Skip to main content

Explaining Variation in State Involvement in Cyber Attacks: A Social Network Approach

  • Chapter
  • First Online:
Social Networks: A Framework of Computational Intelligence

Abstract

Cyber attacks pose an increasing threat to the international system. However, not all states are involved in cyber attacks to the same degree. This chapter asks how we might best explain variation in the involvement of states in cyber attacks across the international system. Conceiving the inter-state system as a social network, we hypothesize that as the global interconnectedness of a state increases so will its involvement in cyber attacks. Our regression models provide support for the contention that the more connected a state is to other states in the international system, the more likely it is to be involved in cyber attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Libicki, M.: Cyber Deterrence and Cyber War. Rand Publishing, Santa Monica (2009)

    Google Scholar 

  2. Clarke, R.: Cyber War: The Next Threat to National Security and What to Do about It. Haper Collins, New York (2010)

    Google Scholar 

  3. Alperovitch, D.: Towards the Establishment of Cyberspace Deterrence Strategy. CCD COE Publications, Tallinn (2011)

    Google Scholar 

  4. Arquilla, J.: From Blitzkrieg to Bitskrieg: the military encounters with computers. Commun. ACM 10, 54 (2011)

    Google Scholar 

  5. Eijndhoven, D.: Cyber Deterrence: Methods and Effectiveness. Argent Consulting, Zeist (2010)

    Google Scholar 

  6. Kramer, F., Stuart, S., Wentz, L.: Cyberpower and National Security. Center for Technology and National Security. National Defense University Press, Washington, DC (2009)

    Google Scholar 

  7. Raduege, H.: Fighting Weapons of Mass Disruption: Why America Needs a Cyber Triad. The East West Institute, New York (2010)

    Google Scholar 

  8. Embassy Pages: Embassies and Consulates Around the World. www.embassypages.com (2012)

  9. Commercial Airline Traffic Data (CATD): International Civil Aviation Organization. http://www.icaodata.com/Trial/Links.aspx (2010)

  10. TeleGeography: Global Traffic Map 2010. http://www.telegeography.com/assets/website/images/maps/global-traffic-map-2010/global-traffic-map-2010-l.jpg (2010)

  11. TeleGeography: Submarine Cable Map. http://www.submarinecablemap.com/ (2012)

  12. Arnson, C.J., Fuentes, C., Aravena, F.R., Varat, J.: Energy and Development in South America: Conflict and Cooperation. Woodrow Wilson Center for International Studies (2008)

    Google Scholar 

  13. Central Intelligence Agency (CIA) Electricity—Consumption. https://www.cia.gov/library/publications/the-world-factbook/rankorder/2042rank.html (2010)

  14. Central Intelligence Agency (CIA) Electricity—Exports. https://www.cia.gov/library/publications/the-world-factbook/fields/2044.html (2010)

  15. Central Intelligence Agency (CIA) Electricity—Imports. https://www.cia.gov/library/publications/the-world-factbook/fields/2043.html (2010)

  16. Lang, M., Mutschler, U.: BDEW: Germany Remains Electricity Exporter, But Imports Increase Significantly. German Energy Blog. http://www.germanenergyblog.de/?p=7218 (2011)

  17. National Energy Grid Map Index: National Energy Grid. http://www.geni.org/globalenergy/library/national_energy_grid/index.shtml (2012)

  18. News from Uzbekistan: UzNews.net. http://www.uznews.net/news_single.php?lng=en (2012)

  19. Patel, T.: Germany Becomes Net Power Importer From France After Atomic Halt. Bloomberg. http://www.bloomberg.com/news/2011-05-30/germany-becomes-net-power-importer-from-france-after-atomic-halt.html (2011)

  20. RGCE SG Network Models and Forecast Tools: Indicative values for Net Transfer Capacities (NTC) in Continental Europe Winter 2010/11, working day, peak hours (non binding values) (2010)

    Google Scholar 

  21. Tajikistan, Pakistan Discuss Electricity Exports: RadioFreeEurope/RadioLiberty. http://www.rferl.org/content/tajikistan_pakistan_discuss_electricity_exports/24441274.html (2012)

  22. Borgatti, S.P., Everett, M.G., Freeman, L.C.: Ucinet for Windows: Software for Social Network Analysis. Analytic Technologies, Harvard (2002)

    Google Scholar 

  23. Jackson, M.: Social and Economic Networks. Princeton University Press, Princeton (2008)

    MATH  Google Scholar 

  24. Akamai: The State of the Internet. http://www.akamai.com/stateoftheinternet/ (2010)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark J. Wierman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Fischer, E.N. et al. (2014). Explaining Variation in State Involvement in Cyber Attacks: A Social Network Approach. In: Pedrycz, W., Chen, SM. (eds) Social Networks: A Framework of Computational Intelligence. Studies in Computational Intelligence, vol 526. Springer, Cham. https://doi.org/10.1007/978-3-319-02993-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-02993-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-02992-4

  • Online ISBN: 978-3-319-02993-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics