-title":"Russia denies disrupting GPS signals during NATO arctic exercises","author":"Guardian","year":"2018"},{"key":"2022121515104992200_bib73","article-title":"Russia accused of cyberattack on chemical weapons watchdog","author":"Crerar","year":"2018"},{"key":"2022121515104992200_bib74","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1177\/0022002794038002004","article-title":"Signaling versus the balance of power and interests: an empirical test of a crisis bargaining model","volume":"38","author":"Fearon","year":"1994","journal-title":"J Confl Resolut"},{"key":"2022121515104992200_bib75","first-page":"4","volume-title":"Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains","author":"Hutchins","year":"2011"},{"key":"2022121515104992200_bib76","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1080\/09636412.2015.1038188","article-title":"Weaving tangled webs: offense, defense, and deception in cyberspace","volume":"24","author":"Gartzke","year":"2015","journal-title":"Secur Stud"},{"key":"2022121515104992200_bib77","article-title":"Statement of General Paul M. Nakasone, Commander, United States Cyber Command Before the Senate Committee on Armed Services","volume-title":"United States Cyber Command","year":"2019"},{"key":"2022121515104992200_bib78","article-title":"US cyber attack: did American really try to override the russian power grid?","author":"Carroll","year":"2019"},{"key":"2022121515104992200_bib79","doi-asserted-by":"crossref","first-page":"26","DOI":"10.47277\/IJCNCS\/8(3)1","article-title":"Cyber attacks on Saudi Arabia environment","volume":"8","author":"Al-Mulhim","year":"2020","journal-title":"Int J Comput Netw Commun Secur"},{"key":"2022121515104992200_bib80","article-title":"Israel's response to cyber attack sends clear warning to Iran","author":"Caspit","year":"2020"},{"key":"2022121515104992200_bib81","article-title":"What you need to know about the biggest hack of the US Government in years","author":"Paul","year":"2020"},{"key":"2022121515104992200_bib82","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1353\/wp.1997.0012","article-title":"Game theory and the spiral model","volume":"49","author":"Kydd","year":"1997","journal-title":"World Polit"},{"key":"2022121515104992200_bib83","first-page":"1","article-title":"Deterrence by denial in cyberspace","volume":"4","author":"Borghard","year":"2021","journal-title":"J Strateg Stud"},{"key":"2022121515104992200_bib84","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1162\/ISEC_a_00266","article-title":"Deterrence and dissuasion in cyberspace","volume":"41","author":"Nye","year":"2016","journal-title":"Int Secur"},{"key":"2022121515104992200_bib85","article-title":"Talk given at the Durham-Dartmouth Global Debate on Cybersecurity in December 2019","author":"Subramanian","year":"2019"},{"key":"2022121515104992200_bib86","article-title":"Trump and his lieutenants are cyber hawks. Will they play hardball with Putin?","author":"Groll","year":"2016"},{"key":"2022121515104992200_bib87","first-page":"364","article-title":"Threat perception in International Relations","volume-title":"The Oxford Handbook of Political Psychology","author":"Gross\u00a0Stein","year":"2013"},{"key":"2022121515104992200_bib88","first-page":"41","article-title":"Whom do we trust? Testing for socialization effects in chinese surveys","volume-title":"Perception and Misperception in American and Chinese Views of the Other","author":"Gries","year":"2015"},{"key":"2022121515104992200_bib89","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1111\/pops.12630","article-title":"Chinese perceptions of threats from the United States and Japan","volume":"41","author":"Sinkkonen","year":"2020","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib90","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1111\/j.1467-9221.2004.00377.x","article-title":"Deterrence, compellence, and prospect theory","volume":"25","author":"Schaub","year":"2004","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib91","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1111\/0162-895X.00274","article-title":"Framing, uncertainty, and hostile communications in a crisis experiment","volume":"23","author":"Rose","year":"2002","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib92","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1111\/0162-895X.00168","article-title":"Cultural similarity, foreign policy actions, and regime perception: an experimental study of international cues and democratic peace","volume":"20","author":"Geva","year":"1999","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib93","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1467-9221.2012.00869.x","article-title":"The impact of value similarity and power on the perception of threat","volume":"33","author":"Garcia-Retamero","year":"2012","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib94","volume-title":"People, States, and Fear: The National Security Problem in International Relations","author":"Buzan","year":"1983"},{"key":"2022121515104992200_bib95","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511612183","volume-title":"Social Theory of International Politics","author":"Wendt","year":"1999"},{"key":"2022121515104992200_bib96","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0305741010001360","article-title":"Patriotism, nationalism and china's us policy: structures and consequences of chinese national identity","volume":"205","author":"Gries","year":"2011","journal-title":"Chin Quart"},{"key":"2022121515104992200_bib97","article-title":"Forget Washington and Beijing. These days global leadership comes from Berlin","author":"Braw","year":"2020"},{"key":"2022121515104992200_bib98","article-title":"Public opinion on global threats and the future of NATO","author":"Gaston","year":"2019"},{"key":"2022121515104992200_bib99","article-title":"Map shows which countries are the biggest threats to peace","author":"Chaturvedi","year":"2018"},{"key":"2022121515104992200_bib100","volume-title":"Knowing the Adversary: Leaders, Intelligence, and Assessment of Intentions in International Relations","author":"Yarhi-Milo","year":"2014"},{"key":"2022121515104992200_bib101","article-title":"How digital detectives deciphered stuxnet, the most menacing malware in history","author":"Zetter","year":"2011"},{"key":"2022121515104992200_bib102","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1111\/pops.12283","article-title":"Problem representation, option generation, and poliheuristic theory: an experimental analysis","volume":"37","author":"Keller","year":"2016","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib103","volume-title":"Ecological Perspective on Human Affairs","author":"Sprout","year":"1965"},{"key":"2022121515104992200_bib104","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1111\/0162-895X.00305","article-title":"Cognitive skills as predictor of attitudes toward political conflict: a study of polish politicians","volume":"23","author":"Golec","year":"2002","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib105","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1111\/pops.12628","article-title":"Personal and political emotions in the mind of the diplomat","volume":"40","author":"Keys","year":"2019","journal-title":"Polit Psychol"},{"key":"2022121515104992200_bib106","volume-title":"Decisionmaking on War and Peace: The Cognitive-Rational Debate","author":"Mintz","year":"1997"},{"key":"2022121515104992200_bib107","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1177\/0022002703260271","article-title":"Initial crisis reaction and poliheuristic theory","volume":"48","author":"DeRouen","year":"2004","journal-title":"J Confl Resolut"},{"key":"2022121515104992200_bib108","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvx8b7vx","volume-title":"Unexpected State: British Politics and the Creation of Israel","author":"Beckerman","year":"2020"},{"key":"2022121515104992200_bib109","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1017\/eis.2021.18","article-title":"#SorryNotSorry: why states neither confirm nor deny responsibility for cyber operations","volume":"6","author":"Brown","year":"2021","journal-title":"Eur J Int Secur"},{"key":"2022121515104992200_bib110","first-page":"29","article-title":"Degrees of difficulty: the effect of Israeli policy shifts on syrian peace decisions","volume-title":"Integrating Cognitive and Rational Theories of Foreign Policy Decision Making","author":"Astorino-Courtois","year":"2002"},{"key":"2022121515104992200_bib111","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1080\/13691180500519407","article-title":"Monsters in cyberspace cyberphobia and cultural panic in the information age","volume":"9","author":"Sandywell","year":"2006","journal-title":"Inf Commun Soc"},{"key":"2022121515104992200_bib112","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1017\/eis.2020.2","article-title":"Beyond tit-for-tat in cyberspace: political warfare and lateral sources of escalation online","volume":"5","author":"Whyte","year":"2020","journal-title":"Eur J Int Secur"},{"key":"2022121515104992200_bib113","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511920059","volume-title":"Narcissism and Politics: Dreams of Glory","author":"Post","year":"2014"},{"key":"2022121515104992200_bib114","volume-title":"111th Congress, 2nd Session, U.S. Cyber Command: Organizing for Cyberspace Operations","author":"Committee on Armed Services House of Representatives","year":"2010"},{"key":"2022121515104992200_bib115","article-title":"How cyber geopolitics will destabilize the Middle East","author":"Kausch","year":"2017"},{"key":"2022121515104992200_bib116","volume-title":"Iranian Cyber Activities in the Context of Regional Rivalries and International Tensions","author":"Bazner","year":"2019"},{"key":"2022121515104992200_bib117","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.tej.2014.01.011","article-title":"Cyber security and critical energy infrastructure","volume":"27","author":"Onyeji","year":"2014","journal-title":"Electr J"},{"key":"2022121515104992200_bib118","volume-title":"Principles of Cyber Deterrence and the Challenges in Developing a Credible Cyber Deterrence Posture","author":"Tolga","year":"2018"},{"key":"2022121515104992200_bib119","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/00396338.2013.784468","article-title":"The cyber attack on Saudi Aramco","volume":"55","author":"Bronk","year":"2013","journal-title":"Survival"},{"key":"2022121515104992200_bib120","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1080\/03071847.2013.826509","article-title":"The sophistication criterion for attribution","volume":"158","author":"Guitton","year":"2013","journal-title":"RUSI J"},{"key":"2022121515104992200_bib121","article-title":"The Shamoon attacks","author":"Symantec","year":"2012"},{"key":"2022121515104992200_bib122","article-title":"Shamoon, a two-stage targeted attack","author":"Seculert","year":"2012"},{"key":"2022121515104992200_bib123","article-title":"Shamoon the wiper: further details (Part II)","author":"Tarakanov","year":"2012"},{"key":"2022121515104992200_bib124","doi-asserted-by":"crossref","DOI":"10.2172\/1505628","volume-title":"History of Industrial Control System Cyber Incidents","author":"Hemsley","year":"2018"},{"key":"2022121515104992200_bib125","volume-title":"How to Implement IT Security After a Cyber Meltdown","author":"Kubecka","year":"2015"},{"key":"2022121515104992200_bib126","article-title":"The inside story of the biggest hack in history","author":"Pagliery","year":"2015"},{"key":"2022121515104992200_bib127","volume-title":"Iran's Cyber Threat Espionage, Sabotage and Revenge","author":"Anderson","year":"2018"},{"key":"2022121515104992200_bib128","first-page":"1","article-title":"In wolf's clothing: complications of threat emulation in contemporary cyber intelligence Practice","volume-title":"Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","author":"Work","year":"2019"},{"key":"2022121515104992200_bib129","first-page":"73","article-title":"Saudi Arabi'a Response to Cyber Conflict: A Case Study of the Shamoon Malware Incident","volume-title":"Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics","author":"Zakariya","year":"2013"},{"key":"2022121515104992200_bib130","article-title":"Insights into Iranian cyber espionage: APT33 targets aerospace and energy sectors and has ties to destructive malware","author":"O'Leary","year":"2017"},{"key":"2022121515104992200_bib131","article-title":"OVERRULED: containing a potentially destructive adversary","author":"Ackerman","year":"2018"},{"key":"2022121515104992200_bib132","first-page":"59","article-title":"Limiting the undesired impact of cyber weapons: technical requirements and policy implications","volume":"3","author":"Bellovin","year":"2017","journal-title":"J Cybersecur"},{"key":"2022121515104992200_bib133","volume-title":"Iran Protests Going Nowhere Says Mahmoud Ahmadinejad","author":"BBC News","year":"2011"},{"key":"2022121515104992200_bib134","volume-title":"The forgotten uprising in Eastern Saudi Arabia","author":"Wehrey","year":"2013"},{"key":"2022121515104992200_bib135","article-title":"Ahmadi-Nejad condemns foreign troops in Bahrain","author":"Wigglesworth","year":"2011"},{"key":"2022121515104992200_bib136","volume-title":"Timeline of Nuclear Diplomacy with Iran","author":"Arms Control Association","year":"2022"},{"key":"2022121515104992200_bib137","article-title":"For Saudi Arabia, despite Ahmadinejad's visit, Iran remains the snake","author":"Miller","year":"2012"},{"key":"2022121515104992200_bib138","volume-title":"Foreign Policy Responses to International Cyber-Attacks: Some Lessons Learned","author":"Van\u00a0Der\u00a0Meer","year":"2015"},{"key":"2022121515104992200_bib139","article-title":"The silicon valley of the Middle East: cybersecurity, Saudi Arabia, and the path to vision 2030","volume-title":"Routledge Companion to Global Cyber-Security Strategy","author":"Ouassini","year":"2021"},{"key":"2022121515104992200_bib140","article-title":"Trump signs $110 billion arms deal with Saudi Arabia on \u2018a tremendous day\u2019","author":"Phelps","year":"2017"},{"key":"2022121515104992200_bib141","article-title":"How Saudis are Protected against Cybercrime","author":"Al\u00a0Sharif","year":"2018"},{"key":"2022121515104992200_bib142","doi-asserted-by":"crossref","DOI":"10.21236\/ADA617308","volume-title":"Deterring Iran's Use of Offensive Cyber: A Case Study","author":"Connell","year":"2014"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac012\/47918816\/tyac012.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/8\/1\/tyac012\/47918816\/tyac012.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T23:10:29Z","timestamp":1671145829000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyac012\/6705410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":142,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,28]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyac012","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2022,1,1]]},"published":{"date-parts":[[2022,1,1]]},"article-number":"tyac012"}}