Cyber spillover conflicts: transitions from cyber conflict to conventional foreign policy disputes?

2016 ◽  
pp. 61-80
Author(s):  
Brandon Valeriano ◽  
Benjamin Jensen ◽  
Ryan C. Maness

This book examines how states integrate cyber capabilities with other instruments of power to achieve foreign policy outcomes. Given North Korea’s use of cyber intrusions to threaten the international community and extort funds for its elites, Chinese espionage and the theft of government records through the Office of Personal Management (OPM) hack, and the Russian hack on the 2016 US election, this book is a timely contribution to debates about power and influence in the 21st century. Its goal is to understand how states apply cyber means to achieve political ends, a topic speculated and imagined, but investigated with very little analytical rigor. Following on Valeriano and Maness’s (2015) book, Cyber War versus Cyber Realities: Cyber Conflict in the International System, this new study explores how states apply cyber strategies, using empirical evidence and key theoretical insights largely missed by the academic and strategy community. It investigates cyber strategies in their integrated and isolated contexts, demonstrating that they are useful to managing escalation and sending ambiguous signals, but generally they fail to achieve coercive effect.


Itinerario ◽  
2000 ◽  
Vol 24 (2) ◽  
pp. 62-79
Author(s):  
W.J. Boot

In the pre-modern period, Japanese identity was articulated in contrast with China. It was, however, articulated in reference to criteria that were commonly accepted in the whole East-Asian cultural sphere; criteria, therefore, that were Chinese in origin.One of the fields in which Japan's conception of a Japanese identity was enacted was that of foreign relations, i.e. of Japan's relations with China, the various kingdoms in Korea, and from the second half of the sixteenth century onwards, with the Portuguese, Spaniards, Dutchmen, and the Kingdom of the Ryūkū.


2019 ◽  
Author(s):  
Nikolas K. Gvosdev ◽  
Jessica D. Blankshain ◽  
David A. Cooper

Sign in / Sign up

Export Citation Format

Share Document