Query Result Set
Skip Navigation Links
   ActiveUsers:1854Hits:19217155Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
WHYTE, CHRISTOPHER (9) answer(s).
 
SrlItem
1
ID:   173364


Beyond tit-for-tat in cyberspace: Political warfare and lateral sources of escalation online / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract At present, most scholarship on the potential for escalation in cyberspace couches analysis in terms of the technological dynamics of the domain for relative power maneuvering. The result has been a conceptualisation of the logic of operation in cyberspace as one of ‘tit-for-tat’ exchanges motivated by attribution problems and limited opportunity for strategic gain. This article argues that this dominant perspective overlooks alternative notions of how cyber tools are used to influence. This, in turn, has largely led scholars to ignore second-order effects – meaning follow-on effects triggered by a more direct outcome of an initial cyber action – on domestic conditions, institutions, and individual stakeholders. This article uses the case of cyber-enabled political warfare targeting the United States in 2016 to show how escalation can occur as a second-order effect of cyber operations. Specifically, the episode led to a re-evaluation of foreign cyber strategy on the part of American defence thinkers that motivated an offensive shift in doctrine by 2018. The episode also directly affected both the political positions taken by important domestic actors and the attitude of parts of the electorate towards interference, both of which have reinforced the commitment of military planners towards assertive cyber actions.
Key Words Escalation  Political Warfare  Cyber 
        Export Export
2
ID:   167441


Can We Change the Topic, Please? Assessing the Theoretical Construction of International Relations Scholarship / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract A number of international relations scholars charge that the field suffers from academic religiosity: factional divisions along theoretical lines that limit research potential and create unnecessary bias against certain approaches. I explore this view of the field by applying a topic-modeling algorithm to a corpus of article abstracts from prominent journals in international relations. I generate a new dataset of information on international relations scholarship over more than two-and-a-half decades. I find evidence in support of claims that academic factionalism can negatively affect the research process. Paradigmatic foundations, though not present in most international relations studies, are closely linked to a large number of research topics and are associated with higher citation counts. At the same time, such works appear to be less likely than others to be “pathbreaking.” My analysis also supports a narrative common in recent scholarship that citation counts, though somewhat effective in their measurement of scholarly impact, are sensitive to organizational features of the academic process.
        Export Export
3
ID:   191518


Cryptoterrorism: Assessing the Utility of Blockchain Technologies for Terrorist Enterprise / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Much recent policy discourse has pivoted on the relationship between terrorist campaigns and an emergent feature of the global financial landscape in the form of cryptocurrencies. Cryptocurrencies are a subset of digital currencies that are distributed by the developers thereof. The various unique features of cryptocurrencies have led to discussion in punditry about how terrorists could benefit from this new mode of financial transaction but few policy-oriented works and scholarly assessments exist to outline and assess this claim. This article describes cryptocurrencies, and assesses them in line with the operational realities of terrorist campaigns. I argue that, while there is limited evidence that terrorists are likely to disproportionately benefit from use of cryptocurrencies at present, there do exist unique opportunities for money laundering and revenue generation.
        Export Export
4
ID:   193521


Cyberspace is what states make of it: the social construction (and deconstruction) of strategic concepts / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Why do some strategic concepts come to dominate over alternative, often-entrenched views of warfighting? And what determines the staying power and proneness to change over time of the prevailing vision? Focusing on cyberspace, I describe the Internet as an artifact interpreted differently by competing interest groups. I show that reconciliation of these interpretations comes from individuals with the position and motivation to make technology work for a specific vision of use and spread that vision to other parts of the organization. By tracing the role of such key network nodes in the evolution of strategic concepts, I show that information technologies themselves act to break down barriers to engagement between social sub-elements of complex organization, making the whole susceptible to narrow parochial change. Moreover, I illustrate how the cyberspace concept is both impermanent and an attempt at problem redefinition leading to an ill-fitting lens, rather than simply a rhetorical-institutional reorientation.
        Export Export
5
ID:   148085


Developed states’ vulnerability to economic disruption online / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Much of the literature on cyberspace and national security has backed away from the idea that cyberwar presents an imminent threat in world politics. However, there remains great concern about the potential for broad-scoped economic disruption prosecuted through digital means. How vulnerable are developed states to cyber economic warfare? Could either a concentrated cyber economic warfare initiative or a scalable disruption effect prove crippling on a large scale? And, most importantly, what are the implications for state policy and international interactions? This article contends that large, advanced industrial states are only superficially more vulnerable to disruption than are other types of systems.
        Export Export
6
ID:   161745


Dissecting the Digital World: a Review of the Construction and Constitution of Cyber Conflict Research / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Though focused on realizing markedly different analytic outcomes, each of the four books under review here approaches the task of balancing the technological ramifications of advancing digital developments against the implications of relevant sociopolitical context with a reasonable degree of success. Taken together, the books present several significant messages not only about prospects for cyber conflict but also about the aims and imperatives of the burgeoning cyberpolitics research program. In particular, these volumes do a great deal to move the discussion on cyberspace and interstate conflict beyond the bounds of traditional IR theories by demonstrating that the use of assumptions about the predigital world can constrain analytic attempts to understand the parameters of political phenomena in the digital age. Applied too strictly, some assumptions can lead to biased conclusions and overstated predictions, which in turn can have serious policy consequences. Moving forward, IR scholars face the serious task of reevaluating basic conceptual precepts and adapting them to produce new and useful models for understanding conflict, violence, and more.
Key Words Review Essay 
        Export Export
7
ID:   150089


Ending cyber coercion: computer network attack, exploitation and the case of North Korea / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The use of coercive instruments of statecraft and military power to affect changes in strategic behavior is a common feature of international politics. Recently, a variety of state and sub-state actors have attempted to utilize cyber instruments of disruption and intrusion to bring about favorable outcomes. This article notes that digital instruments for coercion offer limited potential for effective compellent effect in world affairs. Nevertheless, as the case of North Korea's 2015 hack and (attempted) manipulation of Sony demonstrates, coercion using cyber weapons of intrusion and disruption is possible under particular conditions. In describing these conditions, I argue that the limits of cyber coercion should be seen more as a function of relevant social and institutional context than of the current state of technological possibilities. Technology certainly determines parameters of coercive interaction between actors, but success—and thus most determinants of strategic decisions surrounding cyber coercion—derives directly from sociopolitical context.
        Export Export
8
ID:   189937


Learning to trust Skynet: Interfacing with artificial intelligence in cyberspace / Whyte, Christopher   Journal Article
Whyte, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The use of AI to automate defense and intelligence tasks is increasing. And yet, little is known about how algorithmic analyses, data capture, and decisions will be perceived by elite decision-makers. This article presents the results of two experiments that explore manifestations of AI systems in the cyber conflict decision-making loop. Though findings suggest that technical expertise positively impacts respondents’ ability to gauge the potential utility and credibility of an input (indicating that training can, in fact, overcome bias), the perception of human agency in the loop even in the presence of AI inputs mitigates this effect and makes decision-makers more willing to operate on less information. This finding is worrying given the extensive challenges involved in effectively building human oversight and opportunity for intervention into any effective employment of AI for national security purposes. The article considers these obstacles and potential solutions in the context of data gathered.
        Export Export
9
ID:   166279


Understanding cyber warfare: politics, policy and strategy / Whyte, Christopher; Mazanec, Brian 2019  Book
Whyte, Christopher Book
0 Rating(s) & 0 Review(s)
Publication Oxon, Routledge, 2019.
Description x, 296p.: ill.pbk
Standard Number 9781138640627
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059644355.4/WHY 059644MainOn ShelfGeneral