Deterrence by denial in cyberspace
Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and conceptual rigor to the proliferation of arguments within the United States about deterrence in cybersp...
Saved in:
Published in | Journal of strategic studies Vol. 46; no. 3; pp. 534 - 569 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
London
Routledge
16.04.2023
Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and conceptual rigor to the proliferation of arguments within the United States about deterrence in cyberspace. Specifically, we argue that cyber deterrence frameworks that draw from the traditional nuclear deterrence literature and the logic of deterrence by punishment are mismatched to deterrence challenges in cyberspace. Instead, we advocate for a deterrence by denial approach, but one that is oriented around counter-cyber operations rather than simply improving defenses. While there has been some scholarship and work by practitioners that implicitly rests on a deterrence by denial logic, they suffer from a lack of systematic assessment of how traditional denial concepts, especially those developed in the conventional deterrence literature, could be extended to cyberspace. Therefore, in this article, we review different deterrence concepts in theory and practice, articulate a logic of cyber deterrence by denial, and provide policy recommendations for the United States. |
---|---|
AbstractList | Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced, as well as provide greater clarity and conceptual rigor to the proliferation of arguments within the United States about deterrence in cyberspace. Specifically, we argue that cyber deterrence frameworks that draw from the traditional nuclear deterrence literature and the logic of deterrence by punishment are mismatched to deterrence challenges in cyberspace. Instead, we advocate for a deterrence by denial approach, but one that is oriented around counter-cyber operations rather than simply improving defenses. While there has been some scholarship and work by practitioners that implicitly rests on a deterrence by denial logic, they suffer from a lack of systematic assessment of how traditional denial concepts, especially those developed in the conventional deterrence literature, could be extended to cyberspace. Therefore, in this article, we review different deterrence concepts in theory and practice, articulate a logic of cyber deterrence by denial, and provide policy recommendations for the United States. |
Author | Lonergan, Shawn W. Borghard, Erica D. |
Author_xml | – sequence: 1 givenname: Erica D. surname: Borghard fullname: Borghard, Erica D. email: eborghard@gmail.com organization: Columbia University – sequence: 2 givenname: Shawn W. surname: Lonergan fullname: Lonergan, Shawn W. organization: 75th Innovation Command and PricewaterhouseCoopers |
BookMark | eNp9kF1LwzAUhoNMcJv-BKHodWeSkzbpnTI_YeCNgnchSU-go0tn0iH997Zs3np1eOF53wPPgsxCF5CQa0ZXjCp6R5mgHCq64pSzFauEUEV5RuZMCsgrkF8zMp-YfIIuyCKlLaVMqQLm5OYRe4wRg8PMDlmNoTFt1oTMDRZj2huHl-Tcmzbh1ekuyefz08f6Nd-8v7ytHza5A1B9LmlF0QNKC6hUXZTC2torZ0uw0iIVzHpbO6-E4lIacCAAKqmc8WM0Apbk9ri7j933AVOvt90hhvGl5gp4CRVwNlLFkXKxSymi1_vY7EwcNKN60qH_dOhJhz7pGHv3x14TfBd35qeLba17M7Rd9NEE1yQN_0_8Ag0VZvY |
CitedBy_id | crossref_primary_10_1080_13523260_2023_2256572 crossref_primary_10_1080_14702436_2022_2082955 crossref_primary_10_1093_jogss_ogac005 crossref_primary_10_60097_ACIG_190263 crossref_primary_10_1080_01402390_2023_2174106 crossref_primary_10_1093_isr_viad036 crossref_primary_10_1080_10357718_2023_2274443 crossref_primary_10_1093_cybsec_tyad006 |
Cites_doi | 10.1080/01402390.2011.608939 10.7591/9781501737831 10.1093/oso/9780190908645.003.0005 10.21236/ADA601645 10.1177/0022343313518940 10.1162/ISEC_a_00136 10.1080/01402390.2014.977382 10.1093/oso/9780190618094.001.0001 10.7591/9781501713262 10.1162/ISEC_a_00266 10.1016/j.orbis.2016.05.009 10.1093/acprof:oso/9780190201265.001.0001 10.1080/09636419309347540 10.2307/2538699 10.2307/2600411 10.1162/ISEC_a_00267 10.2307/j.ctt1trkjd1 10.1080/01402390.2015.1115975 10.1093/cybsec/tyz007 10.1162/isec.23.1.66 10.1007/978-1-349-20165-5 10.1080/13523260.2013.771031 10.2307/2538586 10.2307/2626666 10.1093/isq/sqab039 10.2307/2009894 10.1017/S0020818300033324 10.1016/j.orbis.2017.05.003 10.1080/13523261003640819 10.1080/01402390.2017.1288107 10.2307/2538458 10.1080/01495939308402915 10.2307/2009945 10.1162/isec_a_00351 10.1080/09636412.2017.1306396 10.23919/CYCON.2018.8405009 10.1080/09636412.2017.1243921 10.1080/09636412.2015.1038188 10.2307/2010415 10.1162/isec_a_00367 10.1515/9781400877164 10.1017/9781316422724 10.7551/mitpress/6483.001.0001 |
ContentType | Journal Article |
Copyright | 2021 Informa UK Limited, trading as Taylor & Francis Group 2021 2021 Informa UK Limited, trading as Taylor & Francis Group |
Copyright_xml | – notice: 2021 Informa UK Limited, trading as Taylor & Francis Group 2021 – notice: 2021 Informa UK Limited, trading as Taylor & Francis Group |
DBID | AAYXX CITATION 7UB 8BJ FQK JBE |
DOI | 10.1080/01402390.2021.1944856 |
DatabaseName | CrossRef Worldwide Political Science Abstracts International Bibliography of the Social Sciences (IBSS) International Bibliography of the Social Sciences International Bibliography of the Social Sciences |
DatabaseTitle | CrossRef International Bibliography of the Social Sciences (IBSS) Worldwide Political Science Abstracts |
DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Military & Naval Science |
EISSN | 1743-937X |
EndPage | 569 |
ExternalDocumentID | 10_1080_01402390_2021_1944856 1944856 |
Genre | Original Articles |
GeographicLocations | United States--US |
GeographicLocations_xml | – name: United States--US |
GroupedDBID | -~X .7I .QK 0BK 0R~ 29L 2DF 3R3 3YN 4.4 42H 42P 5GY 5VS AAAVI AAGZJ AAMFJ AAMIU AAPUL AATTQ AAZMC ABBKH ABCCY ABFIM ABGJC ABJVF ABLIJ ABLJU ABPEM ABPTK ABPTX ABQHQ ABSSG ABTAI ABXUL ABZLS ACGFO ACGFS ACHQT ACLSK ACTIO ACTOA ADAHI ADCVX ADLRE ADXPE AECIN AEGYZ AEISY AEKEX AEOZL AEPSL AEYOC AEZRU AFOLD AFWLO AGDLA AGMYJ AGRBW AIJEM AJWEG AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CCCUG CQ1 CS3 DKSSO DU5 EBS EOKQO E~B E~C FUNRP G-F GTTXZ H13 HF~ HZ~ IPNFZ J.O KDLKA KYCEM LJTGL M4Z NA5 O9- P2P PQEST PQQKQ RIG RNANH ROSJB RSYQP S-F STATR TEY TFH TFL TFW TN5 TNTFI TRJHH UT5 UT9 V1K VAE VQA ~01 ~45 ~S~ AAYXX ABJNI ABXYU ADKVQ ADMHG AHDZW CITATION DGFLZ O-. TBQAZ TDBHL TUROJ 7UB 8BJ FQK JBE |
ID | FETCH-LOGICAL-c338t-7090ef3e7b3e88d564bbdf8cb63b7be041bfbdcf848277a3c3433978caf77aa43 |
ISSN | 0140-2390 |
IngestDate | Thu Oct 10 17:23:35 EDT 2024 Fri Dec 06 02:27:35 EST 2024 Tue Jul 04 04:10:32 EDT 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c338t-7090ef3e7b3e88d564bbdf8cb63b7be041bfbdcf848277a3c3433978caf77aa43 |
PQID | 2832639321 |
PQPubID | 31501 |
PageCount | 36 |
ParticipantIDs | crossref_primary_10_1080_01402390_2021_1944856 informaworld_taylorfrancis_310_1080_01402390_2021_1944856 proquest_journals_2832639321 |
PublicationCentury | 2000 |
PublicationDate | 2023-04-16 |
PublicationDateYYYYMMDD | 2023-04-16 |
PublicationDate_xml | – month: 04 year: 2023 text: 2023-04-16 day: 16 |
PublicationDecade | 2020 |
PublicationPlace | London |
PublicationPlace_xml | – name: London |
PublicationTitle | Journal of strategic studies |
PublicationYear | 2023 |
Publisher | Routledge Taylor & Francis Ltd |
Publisher_xml | – name: Routledge – name: Taylor & Francis Ltd |
References | cit0110 cit0078 cit0111 cit0075 cit0073 Libicki Martin (cit0066) 2009 cit0074 cit0071 cit0072 Drezner Daniel W. (cit0024) 2010 cit0118 cit0119 cit0116 cit0117 cit0114 cit0115 cit0079 cit0112 cit0113 Borghard Erica D. (cit0008) 2020 cit0100 cit0065 cit0063 cit0060 cit0061 Friedman Allan (cit0031) 2014 Jervis Robert (cit0057) 1984 Smeets Max (cit0103) Goldman Zachary K. (cit0037) 2016; 8 cit0109 cit0107 cit0108 Mueller Karl P. (cit0077) 2018; 12 cit0106 Hinck Garrett (cit0046) 2020 cit0104 cit0068 cit0101 cit0069 cit0102 cit0011 Kostyuk Nadiya (cit0062) 2018; 3 cit0099 cit0012 cit0097 cit0010 cit0095 cit0096 cit0093 cit0091 Kesari Aniket (cit0059) 2017; 32 cit0092 Clark Richard A. (cit0017) 2010 cit0019 cit0018 cit0015 cit0016 Pape Robert A. (cit0087) 1996 cit0088 cit0121 cit0001 cit0089 cit0122 Gray Colin S. (cit0040) 1984; 7 cit0120 cit0084 Long Austin G. (cit0070) 2008 cit0085 cit0082 cit0083 cit0081 cit0009 cit0006 cit0004 Jensen Eric Talbot (cit0054) 2017; 48 Libicki Martin C. (cit0067) 2013 cit0005 cit0002 cit0123 cit0003 cit0033 cit0034 cit0032 Denning Dorothy E. (cit0021) 2015; 77 Snyder Jack L. (cit0105) 1977 Rid Thomas (cit0094) 2013 cit0039 Kugler Richard L. (cit0064) 2009 cit0038 Freedman Lawrence (cit0030) 2004 cit0036 cit0022 cit0023 cit0020 Quester George H. (cit0090) 1986 Morgan Patrick M. (cit0076) 2010 Jervis Robert (cit0055) 1970 cit0028 cit0029 cit0026 cit0027 cit0025 Buchanan Ben (cit0013) 2016 cit0056 cit0053 cit0052 cit0050 Borghard Erica D. (cit0007) 2019; 13 Nye Joseph S. (cit0086) 2011 Schelling Thomas C. (cit0098) 1966 cit0058 cit0044 cit0045 cit0042 cit0043 Byman Daniel (cit0014) 2002 cit0041 Nakasone Paul M. (cit0080) 2019; 92 Gavin Francis J. (cit0035) 2012 Inglis Chris (cit0051) 2016; 14 cit0048 cit0049 cit0047 |
References_xml | – ident: cit0038 – ident: cit0093 doi: 10.1080/01402390.2011.608939 – ident: cit0009 – ident: cit0044 – ident: cit0082 – volume-title: Cybersecurity and Cyberwar: What Everyone Needs to Know year: 2014 ident: cit0031 contributor: fullname: Friedman Allan – ident: cit0100 doi: 10.7591/9781501737831 – ident: cit0099 doi: 10.1093/oso/9780190908645.003.0005 – volume-title: Deterrence before Hiroshima: The Airpower Background of Modern Strategy year: 1986 ident: cit0090 contributor: fullname: Quester George H. – ident: cit0115 – ident: cit0036 doi: 10.21236/ADA601645 – ident: cit0118 doi: 10.1177/0022343313518940 – ident: cit0018 – volume-title: The Illogic of American Nuclear Strategy year: 1984 ident: cit0057 contributor: fullname: Jervis Robert – volume-title: Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for US Policy year: 2010 ident: cit0076 contributor: fullname: Morgan Patrick M. – ident: cit0010 – ident: cit0033 doi: 10.1162/ISEC_a_00136 – ident: cit0106 – ident: cit0109 – ident: cit0003 – ident: cit0095 doi: 10.1080/01402390.2014.977382 – volume-title: The Sanctions Paradox year: 2010 ident: cit0024 contributor: fullname: Drezner Daniel W. – ident: cit0117 doi: 10.1093/oso/9780190618094.001.0001 – volume-title: The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations year: 2016 ident: cit0013 contributor: fullname: Buchanan Ben – year: 2011 ident: cit0086 publication-title: Strategic Studies Quarterly contributor: fullname: Nye Joseph S. – ident: cit0112 – ident: cit0122 – ident: cit0074 doi: 10.7591/9781501713262 – volume-title: The Logic of Images in International Relations year: 1970 ident: cit0055 contributor: fullname: Jervis Robert – ident: cit0085 doi: 10.1162/ISEC_a_00266 – ident: cit0005 doi: 10.1016/j.orbis.2016.05.009 – volume: 8 year: 2016 ident: cit0037 publication-title: Journal of National Security Law and Policy contributor: fullname: Goldman Zachary K. – volume-title: Ten Years In: Implementing Strategic Approaches to Cyberspace year: 2020 ident: cit0008 contributor: fullname: Borghard Erica D. – volume: 48 issue: 3 year: 2017 ident: cit0054 publication-title: Georgetown Journal of International Law contributor: fullname: Jensen Eric Talbot – ident: cit0052 – volume: 13 issue: 3 year: 2019 ident: cit0007 publication-title: Strategic Studies Quarterly contributor: fullname: Borghard Erica D. – ident: cit0023 – ident: cit0068 doi: 10.1093/acprof:oso/9780190201265.001.0001 – ident: cit0004 – volume-title: Cyberdeterrence and Cyberwar year: 2009 ident: cit0066 contributor: fullname: Libicki Martin – volume-title: 2018 10th International Conference on Cyber Conflict (CyCon) ident: cit0103 contributor: fullname: Smeets Max – volume-title: Nuclear Statecraft: History and Strategy in America’s Atomic Age year: 2012 ident: cit0035 contributor: fullname: Gavin Francis J. – volume-title: Deterrence year: 2004 ident: cit0030 contributor: fullname: Freedman Lawrence – ident: cit0079 – volume-title: Cyber War Will Not Take Place year: 2013 ident: cit0094 contributor: fullname: Rid Thomas – ident: cit0043 – ident: cit0121 doi: 10.1080/09636419309347540 – ident: cit0049 doi: 10.2307/2538699 – ident: cit0032 – ident: cit0050 doi: 10.2307/2600411 – ident: cit0114 – ident: cit0101 doi: 10.1162/ISEC_a_00267 – ident: cit0058 doi: 10.2307/j.ctt1trkjd1 – ident: cit0111 doi: 10.1080/01402390.2015.1115975 – ident: cit0120 – volume: 3 issue: 1 year: 2018 ident: cit0062 publication-title: The Cyber Defense Review contributor: fullname: Kostyuk Nadiya – ident: cit0063 doi: 10.1093/cybsec/tyz007 – ident: cit0088 doi: 10.1162/isec.23.1.66 – ident: cit0048 – ident: cit0108 – ident: cit0029 doi: 10.1007/978-1-349-20165-5 – volume-title: The Soviet Strategic Culture: Implications for Limited Nuclear Operations year: 1977 ident: cit0105 contributor: fullname: Snyder Jack L. – ident: cit0025 – ident: cit0092 – volume-title: Cyberpower and National Security year: 2009 ident: cit0064 contributor: fullname: Kugler Richard L. – ident: cit0123 – ident: cit0096 doi: 10.1080/13523260.2013.771031 – ident: cit0119 – ident: cit0073 doi: 10.2307/2538586 – ident: cit0045 – ident: cit0083 – volume: 32 issue: 3 year: 2017 ident: cit0059 publication-title: Berkeley Technology Law Journal contributor: fullname: Kesari Aniket – ident: cit0002 doi: 10.2307/2626666 – ident: cit0061 doi: 10.1093/isq/sqab039 – ident: cit0039 doi: 10.2307/2009894 – ident: cit0072 – ident: cit0020 – volume: 12 issue: 4 year: 2018 ident: cit0077 publication-title: Strategic Studies Quarterly contributor: fullname: Mueller Karl P. – ident: cit0116 – ident: cit0027 doi: 10.1017/S0020818300033324 – volume-title: Bombing to Win: Air Power and Coercion in War year: 1996 ident: cit0087 contributor: fullname: Pape Robert A. – ident: cit0097 – volume: 92 issue: 1 year: 2019 ident: cit0080 publication-title: Joint Force Quarterly contributor: fullname: Nakasone Paul M. – ident: cit0028 doi: 10.1016/j.orbis.2017.05.003 – ident: cit0042 – ident: cit0060 doi: 10.1080/13523261003640819 – volume: 7 issue: 1 year: 1984 ident: cit0040 publication-title: The Journal of Strategic Studies contributor: fullname: Gray Colin S. – ident: cit0102 doi: 10.1080/01402390.2017.1288107 – ident: cit0012 doi: 10.2307/2538458 – volume-title: The Dynamics of Coercion: American Foreign Policy and the Limits of Military Might year: 2002 ident: cit0014 contributor: fullname: Byman Daniel – ident: cit0069 – ident: cit0084 – ident: cit0075 – volume-title: Deterrence: From Cold War to Long War: Lessons from Six Decades of RAND Deterrence Research year: 2008 ident: cit0070 contributor: fullname: Long Austin G. – volume-title: Arms and Influence year: 1966 ident: cit0098 contributor: fullname: Schelling Thomas C. – ident: cit0001 doi: 10.1080/01495939308402915 – volume: 77 issue: 2 year: 2015 ident: cit0021 publication-title: Joint Forces Quarterly contributor: fullname: Denning Dorothy E. – ident: cit0056 doi: 10.2307/2009945 – ident: cit0113 – ident: cit0026 doi: 10.1162/isec_a_00351 – volume-title: Brandishing Cyber Capabilities year: 2013 ident: cit0067 contributor: fullname: Libicki Martin C. – year: 2020 ident: cit0046 publication-title: Journal of National Security Law and Policy contributor: fullname: Hinck Garrett – ident: cit0006 doi: 10.1080/09636412.2017.1306396 – ident: cit0016 – ident: cit0011 doi: 10.23919/CYCON.2018.8405009 – ident: cit0081 – ident: cit0015 doi: 10.1080/09636412.2017.1243921 – ident: cit0089 – ident: cit0110 – ident: cit0034 doi: 10.1080/09636412.2015.1038188 – ident: cit0065 doi: 10.2307/2010415 – ident: cit0107 – ident: cit0047 – ident: cit0053 – ident: cit0022 – ident: cit0041 doi: 10.1162/isec_a_00367 – volume: 14 issue: 1 year: 2016 ident: cit0051 publication-title: SSRN Electronic Journal contributor: fullname: Inglis Chris – ident: cit0104 doi: 10.1515/9781400877164 – volume-title: Cyber War: The Next Threat to National Security and What to Do about It year: 2010 ident: cit0017 contributor: fullname: Clark Richard A. – ident: cit0019 – ident: cit0071 doi: 10.1017/9781316422724 – ident: cit0078 – ident: cit0091 doi: 10.7551/mitpress/6483.001.0001 |
SSID | ssj0018853 |
Score | 2.4052408 |
Snippet | Many scholars and practitioners are unconvinced that cyber deterrence is possible. This article aims to demonstrate why some of this skepticism is misplaced,... |
SourceID | proquest crossref informaworld |
SourceType | Aggregation Database Publisher |
StartPage | 534 |
SubjectTerms | cyberspace Denial Deterrence Deterrence theory Internet Logic Nuclear proliferation Punishment U.S. cyber strategy and policy |
Title | Deterrence by denial in cyberspace |
URI | https://www.tandfonline.com/doi/abs/10.1080/01402390.2021.1944856 https://www.proquest.com/docview/2832639321 |
Volume | 46 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELZge-GCeKqFgiyEuKwSJRkncY5AQatK9IC2Ym-RH3HLZYu2QWj59czEzmPpCiiXKIkUx_FMxuPxN98w9rqorM1owx1KZyM0eEWkqkJFrtA6z40UadMBZM-Kxbk4XeWrsdBll13S6tj83JtX8j9SxXsoV8qSvYVkh0bxBp6jfPGIEsbjP8n4hLAsniYWvUhLuDmi0JibraYcSmV2cT6j73kdOGlNRy87wRG-u9pcXCoPd-9M5PwkHjA7xGl0EQKml-rHev4lngYNMqD9D5_TOMQRkygDX6kzbrztI7ZS9FZWU-MoiokSwMTS5SEG6SfN3NdbuWGPA4AR30Yvw-V4lsZphUvCfA__9W_z0oAWTHsa09BMTc3UoZm77IA4EMWMHSw_ny4WwxaSlJ6CtP_SPn2LiNX39WfHMdmhrb0xTXe-x_IBux8Ex996DXjI7jTrR-zwU0ewvtnyN_xMoVrxYKcfs1ejYnC95V4x-Nc1HxXjCTv_-GH5fhGFYhiRAZBtVCZV0jhoSg2NlDYvhNbWSaML0KVuEpFqp61xknhdSwUGBKCvKY1yeKkEPGWzNerJIeOuIq9Yg0pULlKrdCZsQgvLFJcD4LIjFvcjUX_znCf1H2VwxKrpeNVtF2xyvjJMDX959rgf3Dr8Wtc11c9C1xmy9Nlt-_Kc3RsV_pjN2s335gX6ja1-GTTkF1pNYC4 |
link.rule.ids | 314,780,784,27924,27925,59651,60440 |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELZ4DLDwRgUKWAixpSSx4zgj4qEAbQfUSt0sPyUECgjCUH49vjwQBSEGxgy2nLN9vs_-7juEjllmTAwP7iR1JvAOjwUyYzJwTKkk0ZxGtiLIDlk-pjeTZPIlFwZolYChXS0UUflq2NxwGd1S4k4BFcQerHt4F0c9D8MpT9g8WkwylvjNuTi6u8nzz7cEzmstSiAyQqs2j-e3jmZOqBn90h_-ujqErlaRbodfc08eem-l6un3b8qO__u_NbTSxKj4rF5U62jOFhuoM6j0vF-m-AQPpV-fuHELm-joAjg1VdogVlNsgL_3iO8LrKcKcjmltltofHU5Os-DpvZCoD1oLYM0zELriE0VsZybhFGljONaMaJSZUMaKaeMdhxkRFNJNKHEhzZcS-c_JSXbaKF4KmwHYZdBEKaIDGVCIyNVTE0IOCby0Sdx8Q7qtfYWz7XEhoha5dLGEgIsIRpL7KDs66yIsrrbcHUhEkH-aNttp1A0u_VVQLkmH6mRONr9R9eHaCkfDfqifz283UPLUJcenp0i1kUL5cub3ffRS6kOmuX5AbyI36k |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwEB7BIiEu5VlBy8NCqLdsk9hxnCMCVgu0q6oCiZvl8UNCoC2CcNj--nryqHgIceCYg61kPB7PF3_zDcCBrJzL6cKdl8ElMeDJxFTSJEEiFoVVIvMNQXYix5fi7Kro2YQPHa2SMHRohSKaWE2b-86FnhH3nUBBHrF6RHd5NowoXKhCzsOCpPbJA1i4-H02Hv-_SlCqlaIkHiON6st43pro2QH1TL70VbhuzqDRMmD_9i315Gb4WOPQ_n0h7Pihz1uBT12Gyg5bl1qFOT9dg82fjZr3_Yx9YxMTvZN1QWEd9o-JUdMUDTKcMUfsvVt2PWV2hlTJaazfgMvRycXROOk6LyQ2QtY6KdMq9YH7ErlXyhVSILqgLEqOJfpUZBjQ2aBIRLQ03HLBY2KjrAnx0Qj-GQbTP1O_CSxUlIIhN6kpROYM5sKlhGKymHvykG_BsDe3vmsFNnTW65Z2ltBkCd1ZYguqp4ui6-bPRmjbkGj-ztjtfgV1t1cfNDVrinkaz7MvH5h6DxZ_HY_0j9PJ-VdYoqb0dOeUyW0Y1PePfiemLjXuds75Dwiw3k0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Deterrence+by+denial+in+cyberspace&rft.jtitle=Journal+of+strategic+studies&rft.au=Borghard%2C+Erica+D.&rft.au=Lonergan%2C+Shawn+W.&rft.date=2023-04-16&rft.issn=0140-2390&rft.eissn=1743-937X&rft.volume=46&rft.issue=3&rft.spage=534&rft.epage=569&rft_id=info:doi/10.1080%2F01402390.2021.1944856&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_01402390_2021_1944856 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-2390&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-2390&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-2390&client=summon |