Cyber campaigns and strategic outcomes

While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory...

Full description

Saved in:
Bibliographic Details
Published inJournal of strategic studies Vol. 45; no. 4; pp. 534 - 567
Main Authors Harknett, Richard J., Smeets, Max
Format Journal Article
LanguageEnglish
Published London Routledge 07.06.2022
Taylor & Francis Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory clever tactics, but strategic in intent. This article examines strategic cyber competition and reveals how the adoption of a different construct can pivot both explanation and policy prescription. Strategy must be unshackled from the presumption that it deals only with the realm of coercion, militarised crisis, and war in cyberspace.
AbstractList While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber operations, with the specific objective of achieving strategic outcomes without the need of armed attack. These campaigns are not simply transitory clever tactics, but strategic in intent. This article examines strategic cyber competition and reveals how the adoption of a different construct can pivot both explanation and policy prescription. Strategy must be unshackled from the presumption that it deals only with the realm of coercion, militarised crisis, and war in cyberspace.
Author Harknett, Richard J.
Smeets, Max
Author_xml – sequence: 1
  givenname: Richard J.
  surname: Harknett
  fullname: Harknett, Richard J.
  email: richard.harknett@uc.edu
  organization: University of Cincinnati
– sequence: 2
  givenname: Max
  surname: Smeets
  fullname: Smeets, Max
BookMark eNp9kEtLAzEUhYNUsFZ_gjAguJt685pkdkrxBQU3Cu5CJrlTpnSSmkyR_ns7tG5dXTh851z4LskkxICE3FCYU9BwD1QA4zXMGbBDpDjjUpyRKVWClzVXXxMyHZlyhC7IZc5rAKq15FNyt9g3mApn-63tViEXNvgiD8kOuOpcEXeDiz3mK3Le2k3G69Odkc_np4_Fa7l8f3lbPC5Lx7UcSqsb6xGkRt-gZBWipQ2vKPi2UsIqBa6unZJctw2zCqny4KHyHhRqKmo-I7fH3W2K3zvMg1nHXQqHl4ZVNdNKCD5S8ki5FHNO2Jpt6nqb9oaCGZWYPyVmVGJOSg69h2OvC21Mvf2JaePNYPebmNpkg-uy4f9P_AI6iWh1
CitedBy_id crossref_primary_10_34020_2073_6495_2023_1_206_221
crossref_primary_10_1080_25741292_2022_2127551
crossref_primary_10_1109_ACCESS_2024_3378735
crossref_primary_10_1080_09662839_2022_2031991
crossref_primary_10_1080_14702436_2021_1994398
crossref_primary_10_1080_01402390_2024_2330074
crossref_primary_10_1016_j_ijcip_2024_100683
crossref_primary_10_1080_03050629_2024_2310014
crossref_primary_10_1093_cybsec_tyac005
crossref_primary_10_17150_2308_6203_2023_12_3__525_543
crossref_primary_10_1080_01402390_2022_2037656
crossref_primary_10_33179_bsv_99_svi_11_cmc_24_2_6
crossref_primary_10_61732_bj_v2i2_58
crossref_primary_10_1080_02684527_2020_1840746
crossref_primary_10_1080_19361610_2021_1872359
crossref_primary_10_1080_02684527_2023_2300933
crossref_primary_10_1080_01402390_2024_2320954
crossref_primary_10_2298_MEDJP2401055V
crossref_primary_10_1080_01402390_2022_2104253
crossref_primary_10_1080_23738871_2021_2000628
crossref_primary_10_1080_01402390_2021_1895117
crossref_primary_10_1109_TTS_2023_3280356
crossref_primary_10_1093_jogss_ogab028
crossref_primary_10_1093_cybsec_tyab008
crossref_primary_10_1177_00223433231220264
crossref_primary_10_1515_peps_2020_0046
crossref_primary_10_1080_23738871_2022_2083976
crossref_primary_10_1080_01402390_2022_2117140
crossref_primary_10_1177_13540661221117051
crossref_primary_10_1080_09592318_2023_2233159
crossref_primary_10_1080_01402390_2023_2174106
crossref_primary_10_1111_puar_13493
crossref_primary_10_1080_13523260_2024_2365062
crossref_primary_10_1093_isr_viaa086
crossref_primary_10_1177_00223433231218178
Cites_doi 10.1109/MC.2002.1106187
10.1080/01495939308402915
10.1007/s10676-005-4582-3
10.1162/ISEC_a_00267
10.1162/ISEC_a_00189
10.1016/j.tvjl.2010.05.029
10.1080/01402390.2012.730485
10.1177/0022343313518940
10.1080/09636412.2017.1306396
10.1080/01402390.2012.739561
10.1080/01402390.2011.608939
10.1080/09636412.2013.816122
10.1080/00396338.2011.555586
10.1080/10630732.2011.578411
10.1080/01402390.2012.663252
10.1111/j.1540-5842.2009.01103.x
10.23919/CYCON.2017.8240326
10.1080/14702436.2018.1508349
10.1002/9781119183440
10.1177/0967010611431079
10.1162/ISEC_a_00138
10.1162/isec_a_00337
10.3390/fi4030672
10.1080/01402390.2012.742013
10.1162/ISEC_a_00136
10.2307/j.ctt1trkjd1
10.1017/CBO9780511612183
10.1093/acprof:oso/9780190201265.003.0006
10.1017/9781316422724
10.1080/01436597.2013.802502
10.1080/13567888.2017.1335101
10.1080/01402390.2017.1288107
10.1093/acprof:oso/9780190204792.001.0001
10.23919/CYCON.2018.8405010
10.1080/18335330.2012.653198
10.1017/S0020818305050010
10.1162/016228803322427965
10.4324/9780203630174
10.1080/19445571.2011.636956
10.1109/MSP.2011.67
ContentType Journal Article
Copyright 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. 2020
2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. This work is licensed under the Creative Commons Attribution – Non-Commercial – No Derivatives License http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. 2020
– notice: 2020 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group. This work is licensed under the Creative Commons Attribution – Non-Commercial – No Derivatives License http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 0YH
AAYXX
CITATION
7UB
8BJ
FQK
JBE
DOI 10.1080/01402390.2020.1732354
DatabaseName Taylor & Francis Open Access
CrossRef
Worldwide Political Science Abstracts
International Bibliography of the Social Sciences (IBSS)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
DatabaseTitle CrossRef
International Bibliography of the Social Sciences (IBSS)
Worldwide Political Science Abstracts
DatabaseTitleList International Bibliography of the Social Sciences (IBSS)

Database_xml – sequence: 1
  dbid: 0YH
  name: Taylor & Francis Open Access
  url: https://www.tandfonline.com
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Military & Naval Science
EISSN 1743-937X
EndPage 567
ExternalDocumentID 10_1080_01402390_2020_1732354
1732354
Genre Original Articles
GroupedDBID -~X
.7I
.QK
0BK
0R~
0YH
29L
2DF
3R3
3YN
4.4
42H
42P
5GY
5VS
AAAVI
AAGZJ
AAMFJ
AAMIU
AAPUL
AATTQ
AAZMC
ABCCY
ABFIM
ABJNI
ABLIJ
ABLJU
ABPEM
ABPTX
ABTAI
ABXUL
ABXYU
ABZLS
ACGFO
ACGFS
ACHQT
ACLSK
ACTIO
ACTOA
ADAHI
ADCVX
ADKVQ
ADLRE
ADXPE
AECIN
AEGYZ
AEISY
AEKEX
AEOZL
AEPSL
AEYOC
AEZRU
AFWLO
AGDLA
AGMYJ
AGRBW
AHDZW
AIJEM
AJWEG
AKBVH
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AVBZW
AWYRJ
BEJHT
BLEHA
BMOTO
BOHLJ
CCCUG
CQ1
CS3
DGFLZ
DKSSO
DU5
EBS
EOKQO
E~B
E~C
G-F
GTTXZ
HF~
HZ~
IPNFZ
J.O
KYCEM
LJTGL
M4Z
NA5
O-.
O9-
P2P
PQQKQ
RIG
RNANH
ROSJB
RSYQP
S-F
STATR
TBQAZ
TDBHL
TEY
TFH
TFL
TFW
TN5
TNTFI
TRJHH
UT5
UT9
VAE
VQA
~01
~45
~S~
AAYXX
ADMHG
CITATION
H13
TUROJ
7UB
8BJ
FQK
JBE
TGHSC
ID FETCH-LOGICAL-c385t-a8bade058edbe526eea1b3610df674a770c99c7538fb2a7e17d0d06dd07e81493
IEDL.DBID 0YH
ISSN 0140-2390
IngestDate Tue Nov 19 06:53:29 EST 2024
Fri Dec 06 02:27:35 EST 2024
Mon Jul 01 06:30:20 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License open-access: http://creativecommons.org/licenses/by-nc-nd/4.0/: http://creativecommons.org/licenses/by-nc-nd/4.0/: This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c385t-a8bade058edbe526eea1b3610df674a770c99c7538fb2a7e17d0d06dd07e81493
OpenAccessLink https://www.tandfonline.com/doi/abs/10.1080/01402390.2020.1732354
PQID 2692874439
PQPubID 31501
PageCount 34
ParticipantIDs proquest_journals_2692874439
informaworld_taylorfrancis_310_1080_01402390_2020_1732354
crossref_primary_10_1080_01402390_2020_1732354
PublicationCentury 2000
PublicationDate 2022-06-07
PublicationDateYYYYMMDD 2022-06-07
PublicationDate_xml – month: 06
  year: 2022
  text: 2022-06-07
  day: 07
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Journal of strategic studies
PublicationYear 2022
Publisher Routledge
Taylor & Francis Ltd
Publisher_xml – name: Routledge
– name: Taylor & Francis Ltd
References cit0110
cit0075
cit0076
cit0073
cit0071
cit0072
cit0070
Smeets Max (cit0126) 2018; 12
cit0118
cit0119
cit0117
cit0115
cit0079
cit0112
cit0113
cit0066
cit0067
cit0100
cit0064
cit0065
cit0063
cit0061
Healey Jason (cit0059) 2013
Kello Lucas (cit0069) 2012
Yould Rachel (cit0148) 2003
cit0109
cit0107
cit0108
cit0105
cit0106
cit0103
cit0104
cit0068
cit0101
cit0102
cit0011
cit0099
cit0132
cit0012
cit0133
cit0097
cit0130
cit0098
cit0131
cit0095
cit0096
cit0093
cit0094
cit0091
cit0092
cit0090
Mahnken Thomas G. (cit0088) 2011; 2
Wheaton Kristan J. (cit0146) 2006; 17
Farwell James P. (cit0040) 2011; 53
Arquilla John (cit0005) 2001
cit0019
cit0017
Rid Thomas (cit0111) 2013
cit0138
cit0015
cit0136
cit0137
cit0013
cit0134
cit0014
Cheung Tai Ming (cit0020) 2009
cit0135
cit0001
cit0089
Sanger David. E. (cit0116) 2012
cit0122
cit0120
cit0084
cit0085
cit0083
Krepinevich Andrew F. (cit0074) 2002
Segal Adam (cit0121) 2016
Lynn William J (cit0086) 2010; 89
cit0008
Gabi Siboni (cit0045) 2012; 4
cit0127
cit0007
cit0128
cit0004
cit0125
cit0002
cit0123
cit0003
cit0124
cit0033
cit0031
cit0032
cit0150
cit0030
Eneken Tikk (cit0034) 2008
Bendrath Ralf (cit0009) 2001; 7
cit0039
cit0037
Cavelty Myriam Dunn (cit0018) 2008
cit0038
cit0035
cit0036
cit0022
cit0143
cit0023
cit0141
cit0142
cit0140
Tikk Eneken (cit0139) 2008
Hollis David M. (cit0062) 2011
Libicki Martin (cit0077) 2009
Carson Austin (cit0016) 2018
Lynn William J (cit0087) 2010
Lin Herbert (cit0081) 2016
cit0028
cit0029
cit0026
cit0147
cit0027
cit0024
cit0145
cit0025
cit0055
cit0056
cit0053
cit0051
cit0052
cit0050
Hayden Michael (cit0057) 2016
Zetter Kim (cit0149) 2014
Bendrath Ralf (cit0010) 2004
Liff Adam P. (cit0080)
Ruys Tom (cit0114) 2010
cit0058
cit0044
Henderson Scott J. (cit0060) 2007
Clarke Richard A. (cit0021) 2010
cit0042
cit0043
cit0041
Smeets Max (cit0129)
Arquilla John (cit0006)
Lin Herbert (cit0082) 2018
Warner Michael (cit0144) 2019; 63
Libicki Martin C. (cit0078) 2012; 8
Harknett Richard. (cit0054) 1998
cit0048
cit0049
cit0046
cit0047
References_xml – ident: cit0038
– ident: cit0119
  doi: 10.1109/MC.2002.1106187
– ident: cit0118
– ident: cit0004
  doi: 10.1080/01495939308402915
– ident: cit0015
– ident: cit0147
– ident: cit0044
– ident: cit0099
  doi: 10.1007/s10676-005-4582-3
– ident: cit0123
  doi: 10.1162/ISEC_a_00267
– ident: cit0067
– ident: cit0084
  doi: 10.1162/ISEC_a_00189
– ident: cit0101
– ident: cit0103
  doi: 10.1016/j.tvjl.2010.05.029
– ident: cit0134
  doi: 10.1080/01402390.2012.730485
– volume-title: Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
  year: 2016
  ident: cit0121
  contributor:
    fullname: Segal Adam
– volume: 7
  start-page: 80
  year: 2001
  ident: cit0009
  publication-title: Information & Security
  contributor:
    fullname: Bendrath Ralf
– volume-title: ‘Armed Attack’ and Article 51 of the UN Charter
  year: 2010
  ident: cit0114
  contributor:
    fullname: Ruys Tom
– ident: cit0073
– ident: cit0029
– ident: cit0142
  doi: 10.1177/0022343313518940
– ident: cit0050
– ident: cit0013
  doi: 10.1080/09636412.2017.1306396
– ident: cit0065
  doi: 10.1080/01402390.2012.739561
– ident: cit0109
  doi: 10.1080/01402390.2011.608939
– ident: cit0058
– ident: cit0130
– ident: cit0083
  doi: 10.1080/09636412.2013.816122
– ident: cit0115
– ident: cit0096
– volume: 53
  start-page: 23
  issue: 1
  year: 2011
  ident: cit0040
  publication-title: Survival: Global Politics and Strategy
  doi: 10.1080/00396338.2011.555586
  contributor:
    fullname: Farwell James P.
– ident: cit0089
  doi: 10.1080/10630732.2011.578411
– ident: cit0035
– ident: cit0150
– ident: cit0041
– volume-title: A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
  year: 2013
  ident: cit0059
  contributor:
    fullname: Healey Jason
– volume: 17
  start-page: 319
  issue: 2
  year: 2006
  ident: cit0146
  publication-title: Stanford Law & Policy Review
  contributor:
    fullname: Wheaton Kristan J.
– ident: cit0003
– volume-title: Fortifying China: The Struggle to Build a Modern Defense Economy
  year: 2009
  ident: cit0020
  contributor:
    fullname: Cheung Tai Ming
– ident: cit0076
– ident: cit0049
– ident: cit0133
– ident: cit0079
  doi: 10.1080/01402390.2012.663252
– ident: cit0093
– ident: cit0055
– ident: cit0091
  doi: 10.1111/j.1540-5842.2009.01103.x
– start-page: 14
  volume-title: Proceedings of the 7th European Conference on Information Warfare and Security
  year: 2008
  ident: cit0034
  contributor:
    fullname: Eneken Tikk
– ident: cit0112
– ident: cit0124
  doi: 10.23919/CYCON.2017.8240326
– ident: cit0122
– volume-title: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
  year: 2014
  ident: cit0149
  contributor:
    fullname: Zetter Kim
– ident: cit0127
  doi: 10.1080/14702436.2018.1508349
– ident: cit0017
– ident: cit0094
  doi: 10.1002/9781119183440
– ident: cit0030
  doi: 10.1177/0967010611431079
– ident: cit0046
– ident: cit0070
  doi: 10.1162/ISEC_a_00138
– ident: cit0048
  doi: 10.1162/isec_a_00337
– ident: cit0052
– ident: cit0085
  doi: 10.1162/ISEC_a_00189
– ident: cit0023
– ident: cit0136
– volume-title: Cyber War
  year: 2010
  ident: cit0021
  contributor:
    fullname: Clarke Richard A.
– ident: cit0117
– ident: cit0031
  doi: 10.3390/fi4030672
– ident: cit0037
– ident: cit0012
– ident: cit0043
– ident: cit0068
– ident: cit0092
  doi: 10.1080/01402390.2012.742013
– volume-title: Cyber Attacks Against Georgia
  year: 2008
  ident: cit0139
  contributor:
    fullname: Tikk Eneken
– volume: 2
  start-page: 53
  volume-title: America’s Cyber Future: Security and Prosperity in the Information Age
  year: 2011
  ident: cit0088
  contributor:
    fullname: Mahnken Thomas G.
– ident: cit0100
– volume-title: Secret Wars: Covert Conflict in International Politics
  year: 2018
  ident: cit0016
  contributor:
    fullname: Carson Austin
– ident: cit0026
– volume-title: Cyberwar and Cyberdeterrence
  year: 2009
  ident: cit0077
  contributor:
    fullname: Libicki Martin
– ident: cit0001
– ident: cit0032
– ident: cit0047
  doi: 10.1162/ISEC_a_00136
– ident: cit0071
  doi: 10.2307/j.ctt1trkjd1
– ident: cit0131
– volume: 63
  start-page: 33
  issue: 4
  year: 2019
  ident: cit0144
  publication-title: Studies in Intelligence
  contributor:
    fullname: Warner Michael
– ident: cit0145
  doi: 10.1017/CBO9780511612183
– ident: cit0063
– volume: 12
  start-page: 90
  issue: 3
  year: 2018
  ident: cit0126
  publication-title: Strategic Studies Quarterly
  contributor:
    fullname: Smeets Max
– ident: cit0129
  publication-title: Cyber Defense Review
  contributor:
    fullname: Smeets Max
– ident: cit0105
– volume-title: Cyber-Security and Threat Politics US Efforts to Secure in the Information Age
  year: 2008
  ident: cit0018
  contributor:
    fullname: Cavelty Myriam Dunn
– ident: cit0120
– ident: cit0002
– ident: cit0106
  doi: 10.1093/acprof:oso/9780190201265.003.0006
– volume-title: Networks and Netwars: The Future of Terror, Crime, and Militancy
  year: 2001
  ident: cit0005
  contributor:
    fullname: Arquilla John
– volume-title: Paper presented at: International Studies Association Annual Convention
  year: 2004
  ident: cit0010
  contributor:
    fullname: Bendrath Ralf
– ident: cit0108
– ident: cit0090
  doi: 10.1017/9781316422724
– ident: cit0025
– volume: 8
  start-page: 325
  issue: 2
  year: 2012
  ident: cit0078
  publication-title: I/S A Journal of Law and Policy for the Information Society
  contributor:
    fullname: Libicki Martin C.
– ident: cit0014
– ident: cit0039
– ident: cit0141
  doi: 10.1080/01436597.2013.802502
– volume-title: Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security
  year: 2003
  ident: cit0148
  contributor:
    fullname: Yould Rachel
– ident: cit0140
– ident: cit0066
– ident: cit0102
– ident: cit0051
– volume: 89
  start-page: 97
  issue: 5
  year: 2010
  ident: cit0086
  publication-title: Foreign Affairs
  contributor:
    fullname: Lynn William J
– volume-title: Playing the Edge: American Intelligence in the Age of Terror
  year: 2016
  ident: cit0057
  contributor:
    fullname: Hayden Michael
– ident: cit0072
– ident: cit0137
– ident: cit0028
– volume-title: Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  year: 2018
  ident: cit0082
  contributor:
    fullname: Lin Herbert
– volume: 4
  start-page: 101
  issue: 3
  year: 2012
  ident: cit0045
  publication-title: Military and Strategic Affairs
  contributor:
    fullname: Gabi Siboni
– ident: cit0097
– ident: cit0138
  doi: 10.1080/13567888.2017.1335101
– ident: cit0042
– ident: cit0036
– ident: cit0061
– volume-title: In Athena’s Camp: Preparing for Conflict in the Information Age
  ident: cit0006
  contributor:
    fullname: Arquilla John
– year: 2011
  ident: cit0062
  publication-title: Small Wars Journal
  contributor:
    fullname: Hollis David M.
– ident: cit0125
  doi: 10.1080/01402390.2017.1288107
– ident: cit0143
  doi: 10.1093/acprof:oso/9780190204792.001.0001
– ident: cit0027
– ident: cit0132
– volume-title: The Dark Visitor: Inside the World of Chinese Hackers
  year: 2007
  ident: cit0060
  contributor:
    fullname: Henderson Scott J.
– ident: cit0056
– volume-title: Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power
  year: 2012
  ident: cit0116
  contributor:
    fullname: Sanger David. E.
– ident: cit0113
– volume-title: Presentation, International Security Program Seminar Series, Cambridge, Mass
  year: 2012
  ident: cit0069
  contributor:
    fullname: Kello Lucas
– year: 2016
  ident: cit0081
  publication-title: Journal of International Affairs
  contributor:
    fullname: Lin Herbert
– ident: cit0098
– ident: cit0128
  doi: 10.23919/CYCON.2018.8405010
– volume-title: Cyber War Will Not Take Place
  year: 2013
  ident: cit0111
  contributor:
    fullname: Rid Thomas
– volume-title: The Military-Technical Revolution: A Preliminary Assessment
  year: 2002
  ident: cit0074
  contributor:
    fullname: Krepinevich Andrew F.
– ident: cit0064
– ident: cit0008
– ident: cit0033
– ident: cit0104
– start-page: 13
  issue: 5
  year: 2010
  ident: cit0087
  publication-title: Foreign Affairs
  contributor:
    fullname: Lynn William J
– ident: cit0024
  doi: 10.1080/18335330.2012.653198
– ident: cit0110
– ident: cit0135
– ident: cit0007
  doi: 10.1017/S0020818305050010
– volume-title: The Absolute Weapon Revisited: Nuclear Arms and the Emerging International Order
  year: 1998
  ident: cit0054
  contributor:
    fullname: Harknett Richard.
– ident: cit0107
  doi: 10.1162/016228803322427965
– ident: cit0022
– ident: cit0053
  doi: 10.4324/9780203630174
– start-page: 134
  ident: cit0080
  publication-title: Journal of Strategic Studies
  contributor:
    fullname: Liff Adam P.
– ident: cit0019
– ident: cit0011
  doi: 10.1080/19445571.2011.636956
– ident: cit0075
  doi: 10.1109/MSP.2011.67
– ident: cit0095
SSID ssj0018853
Score 2.5120208
Snippet While much focus has remained on the concept of cyberwar, what we have been observing in actual cyber behaviour are campaigns comprised of linked cyber...
SourceID proquest
crossref
informaworld
SourceType Aggregation Database
Publisher
StartPage 534
SubjectTerms Campaigns
China
Coercion
cyber campaigns
cyber espionage
cyber operations
Cyberwar
Electronic warfare
Internet
Presumption
Russia
Tactics
Title Cyber campaigns and strategic outcomes
URI https://www.tandfonline.com/doi/abs/10.1080/01402390.2020.1732354
https://www.proquest.com/docview/2692874439
Volume 45
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1NS8MwGA7qLl7ETzadIwfZrdo2bZIeZTjKYDvIBnoK-RQvnazdYf_eJE3FIeLBayGBPM378SRvnheAO8qxdXrGRNiG5yhTEkXc-JtCzUkibQIu3QPn-QKXq2z2knfVhHUoq3Qc2rRCEd5XO-Pmou4q4h4cKUgtV7fsLrWfCEpRnh2CnpMqd00M4tfy6yKB0laI0lUxujHdI57fptkLT3vipT-ctY9A01NwElJH-Nj-6zNwoKtz0J97me3NDo7hgtttA4O1XoDxZCf0Bkonqfj-VtXQLhjWQY1WwvW2scvW9SVYTZ-WkzIKbREiiWjeRJwKrnScU62EzlOsNU8EsmmQMphknJBYFoW0NIQakXKiE6JiFWOlYqKpJUToChxV60r3ARRGJSqRWhKOMmUzLSkSzIlUCCvLPPgA3HdosI9W_YIlnahogI85-FiAbwCK75ixxh87mLZHCEN_jB12ALNgSDVLceEV-lFx_Y-pb8Bx6p4tuNMTMgRHzWarb20y0YiR3y4j0Fs-z8ryE7zuvxo
link.rule.ids 314,780,784,27502,27924,27925,59143,59144,59651,60440
linkProvider Taylor & Francis
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELagHWDhjVoo4AF1S0nixHZGVIFCaTugVupm-RWEkFLUpEP59dh5oBaEGLpG8iNn--4---47AG4px0bpJYmDjXl2AiWRw5PipVBz4knjgEub4Dwa43gaDGbhbC0XxoZVWgydlEQRha62h9teRtchcXcWFfgGrBt455tPBPkoDHZBM4xwaA5nc_IyiOPvtwRKSy5KG8hoW9V5PH91tGGhNvhLf-nrwgg9HgJZT7-MPXnvLXPRk58_mB23-78jcFD5qPC-3FTHYEenJ6A1Kvi8FyvYhWNu9ies1MIp6PZXQi-gtNyNb69pBs3IMKtobyWcL3Mzvs7OwPTxYdKPnar-giMRDXOHU8GVdkOqldChj7XmnkDG31IJJgEnxJVRJA3eoYnwOdEeUa5ysVIu0dQgL3QOGuk81S0ARaI85UktCUeBMi6dFB7mRCqElYE4vA16tczZR0mzwbyavbSSBrPSYJU02iBaXxmWF_cbSVmMhKF_2nbqZWTVic2Yj6OiFACKLrbo-gbsxZPRkA2fxs-XYN-3uRL2yoZ0QCNfLPWV8WBycV1t0S-U-eJ7
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEB50BfHiW3ysmoN469o2bdIeZXVZV3cRUfAW8hQRVtl2D-uvN2lTcRXx4LWQRyeTyXzJzDcAJxkn1ugZExB7PAeJkjjgpnop1JxG0jrg0iU4D0ek_5AMHtMmmrDwYZUOQ5uaKKKy1W5zvynTRMSdOVAQW6xu0V1sP1Ec4zRZhCXiyie3YOn-btDvfz4lZFlNReniGF2rJo3nt47mDqg5-tIf5ro6g3prIJrZ16EnL51pKTry_Rux479-bx1WvYeKzmuV2oAFPd6E3WHF5j2ZoVM04lY7kTcKW3DanQk9QdIxNz4_jQtkB0aFJ72V6HVa2uF1sQ0Pvcv7bj_w1RcCibO0DHgmuNJhmmkldBoTrXkksPW2lCE04ZSGMs-lRTuZETGnOqIqVCFRKqQ6s7gL70Br_DrWu4CEUZGKpJaU40RZh06KiHAqFSbKAhy-B51G5OytJtlgUcNd6qXBnDSYl8Ye5F8XhpXV7YapS5Ew_EfbdrOKzO_XgsUkrwoB4Hz_H10fw_LtRY_dXI2uD2AldokS7r6GtqFVTqb60LovpTjyCvoB2fnhHw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+campaigns+and+strategic+outcomes&rft.jtitle=Journal+of+strategic+studies&rft.au=Harknett%2C+Richard+J.&rft.au=Smeets%2C+Max&rft.date=2022-06-07&rft.issn=0140-2390&rft.eissn=1743-937X&rft.volume=45&rft.issue=4&rft.spage=534&rft.epage=567&rft_id=info:doi/10.1080%2F01402390.2020.1732354&rft.externalDBID=n%2Fa&rft.externalDocID=10_1080_01402390_2020_1732354
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-2390&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-2390&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-2390&client=summon