The study of deterrence presents a number of challenges, mainly to do with identifying deterrence success and defining how deterrence works. Studying cyber deterrence presents even greater challenges, as traditional… Click to show full abstract
The study of deterrence presents a number of challenges, mainly to do with identifying deterrence success and defining how deterrence works. Studying cyber deterrence presents even greater challenges, as traditional deterrence challenges are exacerbated and interactions in the cyber domain create further difficulties. When studying cyber deterrence, scholars face uncertainty not only in identifying situations of deterrence success, but also—due to the secrecy surrounding cyber practices—in identifying situations of deterrence failure. Despite the many studies on cyber deterrence, methodological solutions to address these challenges still need to be developed. To this end, I suggest focusing on the adoption and employment of the strategy rather than on its success. I argue that since communicating threats is a core element of deterrence, it is easier to observe how the strategy is adopted and employed than whether it succeeds or fails. This focus provides a promising direction to study cyber deterrence and address these challenges.
               
Click one of the above tabs to view related content.