Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks

Article
  • 83 Downloads

Abstract

This article aims to assess the explanatory power of psychological perspectives for understanding political decision-making during cyber-attacks. After introductory remarks about social cognition and IR research, it is deductively argued that cyberspace should be prone to cognitive biases because of several issue area characteristics. The case studies that follow serve as rudimentary plausibility tests of this claim. The first focusses on threat perception and crisis decision-making in Estonia in 2007. It is argued that an inherent bad faith image of their Russian neighbour and a search for consistency led Estonian decision-makers to believe in a state-led cyber-attack despite a great deal of ambivalent evidence. Several smaller case studies show further evidence of misperceptions during a range of other cyber-attacks primarily against targets in the United States. Altogether these case studies demonstrate that cognitive approaches are promising tools for analysing cyber-related decision-making and for inferring policy recommendations. At the same time, there are serious methodological challenges that future studies need to address.

Keywords

cognitive approaches cyber-attacks cyberspace misperception psychological IR theories 

Notes

Acknowledgments

Some of the empirical material in this article has come out of my PhD research at the University of Cologne. An earlier version of the paper has been presented at the 2015 Annual Conference of the British International Studies Association (BISA) in London. The author wishes to thank all panellists as well as two anonymous reviewers for many helpful comments and suggestions that enabled him to clarify and improve his argument.

References

  1. Associated Press (2009) ‘Officials Say North Korea Believed behind Cyber Attacks on SKorean, US Web Sites. from http://www.trurodaily.com/Living/World/2009-07-08/article-353120/Officials-say-North-Korea-believed-behind-cyber-attacks-on-SKorean,-US-Web-sites/1, accessed 17 October, 2013.
  2. Axelrod, Robert and Rumen Iliev (2014) ‘Timing of Cyber Conflict’, Proceedings of the National Academy of Sciences 111(4): 1298–303.CrossRefGoogle Scholar
  3. Axelrod, Robert and Robert O. Keohane (1993) ‘Achieving Cooperation Under Anarchy: Strategies and Institutions’, in David A. Baldwin, ed, Neorealism and Neoliberalism: The Contemporary Debate, 85–115, New York: Columbia University Press.Google Scholar
  4. Betz, David J. and Tim Stevens (2013) ‘Analogical Reasoning and Cyber Security,’ Security Dialogue 44(2): 147–64.CrossRefGoogle Scholar
  5. Boin, Arjen, Paul t’Hart, and Allan McConnell (2009) ‘Crisis Exploitation: Political and Policy Impacts of Framing Contests’, Journal of European Public Policy 16(1): 81–106.CrossRefGoogle Scholar
  6. Bovens, Mark and Paul t’Hart, eds. (1996) Understanding Policy Fiascos, New Brunswick: Transaction Publishers.Google Scholar
  7. Brake, Benjamin (2015) Strategic Risks of Ambiguity in Cyberspace. New York: Council on Foreign Relations, from http://www.file:///C:/Users/Cordula/Downloads/CPA_ContingencyPlanningMemo_24.pdf, accessed 1 September 2015.
  8. Brändström, Anneke and Sanneke Kuipers (2003) ‘From “Normal Incidents” to Political Crises: Understanding the Selective Politicization of Political Failures’, Government and Opposition 38(3): 279–305.CrossRefGoogle Scholar
  9. Carr, Jeffrey (2010) Inside Cyber Warfare, Sebastopol, CA: O’Reilly.Google Scholar
  10. Checkel, Jeffrey T. (1998) ‘The Constructive Turn in International Relations Theory’, World Politics 60(2): 324–48.CrossRefGoogle Scholar
  11. CICIR and CSIS (2012) Bilateral Discussions on Cooperation in Cybersecurity, from http://csis.org/files/attachments/120615_JointStatement_CICIR.pdf, accessed 15 June, 2015.
  12. Clarke, Richard A. and Robert K. Knake (2010) Cyberwar: The Next Threat to National Security and What to Do about it, New York: Harper/Collins.Google Scholar
  13. CNN (2007) ‘Estonia Suspects Kremlin in Web Attacks’, 17 May, from http://www.industrialdefender.com/general_downloads/incidents/2007.05.17_estonia_suspects_kremlin_in_web_attacks.pdf, 17 October, 2013.
  14. Cottam, Martha L. et al. (2010) Introduction to Political Psychology, second edition, New York and Hove: Psychology Press.Google Scholar
  15. Crisp, Richard J. and Rhiannon N. Turner (2010) Essential Social Psychology, second edition, London: Sage.Google Scholar
  16. Davis, Joshua (2007) ‘Hackers Take down the Most Wired Country in Europe’, Wired, 21 August, from http://www.wired.com/politics/security/magazine/15-09/ff_estonia, accessed 17 October, 2013.
  17. Denning, Dorothy E. (1999) Information Warfare and Security, Reading, MA et al.: Addison-Wesley.Google Scholar
  18. Dolman, Everett C. (2002) Astropolitik: Classical Geopolitics in the Space Age, London: Frank Cass.Google Scholar
  19. Douhet, Giulio (1942/1998) The Command of the Air, translated by Dino Ferrari, Tuscaloosa: University of Alabama Press.Google Scholar
  20. Economist (2008) ‘Marching off to Cyberwar,’ 4 December, from http://www.economist.com/node/12673385, accessed 18 July, 2013).
  21. Elliott, David (2009) ‘Weighing the Case for a Convention to Limit Cyberwarfare’, Arms Control Today, 5 November, from https://www.armscontrol.org/act/2009_11/Elliott, accessed 30 August, 2016.
  22. Evron, Gadi (2009) ‘Authoratively, Who Was Behind the Estonian Attacks?’, 17 March, from http://www.darkreading.com/blog/227700882/authoritatively-who-was-behind-the-estonian-attacks.html, accessed 17 October, 2013.
  23. Eun, Yong-Soo and Judith Sita Aßmann (2014) ‘Cyberwar: Taking Stock of Security and Warfare in the Digital Age’, International Studies Perspective, doi: 10.1111/insp.12073.Google Scholar
  24. Farnham, Barbara, ed. (1994) Avoiding Losses/Taking Risks: Prospect Theory and International Conflict, Ann Arbor: University of Michigan Press.Google Scholar
  25. Farwell, James P. and Rafal Rohozinski (2011) ‘Stuxnet and the Future of Cyberwar’, Survival 53(1): 23–40.CrossRefGoogle Scholar
  26. Feakin, Tobias and Jessica Woodall (2014) ‘Cyber Confidence Building in the Asia-Pacific: Three Big Take-Aways from the ARF’, in Strategist, from http://www.aspistrategist.org.au/cyber-confidence-building-in-the-asia-pacific-three-big-take-aways-from-the-arf/, accessed 15 June, 2015.
  27. Financial Times (2007) ‘US Warns Cyber-Attacks will Increase’, 17 May, from http://www.ft.com/cms/s/0/324fa472-049e-11dc-80ed-000b5df10621.html#axzz1Nej08Dbs, accessed 4 September, 2015.
  28. Finn, Peter (2007) ‘Cyber Assaults on Estonia Typify a New Battle Tactic’, Washington Post (19 May): A01.Google Scholar
  29. Finnemore, Martha (2011) ‘Cultivating International Cyber Norms’, in Kristin M. Lord and Travis Sharp, eds, America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, 89–100, Washington: Center for a New American Security.Google Scholar
  30. Fiske, Susan T. and Shelley E. Taylor (2010) Social Cognition: From Brains to Culture, Boston: McGraw Hill.Google Scholar
  31. Fox News (2009) ‘Pentagon Official: North Korea behind Week of Cyber Attacks’, 9 July, from http://www.foxnews.com/story/0,2933,530781,00.html, accessed 17 October, 2013.
  32. Gartzke, Erik (2013) ‘The Myth of Cyberwar: Bringing War in Cyberspace Back down to Earth’, International Security 38(2): 41–73.CrossRefGoogle Scholar
  33. Gaycken, Sandro (2011) Cyberwar: Das Internet als Kriegsschauplatz, Munich: Open Source Press.Google Scholar
  34. Gorman, Siobhan (2009) ‘Electricity Grid in U.S. Penetrated by Spies’, Wall Street Journal, 8 April, available at http://online.wsj.com/article/SB123914805204099085.html, accessed 17 October, 2013.
  35. Gray, Colin S., ed. (1999) Geopolitics, Geography and Strategy, London: Frank Cass.Google Scholar
  36. Gross-Stein, Janice (2002) ‘Psychological Explanations of International Conflict’, in Walter Carlsnaes, Thomas Risse and Beth A. Simmons, eds, Handbook of International Relations, 292–308, London: Sage Publications.Google Scholar
  37. Gross-Stein, Janice and David A. Welch (1997) ‘Rational and Psychological Approaches to the Study of International Conflict: Comparative Strenghts and Weaknesses’, in Nehemia Geva and Alex Mintz, eds, Decision-making on War and Peace: The Cognitive-Rational Debate, 51–77, Boulder: Lynne Rienner.Google Scholar
  38. Guadagno, Rosanna E., Robert B. Cialdini and Gadi Evron (2010) ‘Storming the Servers: A Social Psychological Analysis of the First Internet War’, Cyberpsychology, Behavior, and Social Networking 13(4): 447–53.CrossRefGoogle Scholar
  39. Haas, Peter M. (1992) ‘Introduction: Epistemic Communities and International Policy Coordination’, International Organization 46(1): 1–35.CrossRefGoogle Scholar
  40. Halpin, Tony (2007) ‘Estonia Accuses Russia of “Waging Cyber War”’, Times Online, 17 May, from http://www.timesonline.co.uk/tol/news/world/europe/article1802959.ece, accessed 27 May, 2011.
  41. He, Kai and Huiyun Feng (2012) Prospect Theory and Foreign Policy Analysis in the Asia Pacific: Rational Leaders and Risky Behavior, New York: Routledge.Google Scholar
  42. Heise Media (2007) ‘Estonian DDoS — A Final Analysis’, 31 May, from http://www.h-online.com/security/news/item/Estonian-DDoS-a-final-analysis-732971.html?view=print, accessed 17 October, 2013.
  43. Hoffman, Frank G. (2009) ‘Hybrid Warfare and Challenges’, Small Arms Journal 52(1): 34–39.Google Scholar
  44. Hughes, Rex (2010) ‘A Treaty for Cyberspace’, International Affairs 86(2): 523–41.CrossRefGoogle Scholar
  45. Hyde, Susan D. (2015) ‘Experiments in International Relations: Lab, Survey, and Field’, Annual review of Political Science 18: 403–23.CrossRefGoogle Scholar
  46. Jervis, Robert (1976) Perception and Misperception in International Politics, Princeton: Princeton University Press.Google Scholar
  47. Jervis, Robert (1986) ‘Cognition and Political Behavior’, in Richard R. Lau and David O. Sears, eds, Political Cognition, 319–37, Hillsdale, NJ: Lawrence Erlbaum Associates.Google Scholar
  48. Jervis, Robert (1988) ‘War and Misperception’, Journal of Interdisciplinary History 18(4): 675.CrossRefGoogle Scholar
  49. Johnson, David E. (2010) Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza, Santa Monica, CA: Rand, available at http://www.rand.org/content/dam/rand/pubs/occasional_papers/2010/RAND_OP285.pdf, accessed 3 September, 2015.
  50. Jones, Edward E. and Richard E. Nisbett (1972) ‘The Actor and the Observer: Divergent Perceptions of the Causes of Behavior’, in Edward E. Jones et al., eds, Attribution: Perceiving the Causes of Behavior, 79–94, Morristown, NJ: General Learning Press.Google Scholar
  51. Junio, Timothy J. (2013) ‘How Probable is Cyber War? Bringing IR Theory Back into the Cyber Conflict Debate’, Journal of Strategic Studies 36(1): 125–33.CrossRefGoogle Scholar
  52. Jæger, Øyvind (2000) ‘Securitizing Russia: Discursive Practices of the Baltic States’, Peace and Conflict Studies 7(2), from http://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1009&context=pcs, accessed 3 August, 2015.
  53. Kahnemann, Daniel and Amos Tversky (1972) ‘Subjective Probability: A Judgement of Representativeness’, Cognitive Psychology 3: 430–54.CrossRefGoogle Scholar
  54. Kello, Lucas (2013) ‘The Meaning of the Cyber Revolution: Perils to Theory and Statecraft’, International Security 38(2): 7–40.CrossRefGoogle Scholar
  55. Khong, Yuen F. (1992) Analogies at War: Korea, Munich, Dien Bien Phu, and the Vietnam Decisions of 1965, Princeton: Princeton University Press.Google Scholar
  56. King, Gary, Robert O. Keohane and Sidney Verba (1994) Designing Social Inquiry: Scientific Inference in Qualitative Research, Princeton: Princeton University Press.Google Scholar
  57. Klein, John J. (2004) ‘Corbett in Orbit: A Maritime Model for Strategic Space Theory’, Naval War College Review 57(1): 59–74.Google Scholar
  58. Klimburg, Alexander (2011) ‘Mobilising Cyber Power’, Survival 53(1): 41–60.CrossRefGoogle Scholar
  59. Klimburg, Alexander (2014) ‘Roots Unknown: Cyberconflict Past, Present & Future’, Sicherheit + Frieden/Security + Peace 32(1): 1–8.Google Scholar
  60. Kopan, Tal (2014) ‘U.S.: No Alternate Leads in Sony Hack’, Politico, from http://www.politico.com/story/2014/12/fbi-briefed-on-alternate-sony-hack-theory-113866, accessed 2 September, 2015.
  61. Kramer, Franklin D., Stuart H. Starr and Larry K. Wentz, eds (2009) Cyberpower and National Security, Washington: National Defense University Press.Google Scholar
  62. Krebs, Brian (2010) ‘Cable: No Cyber Attack in Brazilian “09 Blackout”’, 3 December, from http://krebsonsecurity.com/2010/12/cable-no-cyber-attack-in-brazilian-09-blackout/, accessed 17 October, 2013.
  63. Kydd, Andrew H. (2008) ‘Methodological Individualism and Rational Choice’, in Christian Reus-Smit and Duncan Snidal, eds, The Oxford Handbook of International Relations, 425–43, Oxford: Oxford University Press.Google Scholar
  64. Lawson, Sean (2011) Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History, Fairfax, VA: George Mason University, from http://mercatus.org/sites/default/files/publication/beyond-cyber-doom-cyber-attack-scenarios-evidence-history_1.pdf, accessed 16 June, 2011.
  65. Levy, Jack S. (2003) ‘Political Psychology and Foreign Policy’, in David O. Sears, Leonie Huddy and Robert Jervis, eds, Oxford Handbook of Political Psychology, 253–84, Oxford: Oxford University Press.Google Scholar
  66. Lewis, James (2005) Computer Espionage, Titan Rain and China, Washington: Center for Strategic and International Studies, from http://csis.org/files/media/csis/pubs/051214_china_titan_rain.pdf, accessed 17 October, 2013.
  67. Libicki, Martin C. (2007) Conquest in Cyberspace: National Security and Information Warfare, Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  68. Libicki, Martin C. (2009) Cyberdeterrence and Cyberwar, Santa Monica: RAND.Google Scholar
  69. Lonsdale, David (1999) ‘Information Power: Strategy, Geopolitics and the Fifth Dimension’, in Colin S. Gray, ed, Geopolitics, Geography and Strategy, 137–57, London: Frank Cass.Google Scholar
  70. Lonsdale, David J. (2004) The Nature of War in the Information Age, London: Frank Cass.Google Scholar
  71. Lindsay, Jon R. (2013) ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22(3): 365–404.CrossRefGoogle Scholar
  72. Mahan, Alfred T. (1890) The Influence of Sea Power upon History 16601783, Boston: Little, Brown and Company.Google Scholar
  73. Mannes, Aaron and James Hendler (2008) ‘The First Modern Cyberwar,’ Guardian, 22 August, from http://www.guardian.co.uk/commentisfree/2008/aug/22/russia.georgia1, accessed 17 November, 2010.
  74. March, James G. and Johan P. Olsen (2006) ‘The Logic of Appropriateness’, in Michael Moran, Martin Rein and Robert E. Goodin, eds, The Oxford Handbook of Public Policy, 689–708, Oxford: Oxford University Press.Google Scholar
  75. Marfleet, B. Gregory (2000) ‘The Operational Code of John F. Kennedy During the Cuban Missile Crisis: A Comparison of Public and Private Rhetoric’, Political Psychology 21(3): 545–58.CrossRefGoogle Scholar
  76. Markoff, John and David Barboza (2009) ‘Academic Paper in China Sets off Alarms in U.S.’, New York Times, 20 March, from http://www.nytimes.com/2010/03/21/world/asia/21grid.html accessed 17 October, 2013.
  77. McDermott, Rose (1998) Risk-Taking in International Politics: Prospect Theory in American Foreign Policy, Ann Arbor: University of Michigan Press.Google Scholar
  78. Mintz, Alex, Yi Yang and Rose McDermott (2011) ‘Experimental Approaches to International Relations’, International Studies Quarterly 55(2): 493–501.CrossRefGoogle Scholar
  79. Mite, Valentinas (2007) ‘Attacks Seen as First Case of “Cyberwar”’, Radio Free Europe/Radio Liberty, 30 May, from http://www.rferl.org/content/article/1076805.html, accessed 1 September, 2015.
  80. Mitzen, Jennifer and Randall L. Schweller (2011) ‘Knowing the Unknown Unknowns: Misplaced Certainty and the Onset of War’, Security Studies 20(1): 2–35.CrossRefGoogle Scholar
  81. Moran, Daniel (2007) ‘Geography and Strategy’, in John Baylis et al., eds, Strategy in the Contemporary World: An Introduction to Strategic Studies, 122–40, Oxford: Oxford University Press.Google Scholar
  82. Moravcsik, Andrew (1997) ‘Taking Preferences Seriously: A Liberal Theory of International Politics’, International Organization 51(4): 513–53.CrossRefGoogle Scholar
  83. Nelson, Bill et al. (1999) Cyberterror: Prospects and Implications, Monterey, CA: Center for the Study of Terrorism and Irregular Warfare.Google Scholar
  84. Neuneck, Götz (2010) ‘Towards TCBMS in the Cybersphere’, in UNIDIR, ed, The Cyber Index: International Security Trends and Realities, New York and Geneva.Google Scholar
  85. Neustadt, Richard E. and Ernest R. May (1986) Thinking in Time: The Uses of History for Decision Makers, New York: Free Press.Google Scholar
  86. Nye, Joseph S. (2011) ‘Power and National Security in Cyberspace’, in Kristin M. Lord and Travis Sharp, eds, America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, 7–23, Washington: Center for a New American Security.Google Scholar
  87. Oberg, James (1999) Space Power Theory, Colorado Springs: US Air Force Academy.Google Scholar
  88. OSCE (2013) Initial Set of OECD Confidence-Building Measures to Reduce the Risk of Conflict Stemming from the Use of Information and Communication Technologies, Decision No. 1106, PC.DEC/1106, 3 December.Google Scholar
  89. Owens, William A., Kenneth W. Dam and Herbert S. Lin (2009) Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Washington: National Academies Press.Google Scholar
  90. Pau, Aivar (2007) ‘Statement by the Foreign Minister Urmas Paet’, Eesti Päevaleht, 1 May, from http://www.epl.ee/artikkel/384207, accessed 17 October, 2013.
  91. Qingling, Dong (2014) Confidence Building for Cybersecurity between China and the United States, China Institute of International Studies, 23 September, from http://www.ciis.org.cn/english/2014-09/23/content_7254470.htm, accessed 15 June, 2015.
  92. Rathmell, Andrew (2001) ‘Controlling Computer Network Operations’, Information and Security 7(1): 121–44.Google Scholar
  93. Rauscher, Karl Frederick and Valery Yaschenko (2011) Russia-U.S. Bilateral on Cybersecurity: Critical Terminology Foundations, New York and Moscow: East West Institute/Information Security Institute.Google Scholar
  94. Renshon, Jonathan (2009) ‘When Public Statements Reveal Private Beliefs: Assessing Operational Codes at a Distance’, Political Psychology 30(4): 649–61.CrossRefGoogle Scholar
  95. Rid, Thomas (2012) ‘Think Again: Cyberwar’, Foreign Policy, 27 February, from http://foreignpolicy.com/2012/02/27/think-again-cyberwar/, accessed on 30 January, 2016.
  96. Rid, Thomas (2013) Cyber War Will Not Take Place, London: Hurst & Company.Google Scholar
  97. Russell, Alison L. (2014) Cyber Blockades, Washington: Georgetown University Press.Google Scholar
  98. Ruus, Kertu (2008) ‘Cyber War I: Estonia Attacked from Russia’, European Affairs 9(1–2): from http://www.europeaninstitute.org/index.php/component/content/article?id=67:cyber-war-i-estonia-attacked-from-russia, accessed 3 September, 2015.
  99. Sanger, David E. (2015) ‘U.S. and China Seek Arms Deal for Cyberspace’, New York Times, 19 September, from http://www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html, accessed 31 January, 2016.
  100. Shachtman, Noah (2009) ‘Top Georgian Offical: Moscow Cyber Attacked Us – We Just Can’t Prove it,’ Wired, 11 March, from http://www.wired.com/dangerroom/2009/03/georgia-blames/, accessed 31 May, 2011.
  101. Smith, David J. (1998) ‘Russia, Estonia and the Search for a Stable Ethno-Politics’, Journal of Baltic Studies 29(1): 3–18.CrossRefGoogle Scholar
  102. Simon, Herbert A. (1985) ‘Human Nature in Politics: The Dialogue of Psychology with Political Science’, American Political Science Review 79(2): 293–304.CrossRefGoogle Scholar
  103. Stauffacher, Daniel and Camino Kavanagh (2013) Confidence Building Measures and International Cyber Security, Geneva: ICT4Peace Foundation, from http://ict4peace.org/wp-content/uploads/2015/04/processbrief_2013_cbm_wt-71.pdf, accessed 15 June, 2015.
  104. Swayne, Jon (2008) ‘Georgia: “Russia Conducting Cyberwar”’, Telegraph, 11 August, from http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.html, from 31 May, 2011.
  105. Tetlock, Philip E. (1998) ‘Social Psychology and World Politics’, in Daniel T.Gilbert, Susan Fiske and Gardner Lindzey, eds, The Handbook of Social Psychology, Vol. II, 868–912, Boston: McGraw-Hill.Google Scholar
  106. Tetlock, Philip E. and Charles McGuire (1986) ‘Cognitive Perspectives on Foreign Policy’, in Samuel Long, ed, Political Behavior Annual, Volume I, 147–79, London: Westview Press.Google Scholar
  107. Traynor, Ian (2007) ‘Russia Accused of Unleashing Cyberwar to Disable Estonia’, Guardian, 17 May, from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia, accessed 17 October, 2013.
  108. Tversky, Amos and Daniel Kahnemann (1974) ‘Judgement under Uncertainty: Heuristics and Biases’, Science 185: 1124–31.CrossRefGoogle Scholar
  109. United Nations General Assembly (2011) International Code of Conduct for Information Security, A/66/359, 12 September.Google Scholar
  110. United Nations General Assembly (2013) Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, A/68/69, 24 June, from http://www.mofa.go.jp/files/000016407.pdf, accessed 30 January, 2016.
  111. US Embassy Tallinn (2007a) Estonia’s Cyber Attacks: World’s First Virtual Attack against Nation State, 4 June, published by WikiLeaks, from http://WikiLeaks.ch/cable/2007/06/07TALLINN366.html, accessed 28 May, 2011.
  112. US Embassy Tallinn (2007b) Estonia: GOE Officials on the Bronze Solider, Russia and Integration, 11 May, published by WikiLeaks, from http://aebr.home.xs4all.nl/wl/tallinn/07Talinn/07TALLINN310.html, accessed 28 May, 2011.
  113. US Embassy Tallinn (2007c) Russian Bear Hug Squeezes Estonian Economy, 24 May, published by WikiLeaks, from http://77aebr.home.xs4all.nl/wl/tallinn/07TALLINN347.html, accessed 28 May, 2011.
  114. Verhulst, Brad and Mary-Kate Lizotte (2011) ‘The Influence of Affective States on the Depth of Information Processing’, in Marcos Engelken-Jorge et al., eds., Politics and EmotionsThe Obama Phenomenon, 73–94, Wiesbaden: VS.Google Scholar
  115. Vertzberger, Yaacov Y. I. (1990) The World in their Minds: Information Processing, Cognition, and Perception in Foreign Policy Decision Making, Stanford: Stanford University Press.Google Scholar
  116. Vijayan, Jaikumar (2007) ‘Black Hat: Estonia Attacks an Example of Online Rioting, Says Researcher’, Computerworld, 2 August, from http://www.computerworld.com/article/2542850/security0/black-hat–estonia-attacks-an-example-of-online-rioting–says-researcher.html, accessed 3 September, 2015.
  117. Voss, James F. and Ellen Dorsey (1992) ‘Perception and International Relations: An Overview’, in Eric Singer and Valerie M. Hudson, eds, Political Psychology and Foreign Policy, 3–30, Boulder, CO: Westview Press.Google Scholar
  118. Walker, George K. (2000) ‘Information Warfare and Neutrality’, Vanderbilt Journal of Transnational Law 33(5): 1079–200.Google Scholar
  119. Wang, Jian-Wei and Li-Li Rong (2009) ‘Cascade-based Attack Vulnerability on the US Power Grid’, Safety Science 47(10): 1332–36.CrossRefGoogle Scholar
  120. Waterman, Shaun (2009) ‘July 4 Cyberattack Called “very minor”’, Washington Times, 16 July, from http://www.washingtontimes.com/news/2009/jul/16/july-4-cyberattack-called-very-minor/, accessed 17 October, 2013.
  121. Waterman, Shaun (2008) ‘Analysis: Russia-Georgia Cyberwar Doubted,’ Spacewar.com, from http://www.spacewar.com/reports/Analysis_Russia-Georgia_cyberwar_doubted_999.html, accessed 31 May, 2011.
  122. Welch-Larson, Deborah (1988) ‘The Psychology of Reciprocity in international Relations’, Negotiation Journal 4(3): 281–301.CrossRefGoogle Scholar
  123. Wendt, Alexander (1999) Social Theory of International Politics, Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  124. White House (2011) Joint Statement by Cybersecurity Coordinator Schmidt and Deputy Secretary Klimashin, Washington, from http://www.whitehouse.gov/sites/default/files/uploads/2011_klimashin_schmidt_cyber_joint_statement.pdf, accessed 17 October, 2013.
  125. Wingfield, Thomas C. (2009) ‘International Law and Information Operations’, in Franklin D. Kramer, Stuart H.Starr and Larry K. Wentz, eds, Cyberpower and National Security, 525–42, Washington: National Defense University Press.Google Scholar
  126. Wortzel, Larry M. (2010) China’s Approach to Cyber Operations, Testimony before the Committee on Foreign Affairs, 10 March, Washington, from http://www.internationalrelations.house.gov/111/wor031010.pdf, accessed 10 August, 2011.
  127. Zetter, Kim (2009a) ‘Lawmaker Wants “Show of Force” against North Korea for Website Attacks’, Wired, 10 July, from http://www.wired.com/threatlevel/2009/07/show-of-force/, accessed 17 October, 2013.
  128. Zetter, Kim (2009b) ‘Lazy Hacker and Little Worm Set Off Cyberwar Fenzy’, Wired, 8 July, from http://www.wired.com/threatlevel/2009/07/mydoom/, accessed 17 October, 2013.
  129. Zetter, Kim (2011) ‘Exclusive: Comedy of Errors Led to False “Water-Pump Hack” Report,’ Wired, 30 November, frfom http://www.wired.com/threatlevel/2011/11/water-pump-hack-mystery-solved/, accessed 17 October, 2013.

Copyright information

© Macmillan Publishers Ltd 2016

Authors and Affiliations

  1. 1.Institute for Political ScienceJustus Liebig University GiessenGiessenGermany

Personalised recommendations