Deterrence by denial in cyberspace

Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and conceptual rigor to the proliferation of arguments within the United States about deterrence in cybersp...

Full description

Saved in:
Bibliographic Details
Published inJournal of strategic studies Vol. 46; no. 3; pp. 534 - 569
Main Authors Borghard, Erica D., Lonergan, Shawn W.
Format Journal Article
LanguageEnglish
Published London Routledge 16.04.2023
Taylor & Francis Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and conceptual rigor to the proliferation of arguments within the United States about deterrence in cyberspace. Specifically, we argue that cyber deterrence frameworks that draw from the traditional nuclear deterrence literature and the logic of deterrence by punishment are mismatched to deterrence challenges in cyberspace. Instead, we advocate for a deterrence by denial approach, but one that is oriented around counter-cyber operations rather than simply improving defenses. While there has been some scholarship and work by practitioners that implicitly rests on a deterrence by denial logic, they suffer from a lack of systematic assessment of how traditional denial concepts, especially those developed in the conventional deterrence literature, could be extended to cyberspace. Therefore, in this article, we review different deterrence concepts in theory and practice, articulate a logic of cyber deterrence by denial, and provide policy recommendations for the United States.
AbstractList Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and conceptual rigor to the proliferation of arguments within the United States about deterrence in cyberspace. Specifically, we argue that cyber deterrence frameworks that draw from the traditional nuclear deterrence literature and the logic of deterrence by punishment are mismatched to deterrence challenges in cyberspace. Instead, we advocate for a deterrence by denial approach, but one that is oriented around counter-cyber operations rather than simply improving defenses. While there has been some scholarship and work by practitioners that implicitly rests on a deterrence by denial logic, they suffer from a lack of systematic assessment of how traditional denial concepts, especially those developed in the conventional deterrence literature, could be extended to cyberspace. Therefore, in this article, we review different deterrence concepts in theory and practice, articulate a logic of cyber deterrence by denial, and provide policy recommendations for the United States.
Author Lonergan, Shawn W.
Borghard, Erica D.
Author_xml – sequence: 1
  givenname: Erica D.
  surname: Borghard
  fullname: Borghard, Erica D.
  email: eborghard@gmail.com
  organization: Columbia University
– sequence: 2
  givenname: Shawn W.
  surname: Lonergan
  fullname: Lonergan, Shawn W.
  organization: 75th Innovation Command and PricewaterhouseCoopers
BookMark eNp9kF1LwzAUhoNMcJv-BKHodWeSkzbpnTI_YeCNgnchSU-go0tn0iH997Zs3np1eOF53wPPgsxCF5CQa0ZXjCp6R5mgHCq64pSzFauEUEV5RuZMCsgrkF8zMp-YfIIuyCKlLaVMqQLm5OYRe4wRg8PMDlmNoTFt1oTMDRZj2huHl-Tcmzbh1ekuyefz08f6Nd-8v7ytHza5A1B9LmlF0QNKC6hUXZTC2torZ0uw0iIVzHpbO6-E4lIacCAAKqmc8WM0Apbk9ri7j933AVOvt90hhvGl5gp4CRVwNlLFkXKxSymi1_vY7EwcNKN60qH_dOhJhz7pGHv3x14TfBd35qeLba17M7Rd9NEE1yQN_0_8Ag0VZvY
CitedBy_id crossref_primary_10_1080_13523260_2023_2256572
crossref_primary_10_1080_14702436_2022_2082955
crossref_primary_10_1093_jogss_ogac005
crossref_primary_10_60097_ACIG_190263
crossref_primary_10_1080_01402390_2023_2174106
crossref_primary_10_1093_isr_viad036
crossref_primary_10_1080_10357718_2023_2274443
crossref_primary_10_1093_cybsec_tyad006
Cites_doi 10.1080/01402390.2011.608939
10.7591/9781501737831
10.1093/oso/9780190908645.003.0005
10.21236/ADA601645
10.1177/0022343313518940
10.1162/ISEC_a_00136
10.1080/01402390.2014.977382
10.1093/oso/9780190618094.001.0001
10.7591/9781501713262
10.1162/ISEC_a_00266
10.1016/j.orbis.2016.05.009
10.1093/acprof:oso/9780190201265.001.0001
10.1080/09636419309347540
10.2307/2538699
10.2307/2600411
10.1162/ISEC_a_00267
10.2307/j.ctt1trkjd1
10.1080/01402390.2015.1115975
10.1093/cybsec/tyz007
10.1162/isec.23.1.66
10.1007/978-1-349-20165-5
10.1080/13523260.2013.771031
10.2307/2538586
10.2307/2626666
10.1093/isq/sqab039
10.2307/2009894
10.1017/S0020818300033324
10.1016/j.orbis.2017.05.003
10.1080/13523261003640819
10.1080/01402390.2017.1288107
10.2307/2538458
10.1080/01495939308402915
10.2307/2009945
10.1162/isec_a_00351
10.1080/09636412.2017.1306396
10.23919/CYCON.2018.8405009
10.1080/09636412.2017.1243921
10.1080/09636412.2015.1038188
10.2307/2010415
10.1162/isec_a_00367
10.1515/9781400877164
10.1017/9781316422724
10.7551/mitpress/6483.001.0001
ContentType Journal Article
Copyright 2021 Informa UK Limited, trading as Taylor & Francis Group 2021
2021 Informa UK Limited, trading as Taylor & Francis Group
Copyright_xml – notice: 2021 Informa UK Limited, trading as Taylor & Francis Group 2021
– notice: 2021 Informa UK Limited, trading as Taylor & Francis Group
DBID AAYXX
CITATION
7UB
8BJ
FQK
JBE
DOI 10.1080/01402390.2021.1944856
DatabaseName CrossRef
Worldwide Political Science Abstracts
International Bibliography of the Social Sciences (IBSS)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
DatabaseTitle CrossRef
International Bibliography of the Social Sciences (IBSS)
Worldwide Political Science Abstracts
DatabaseTitleList International Bibliography of the Social Sciences (IBSS)

DeliveryMethod fulltext_linktorsrc
Discipline Military & Naval Science
EISSN 1743-937X
EndPage 569
ExternalDocumentID 10_1080_01402390_2021_1944856
1944856
Genre Original Articles
GeographicLocations United States--US
GeographicLocations_xml – name: United States--US
GroupedDBID -~X
.7I
.QK
0BK
0R~
29L
2DF
3R3
3YN
4.4
42H
42P
5GY
5VS
AAAVI
AAGZJ
AAMFJ
AAMIU
AAPUL
AATTQ
AAZMC
ABBKH
ABCCY
ABFIM
ABGJC
ABJVF
ABLIJ
ABLJU
ABPEM
ABPTK
ABPTX
ABQHQ
ABSSG
ABTAI
ABXUL
ABZLS
ACGFO
ACGFS
ACHQT
ACLSK
ACTIO
ACTOA
ADAHI
ADCVX
ADLRE
ADXPE
AECIN
AEGYZ
AEISY
AEKEX
AEOZL
AEPSL
AEYOC
AEZRU
AFOLD
AFWLO
AGDLA
AGMYJ
AGRBW
AIJEM
AJWEG
AKBVH
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AVBZW
AWYRJ
BEJHT
BLEHA
BMOTO
BOHLJ
CCCUG
CQ1
CS3
DKSSO
DU5
EBS
EOKQO
E~B
E~C
FUNRP
G-F
GTTXZ
H13
HF~
HZ~
IPNFZ
J.O
KDLKA
KYCEM
LJTGL
M4Z
NA5
O9-
P2P
PQEST
PQQKQ
RIG
RNANH
ROSJB
RSYQP
S-F
STATR
TEY
TFH
TFL
TFW
TN5
TNTFI
TRJHH
UT5
UT9
V1K
VAE
VQA
~01
~45
~S~
AAYXX
ABJNI
ABXYU
ADKVQ
ADMHG
AHDZW
CITATION
DGFLZ
O-.
TBQAZ
TDBHL
TUROJ
7UB
8BJ
FQK
JBE
ID FETCH-LOGICAL-c338t-7090ef3e7b3e88d564bbdf8cb63b7be041bfbdcf848277a3c3433978caf77aa43
ISSN 0140-2390
IngestDate Thu Oct 10 17:23:35 EDT 2024
Fri Dec 06 02:27:35 EST 2024
Tue Jul 04 04:10:32 EDT 2023
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c338t-7090ef3e7b3e88d564bbdf8cb63b7be041bfbdcf848277a3c3433978caf77aa43
PQID 2832639321
PQPubID 31501
PageCount 36
ParticipantIDs crossref_primary_10_1080_01402390_2021_1944856
informaworld_taylorfrancis_310_1080_01402390_2021_1944856
proquest_journals_2832639321
PublicationCentury 2000
PublicationDate 2023-04-16
PublicationDateYYYYMMDD 2023-04-16
PublicationDate_xml – month: 04
  year: 2023
  text: 2023-04-16
  day: 16
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Journal of strategic studies
PublicationYear 2023
Publisher Routledge
Taylor & Francis Ltd
Publisher_xml – name: Routledge
– name: Taylor & Francis Ltd
References cit0110
cit0078
cit0111
cit0075
cit0073
Libicki Martin (cit0066) 2009
cit0074
cit0071
cit0072
Drezner Daniel W. (cit0024) 2010
cit0118
cit0119
cit0116
cit0117
cit0114
cit0115
cit0079
cit0112
cit0113
Borghard Erica D. (cit0008) 2020
cit0100
cit0065
cit0063
cit0060
cit0061
Friedman Allan (cit0031) 2014
Jervis Robert (cit0057) 1984
Smeets Max (cit0103)
Goldman Zachary K. (cit0037) 2016; 8
cit0109
cit0107
cit0108
Mueller Karl P. (cit0077) 2018; 12
cit0106
Hinck Garrett (cit0046) 2020
cit0104
cit0068
cit0101
cit0069
cit0102
cit0011
Kostyuk Nadiya (cit0062) 2018; 3
cit0099
cit0012
cit0097
cit0010
cit0095
cit0096
cit0093
cit0091
Kesari Aniket (cit0059) 2017; 32
cit0092
Clark Richard A. (cit0017) 2010
cit0019
cit0018
cit0015
cit0016
Pape Robert A. (cit0087) 1996
cit0088
cit0121
cit0001
cit0089
cit0122
Gray Colin S. (cit0040) 1984; 7
cit0120
cit0084
Long Austin G. (cit0070) 2008
cit0085
cit0082
cit0083
cit0081
cit0009
cit0006
cit0004
Jensen Eric Talbot (cit0054) 2017; 48
Libicki Martin C. (cit0067) 2013
cit0005
cit0002
cit0123
cit0003
cit0033
cit0034
cit0032
Denning Dorothy E. (cit0021) 2015; 77
Snyder Jack L. (cit0105) 1977
Rid Thomas (cit0094) 2013
cit0039
Kugler Richard L. (cit0064) 2009
cit0038
Freedman Lawrence (cit0030) 2004
cit0036
cit0022
cit0023
cit0020
Quester George H. (cit0090) 1986
Morgan Patrick M. (cit0076) 2010
Jervis Robert (cit0055) 1970
cit0028
cit0029
cit0026
cit0027
cit0025
Buchanan Ben (cit0013) 2016
cit0056
cit0053
cit0052
cit0050
Borghard Erica D. (cit0007) 2019; 13
Nye Joseph S. (cit0086) 2011
Schelling Thomas C. (cit0098) 1966
cit0058
cit0044
cit0045
cit0042
cit0043
Byman Daniel (cit0014) 2002
cit0041
Nakasone Paul M. (cit0080) 2019; 92
Gavin Francis J. (cit0035) 2012
Inglis Chris (cit0051) 2016; 14
cit0048
cit0049
cit0047
References_xml – ident: cit0038
– ident: cit0093
  doi: 10.1080/01402390.2011.608939
– ident: cit0009
– ident: cit0044
– ident: cit0082
– volume-title: Cybersecurity and Cyberwar: What Everyone Needs to Know
  year: 2014
  ident: cit0031
  contributor:
    fullname: Friedman Allan
– ident: cit0100
  doi: 10.7591/9781501737831
– ident: cit0099
  doi: 10.1093/oso/9780190908645.003.0005
– volume-title: Deterrence before Hiroshima: The Airpower Background of Modern Strategy
  year: 1986
  ident: cit0090
  contributor:
    fullname: Quester George H.
– ident: cit0115
– ident: cit0036
  doi: 10.21236/ADA601645
– ident: cit0118
  doi: 10.1177/0022343313518940
– ident: cit0018
– volume-title: The Illogic of American Nuclear Strategy
  year: 1984
  ident: cit0057
  contributor:
    fullname: Jervis Robert
– volume-title: Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for US Policy
  year: 2010
  ident: cit0076
  contributor:
    fullname: Morgan Patrick M.
– ident: cit0010
– ident: cit0033
  doi: 10.1162/ISEC_a_00136
– ident: cit0106
– ident: cit0109
– ident: cit0003
– ident: cit0095
  doi: 10.1080/01402390.2014.977382
– volume-title: The Sanctions Paradox
  year: 2010
  ident: cit0024
  contributor:
    fullname: Drezner Daniel W.
– ident: cit0117
  doi: 10.1093/oso/9780190618094.001.0001
– volume-title: The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations
  year: 2016
  ident: cit0013
  contributor:
    fullname: Buchanan Ben
– year: 2011
  ident: cit0086
  publication-title: Strategic Studies Quarterly
  contributor:
    fullname: Nye Joseph S.
– ident: cit0112
– ident: cit0122
– ident: cit0074
  doi: 10.7591/9781501713262
– volume-title: The Logic of Images in International Relations
  year: 1970
  ident: cit0055
  contributor:
    fullname: Jervis Robert
– ident: cit0085
  doi: 10.1162/ISEC_a_00266
– ident: cit0005
  doi: 10.1016/j.orbis.2016.05.009
– volume: 8
  year: 2016
  ident: cit0037
  publication-title: Journal of National Security Law and Policy
  contributor:
    fullname: Goldman Zachary K.
– volume-title: Ten Years In: Implementing Strategic Approaches to Cyberspace
  year: 2020
  ident: cit0008
  contributor:
    fullname: Borghard Erica D.
– volume: 48
  issue: 3
  year: 2017
  ident: cit0054
  publication-title: Georgetown Journal of International Law
  contributor:
    fullname: Jensen Eric Talbot
– ident: cit0052
– volume: 13
  issue: 3
  year: 2019
  ident: cit0007
  publication-title: Strategic Studies Quarterly
  contributor:
    fullname: Borghard Erica D.
– ident: cit0023
– ident: cit0068
  doi: 10.1093/acprof:oso/9780190201265.001.0001
– ident: cit0004
– volume-title: Cyberdeterrence and Cyberwar
  year: 2009
  ident: cit0066
  contributor:
    fullname: Libicki Martin
– volume-title: 2018 10th International Conference on Cyber Conflict (CyCon)
  ident: cit0103
  contributor:
    fullname: Smeets Max
– volume-title: Nuclear Statecraft: History and Strategy in America’s Atomic Age
  year: 2012
  ident: cit0035
  contributor:
    fullname: Gavin Francis J.
– volume-title: Deterrence
  year: 2004
  ident: cit0030
  contributor:
    fullname: Freedman Lawrence
– ident: cit0079
– volume-title: Cyber War Will Not Take Place
  year: 2013
  ident: cit0094
  contributor:
    fullname: Rid Thomas
– ident: cit0043
– ident: cit0121
  doi: 10.1080/09636419309347540
– ident: cit0049
  doi: 10.2307/2538699
– ident: cit0032
– ident: cit0050
  doi: 10.2307/2600411
– ident: cit0114
– ident: cit0101
  doi: 10.1162/ISEC_a_00267
– ident: cit0058
  doi: 10.2307/j.ctt1trkjd1
– ident: cit0111
  doi: 10.1080/01402390.2015.1115975
– ident: cit0120
– volume: 3
  issue: 1
  year: 2018
  ident: cit0062
  publication-title: The Cyber Defense Review
  contributor:
    fullname: Kostyuk Nadiya
– ident: cit0063
  doi: 10.1093/cybsec/tyz007
– ident: cit0088
  doi: 10.1162/isec.23.1.66
– ident: cit0048
– ident: cit0108
– ident: cit0029
  doi: 10.1007/978-1-349-20165-5
– volume-title: The Soviet Strategic Culture: Implications for Limited Nuclear Operations
  year: 1977
  ident: cit0105
  contributor:
    fullname: Snyder Jack L.
– ident: cit0025
– ident: cit0092
– volume-title: Cyberpower and National Security
  year: 2009
  ident: cit0064
  contributor:
    fullname: Kugler Richard L.
– ident: cit0123
– ident: cit0096
  doi: 10.1080/13523260.2013.771031
– ident: cit0119
– ident: cit0073
  doi: 10.2307/2538586
– ident: cit0045
– ident: cit0083
– volume: 32
  issue: 3
  year: 2017
  ident: cit0059
  publication-title: Berkeley Technology Law Journal
  contributor:
    fullname: Kesari Aniket
– ident: cit0002
  doi: 10.2307/2626666
– ident: cit0061
  doi: 10.1093/isq/sqab039
– ident: cit0039
  doi: 10.2307/2009894
– ident: cit0072
– ident: cit0020
– volume: 12
  issue: 4
  year: 2018
  ident: cit0077
  publication-title: Strategic Studies Quarterly
  contributor:
    fullname: Mueller Karl P.
– ident: cit0116
– ident: cit0027
  doi: 10.1017/S0020818300033324
– volume-title: Bombing to Win: Air Power and Coercion in War
  year: 1996
  ident: cit0087
  contributor:
    fullname: Pape Robert A.
– ident: cit0097
– volume: 92
  issue: 1
  year: 2019
  ident: cit0080
  publication-title: Joint Force Quarterly
  contributor:
    fullname: Nakasone Paul M.
– ident: cit0028
  doi: 10.1016/j.orbis.2017.05.003
– ident: cit0042
– ident: cit0060
  doi: 10.1080/13523261003640819
– volume: 7
  issue: 1
  year: 1984
  ident: cit0040
  publication-title: The Journal of Strategic Studies
  contributor:
    fullname: Gray Colin S.
– ident: cit0102
  doi: 10.1080/01402390.2017.1288107
– ident: cit0012
  doi: 10.2307/2538458
– volume-title: The Dynamics of Coercion: American Foreign Policy and the Limits of Military Might
  year: 2002
  ident: cit0014
  contributor:
    fullname: Byman Daniel
– ident: cit0069
– ident: cit0084
– ident: cit0075
– volume-title: Deterrence: From Cold War to Long War: Lessons from Six Decades of RAND Deterrence Research
  year: 2008
  ident: cit0070
  contributor:
    fullname: Long Austin G.
– volume-title: Arms and Influence
  year: 1966
  ident: cit0098
  contributor:
    fullname: Schelling Thomas C.
– ident: cit0001
  doi: 10.1080/01495939308402915
– volume: 77
  issue: 2
  year: 2015
  ident: cit0021
  publication-title: Joint Forces Quarterly
  contributor:
    fullname: Denning Dorothy E.
– ident: cit0056
  doi: 10.2307/2009945
– ident: cit0113
– ident: cit0026
  doi: 10.1162/isec_a_00351
– volume-title: Brandishing Cyber Capabilities
  year: 2013
  ident: cit0067
  contributor:
    fullname: Libicki Martin C.
– year: 2020
  ident: cit0046
  publication-title: Journal of National Security Law and Policy
  contributor:
    fullname: Hinck Garrett
– ident: cit0006
  doi: 10.1080/09636412.2017.1306396
– ident: cit0016
– ident: cit0011
  doi: 10.23919/CYCON.2018.8405009
– ident: cit0081
– ident: cit0015
  doi: 10.1080/09636412.2017.1243921
– ident: cit0089
– ident: cit0110
– ident: cit0034
  doi: 10.1080/09636412.2015.1038188
– ident: cit0065
  doi: 10.2307/2010415
– ident: cit0107
– ident: cit0047
– ident: cit0053
– ident: cit0022
– ident: cit0041
  doi: 10.1162/isec_a_00367
– volume: 14
  issue: 1
  year: 2016
  ident: cit0051
  publication-title: SSRN Electronic Journal
  contributor:
    fullname: Inglis Chris
– ident: cit0104
  doi: 10.1515/9781400877164
– volume-title: Cyber War: The Next Threat to National Security and What to Do about It
  year: 2010
  ident: cit0017
  contributor:
    fullname: Clark Richard A.
– ident: cit0019
– ident: cit0071
  doi: 10.1017/9781316422724
– ident: cit0078
– ident: cit0091
  doi: 10.7551/mitpress/6483.001.0001
SSID ssj0018853
Score 2.4052408
Snippet Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced,...
SourceID proquest
crossref
informaworld
SourceType Aggregation Database
Publisher
StartPage 534
SubjectTerms cyberspace
Denial
Deterrence
Deterrence theory
Internet
Logic
Nuclear proliferation
Punishment
U.S. cyber strategy and policy
Title Deterrence by denial in cyberspace
URI https://www.tandfonline.com/doi/abs/10.1080/01402390.2021.1944856
https://www.proquest.com/docview/2832639321
Volume 46
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELZge-GCeKqFgiyEuKwSJRkncY5AQatK9IC2Ym-RH3HLZYu2QWj59czEzmPpCiiXKIkUx_FMxuPxN98w9rqorM1owx1KZyM0eEWkqkJFrtA6z40UadMBZM-Kxbk4XeWrsdBll13S6tj83JtX8j9SxXsoV8qSvYVkh0bxBp6jfPGIEsbjP8n4hLAsniYWvUhLuDmi0JibraYcSmV2cT6j73kdOGlNRy87wRG-u9pcXCoPd-9M5PwkHjA7xGl0EQKml-rHev4lngYNMqD9D5_TOMQRkygDX6kzbrztI7ZS9FZWU-MoiokSwMTS5SEG6SfN3NdbuWGPA4AR30Yvw-V4lsZphUvCfA__9W_z0oAWTHsa09BMTc3UoZm77IA4EMWMHSw_ny4WwxaSlJ6CtP_SPn2LiNX39WfHMdmhrb0xTXe-x_IBux8Ex996DXjI7jTrR-zwU0ewvtnyN_xMoVrxYKcfs1ejYnC95V4x-Nc1HxXjCTv_-GH5fhGFYhiRAZBtVCZV0jhoSg2NlDYvhNbWSaML0KVuEpFqp61xknhdSwUGBKCvKY1yeKkEPGWzNerJIeOuIq9Yg0pULlKrdCZsQgvLFJcD4LIjFvcjUX_znCf1H2VwxKrpeNVtF2xyvjJMDX959rgf3Dr8Wtc11c9C1xmy9Nlt-_Kc3RsV_pjN2s335gX6ja1-GTTkF1pNYC4
link.rule.ids 314,780,784,27924,27925,59651,60440
linkProvider Taylor & Francis
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELZ4DLDwRgUKWAixpSSx4zgj4qEAbQfUSt0sPyUECgjCUH49vjwQBSEGxgy2nLN9vs_-7juEjllmTAwP7iR1JvAOjwUyYzJwTKkk0ZxGtiLIDlk-pjeTZPIlFwZolYChXS0UUflq2NxwGd1S4k4BFcQerHt4F0c9D8MpT9g8WkwylvjNuTi6u8nzz7cEzmstSiAyQqs2j-e3jmZOqBn90h_-ujqErlaRbodfc08eem-l6un3b8qO__u_NbTSxKj4rF5U62jOFhuoM6j0vF-m-AQPpV-fuHELm-joAjg1VdogVlNsgL_3iO8LrKcKcjmltltofHU5Os-DpvZCoD1oLYM0zELriE0VsZybhFGljONaMaJSZUMaKaeMdhxkRFNJNKHEhzZcS-c_JSXbaKF4KmwHYZdBEKaIDGVCIyNVTE0IOCby0Sdx8Q7qtfYWz7XEhoha5dLGEgIsIRpL7KDs66yIsrrbcHUhEkH-aNttp1A0u_VVQLkmH6mRONr9R9eHaCkfDfqifz283UPLUJcenp0i1kUL5cub3ffRS6kOmuX5AbyI36k
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB7BIiEu5VlBy8NCqLdsk9hxnCMCVgu0q6oCiZvl8UNCoC2CcNj--nryqHgIceCYg61kPB7PF3_zDcCBrJzL6cKdl8ElMeDJxFTSJEEiFoVVIvMNQXYix5fi7Kro2YQPHa2SMHRohSKaWE2b-86FnhH3nUBBHrF6RHd5NowoXKhCzsOCpPbJA1i4-H02Hv-_SlCqlaIkHiON6st43pro2QH1TL70VbhuzqDRMmD_9i315Gb4WOPQ_n0h7Pihz1uBT12Gyg5bl1qFOT9dg82fjZr3_Yx9YxMTvZN1QWEd9o-JUdMUDTKcMUfsvVt2PWV2hlTJaazfgMvRycXROOk6LyQ2QtY6KdMq9YH7ErlXyhVSILqgLEqOJfpUZBjQ2aBIRLQ03HLBY2KjrAnx0Qj-GQbTP1O_CSxUlIIhN6kpROYM5sKlhGKymHvykG_BsDe3vmsFNnTW65Z2ltBkCd1ZYguqp4ui6-bPRmjbkGj-ztjtfgV1t1cfNDVrinkaz7MvH5h6DxZ_HY_0j9PJ-VdYoqb0dOeUyW0Y1PePfiemLjXuds75Dwiw3k0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Deterrence+by+denial+in+cyberspace&rft.jtitle=Journal+of+strategic+studies&rft.au=Borghard%2C+Erica+D.&rft.au=Lonergan%2C+Shawn+W.&rft.date=2023-04-16&rft.issn=0140-2390&rft.eissn=1743-937X&rft.volume=46&rft.issue=3&rft.spage=534&rft.epage=569&rft_id=info:doi/10.1080%2F01402390.2021.1944856&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_01402390_2021_1944856
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-2390&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-2390&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-2390&client=summon