Abstract
This article aims to assess the explanatory power of psychological perspectives for understanding political decision-making during cyber-attacks. After introductory remarks about social cognition and IR research, it is deductively argued that cyberspace should be prone to cognitive biases because of several issue area characteristics. The case studies that follow serve as rudimentary plausibility tests of this claim. The first focusses on threat perception and crisis decision-making in Estonia in 2007. It is argued that an inherent bad faith image of their Russian neighbour and a search for consistency led Estonian decision-makers to believe in a state-led cyber-attack despite a great deal of ambivalent evidence. Several smaller case studies show further evidence of misperceptions during a range of other cyber-attacks primarily against targets in the United States. Altogether these case studies demonstrate that cognitive approaches are promising tools for analysing cyber-related decision-making and for inferring policy recommendations. At the same time, there are serious methodological challenges that future studies need to address.
This is a preview of subscription content, access via your institution.
References
Associated Press (2009) ‘Officials Say North Korea Believed behind Cyber Attacks on SKorean, US Web Sites. from http://www.trurodaily.com/Living/World/2009-07-08/article-353120/Officials-say-North-Korea-believed-behind-cyber-attacks-on-SKorean,-US-Web-sites/1, accessed 17 October, 2013.
Axelrod, Robert and Rumen Iliev (2014) ‘Timing of Cyber Conflict’, Proceedings of the National Academy of Sciences 111(4): 1298–303.
Axelrod, Robert and Robert O. Keohane (1993) ‘Achieving Cooperation Under Anarchy: Strategies and Institutions’, in David A. Baldwin, ed, Neorealism and Neoliberalism: The Contemporary Debate, 85–115, New York: Columbia University Press.
Betz, David J. and Tim Stevens (2013) ‘Analogical Reasoning and Cyber Security,’ Security Dialogue 44(2): 147–64.
Boin, Arjen, Paul t’Hart, and Allan McConnell (2009) ‘Crisis Exploitation: Political and Policy Impacts of Framing Contests’, Journal of European Public Policy 16(1): 81–106.
Bovens, Mark and Paul t’Hart, eds. (1996) Understanding Policy Fiascos, New Brunswick: Transaction Publishers.
Brake, Benjamin (2015) Strategic Risks of Ambiguity in Cyberspace. New York: Council on Foreign Relations, from http://www.file:///C:/Users/Cordula/Downloads/CPA_ContingencyPlanningMemo_24.pdf, accessed 1 September 2015.
Brändström, Anneke and Sanneke Kuipers (2003) ‘From “Normal Incidents” to Political Crises: Understanding the Selective Politicization of Political Failures’, Government and Opposition 38(3): 279–305.
Carr, Jeffrey (2010) Inside Cyber Warfare, Sebastopol, CA: O’Reilly.
Checkel, Jeffrey T. (1998) ‘The Constructive Turn in International Relations Theory’, World Politics 60(2): 324–48.
CICIR and CSIS (2012) Bilateral Discussions on Cooperation in Cybersecurity, from http://csis.org/files/attachments/120615_JointStatement_CICIR.pdf, accessed 15 June, 2015.
Clarke, Richard A. and Robert K. Knake (2010) Cyberwar: The Next Threat to National Security and What to Do about it, New York: Harper/Collins.
CNN (2007) ‘Estonia Suspects Kremlin in Web Attacks’, 17 May, from http://www.industrialdefender.com/general_downloads/incidents/2007.05.17_estonia_suspects_kremlin_in_web_attacks.pdf, 17 October, 2013.
Cottam, Martha L. et al. (2010) Introduction to Political Psychology, second edition, New York and Hove: Psychology Press.
Crisp, Richard J. and Rhiannon N. Turner (2010) Essential Social Psychology, second edition, London: Sage.
Davis, Joshua (2007) ‘Hackers Take down the Most Wired Country in Europe’, Wired, 21 August, from http://www.wired.com/politics/security/magazine/15-09/ff_estonia, accessed 17 October, 2013.
Denning, Dorothy E. (1999) Information Warfare and Security, Reading, MA et al.: Addison-Wesley.
Dolman, Everett C. (2002) Astropolitik: Classical Geopolitics in the Space Age, London: Frank Cass.
Douhet, Giulio (1942/1998) The Command of the Air, translated by Dino Ferrari, Tuscaloosa: University of Alabama Press.
Economist (2008) ‘Marching off to Cyberwar,’ 4 December, from http://www.economist.com/node/12673385, accessed 18 July, 2013).
Elliott, David (2009) ‘Weighing the Case for a Convention to Limit Cyberwarfare’, Arms Control Today, 5 November, from https://www.armscontrol.org/act/2009_11/Elliott, accessed 30 August, 2016.
Evron, Gadi (2009) ‘Authoratively, Who Was Behind the Estonian Attacks?’, 17 March, from http://www.darkreading.com/blog/227700882/authoritatively-who-was-behind-the-estonian-attacks.html, accessed 17 October, 2013.
Eun, Yong-Soo and Judith Sita Aßmann (2014) ‘Cyberwar: Taking Stock of Security and Warfare in the Digital Age’, International Studies Perspective, doi:10.1111/insp.12073.
Farnham, Barbara, ed. (1994) Avoiding Losses/Taking Risks: Prospect Theory and International Conflict, Ann Arbor: University of Michigan Press.
Farwell, James P. and Rafal Rohozinski (2011) ‘Stuxnet and the Future of Cyberwar’, Survival 53(1): 23–40.
Feakin, Tobias and Jessica Woodall (2014) ‘Cyber Confidence Building in the Asia-Pacific: Three Big Take-Aways from the ARF’, in Strategist, from http://www.aspistrategist.org.au/cyber-confidence-building-in-the-asia-pacific-three-big-take-aways-from-the-arf/, accessed 15 June, 2015.
Financial Times (2007) ‘US Warns Cyber-Attacks will Increase’, 17 May, from http://www.ft.com/cms/s/0/324fa472-049e-11dc-80ed-000b5df10621.html#axzz1Nej08Dbs, accessed 4 September, 2015.
Finn, Peter (2007) ‘Cyber Assaults on Estonia Typify a New Battle Tactic’, Washington Post (19 May): A01.
Finnemore, Martha (2011) ‘Cultivating International Cyber Norms’, in Kristin M. Lord and Travis Sharp, eds, America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, 89–100, Washington: Center for a New American Security.
Fiske, Susan T. and Shelley E. Taylor (2010) Social Cognition: From Brains to Culture, Boston: McGraw Hill.
Fox News (2009) ‘Pentagon Official: North Korea behind Week of Cyber Attacks’, 9 July, from http://www.foxnews.com/story/0,2933,530781,00.html, accessed 17 October, 2013.
Gartzke, Erik (2013) ‘The Myth of Cyberwar: Bringing War in Cyberspace Back down to Earth’, International Security 38(2): 41–73.
Gaycken, Sandro (2011) Cyberwar: Das Internet als Kriegsschauplatz, Munich: Open Source Press.
Gorman, Siobhan (2009) ‘Electricity Grid in U.S. Penetrated by Spies’, Wall Street Journal, 8 April, available at http://online.wsj.com/article/SB123914805204099085.html, accessed 17 October, 2013.
Gray, Colin S., ed. (1999) Geopolitics, Geography and Strategy, London: Frank Cass.
Gross-Stein, Janice (2002) ‘Psychological Explanations of International Conflict’, in Walter Carlsnaes, Thomas Risse and Beth A. Simmons, eds, Handbook of International Relations, 292–308, London: Sage Publications.
Gross-Stein, Janice and David A. Welch (1997) ‘Rational and Psychological Approaches to the Study of International Conflict: Comparative Strenghts and Weaknesses’, in Nehemia Geva and Alex Mintz, eds, Decision-making on War and Peace: The Cognitive-Rational Debate, 51–77, Boulder: Lynne Rienner.
Guadagno, Rosanna E., Robert B. Cialdini and Gadi Evron (2010) ‘Storming the Servers: A Social Psychological Analysis of the First Internet War’, Cyberpsychology, Behavior, and Social Networking 13(4): 447–53.
Haas, Peter M. (1992) ‘Introduction: Epistemic Communities and International Policy Coordination’, International Organization 46(1): 1–35.
Halpin, Tony (2007) ‘Estonia Accuses Russia of “Waging Cyber War”’, Times Online, 17 May, from http://www.timesonline.co.uk/tol/news/world/europe/article1802959.ece, accessed 27 May, 2011.
He, Kai and Huiyun Feng (2012) Prospect Theory and Foreign Policy Analysis in the Asia Pacific: Rational Leaders and Risky Behavior, New York: Routledge.
Heise Media (2007) ‘Estonian DDoS — A Final Analysis’, 31 May, from http://www.h-online.com/security/news/item/Estonian-DDoS-a-final-analysis-732971.html?view=print, accessed 17 October, 2013.
Hoffman, Frank G. (2009) ‘Hybrid Warfare and Challenges’, Small Arms Journal 52(1): 34–39.
Hughes, Rex (2010) ‘A Treaty for Cyberspace’, International Affairs 86(2): 523–41.
Hyde, Susan D. (2015) ‘Experiments in International Relations: Lab, Survey, and Field’, Annual review of Political Science 18: 403–23.
Jervis, Robert (1976) Perception and Misperception in International Politics, Princeton: Princeton University Press.
Jervis, Robert (1986) ‘Cognition and Political Behavior’, in Richard R. Lau and David O. Sears, eds, Political Cognition, 319–37, Hillsdale, NJ: Lawrence Erlbaum Associates.
Jervis, Robert (1988) ‘War and Misperception’, Journal of Interdisciplinary History 18(4): 675.
Johnson, David E. (2010) Military Capabilities for Hybrid War: Insights from the Israel Defense Forces in Lebanon and Gaza, Santa Monica, CA: Rand, available at http://www.rand.org/content/dam/rand/pubs/occasional_papers/2010/RAND_OP285.pdf, accessed 3 September, 2015.
Jones, Edward E. and Richard E. Nisbett (1972) ‘The Actor and the Observer: Divergent Perceptions of the Causes of Behavior’, in Edward E. Jones et al., eds, Attribution: Perceiving the Causes of Behavior, 79–94, Morristown, NJ: General Learning Press.
Junio, Timothy J. (2013) ‘How Probable is Cyber War? Bringing IR Theory Back into the Cyber Conflict Debate’, Journal of Strategic Studies 36(1): 125–33.
Jæger, Øyvind (2000) ‘Securitizing Russia: Discursive Practices of the Baltic States’, Peace and Conflict Studies 7(2), from http://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1009&context=pcs, accessed 3 August, 2015.
Kahnemann, Daniel and Amos Tversky (1972) ‘Subjective Probability: A Judgement of Representativeness’, Cognitive Psychology 3: 430–54.
Kello, Lucas (2013) ‘The Meaning of the Cyber Revolution: Perils to Theory and Statecraft’, International Security 38(2): 7–40.
Khong, Yuen F. (1992) Analogies at War: Korea, Munich, Dien Bien Phu, and the Vietnam Decisions of 1965, Princeton: Princeton University Press.
King, Gary, Robert O. Keohane and Sidney Verba (1994) Designing Social Inquiry: Scientific Inference in Qualitative Research, Princeton: Princeton University Press.
Klein, John J. (2004) ‘Corbett in Orbit: A Maritime Model for Strategic Space Theory’, Naval War College Review 57(1): 59–74.
Klimburg, Alexander (2011) ‘Mobilising Cyber Power’, Survival 53(1): 41–60.
Klimburg, Alexander (2014) ‘Roots Unknown: Cyberconflict Past, Present & Future’, Sicherheit + Frieden/Security + Peace 32(1): 1–8.
Kopan, Tal (2014) ‘U.S.: No Alternate Leads in Sony Hack’, Politico, from http://www.politico.com/story/2014/12/fbi-briefed-on-alternate-sony-hack-theory-113866, accessed 2 September, 2015.
Kramer, Franklin D., Stuart H. Starr and Larry K. Wentz, eds (2009) Cyberpower and National Security, Washington: National Defense University Press.
Krebs, Brian (2010) ‘Cable: No Cyber Attack in Brazilian “09 Blackout”’, 3 December, from http://krebsonsecurity.com/2010/12/cable-no-cyber-attack-in-brazilian-09-blackout/, accessed 17 October, 2013.
Kydd, Andrew H. (2008) ‘Methodological Individualism and Rational Choice’, in Christian Reus-Smit and Duncan Snidal, eds, The Oxford Handbook of International Relations, 425–43, Oxford: Oxford University Press.
Lawson, Sean (2011) Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History, Fairfax, VA: George Mason University, from http://mercatus.org/sites/default/files/publication/beyond-cyber-doom-cyber-attack-scenarios-evidence-history_1.pdf, accessed 16 June, 2011.
Levy, Jack S. (2003) ‘Political Psychology and Foreign Policy’, in David O. Sears, Leonie Huddy and Robert Jervis, eds, Oxford Handbook of Political Psychology, 253–84, Oxford: Oxford University Press.
Lewis, James (2005) Computer Espionage, Titan Rain and China, Washington: Center for Strategic and International Studies, from http://csis.org/files/media/csis/pubs/051214_china_titan_rain.pdf, accessed 17 October, 2013.
Libicki, Martin C. (2007) Conquest in Cyberspace: National Security and Information Warfare, Cambridge: Cambridge University Press.
Libicki, Martin C. (2009) Cyberdeterrence and Cyberwar, Santa Monica: RAND.
Lonsdale, David (1999) ‘Information Power: Strategy, Geopolitics and the Fifth Dimension’, in Colin S. Gray, ed, Geopolitics, Geography and Strategy, 137–57, London: Frank Cass.
Lonsdale, David J. (2004) The Nature of War in the Information Age, London: Frank Cass.
Lindsay, Jon R. (2013) ‘Stuxnet and the Limits of Cyber Warfare’, Security Studies 22(3): 365–404.
Mahan, Alfred T. (1890) The Influence of Sea Power upon History 1660–1783, Boston: Little, Brown and Company.
Mannes, Aaron and James Hendler (2008) ‘The First Modern Cyberwar,’ Guardian, 22 August, from http://www.guardian.co.uk/commentisfree/2008/aug/22/russia.georgia1, accessed 17 November, 2010.
March, James G. and Johan P. Olsen (2006) ‘The Logic of Appropriateness’, in Michael Moran, Martin Rein and Robert E. Goodin, eds, The Oxford Handbook of Public Policy, 689–708, Oxford: Oxford University Press.
Marfleet, B. Gregory (2000) ‘The Operational Code of John F. Kennedy During the Cuban Missile Crisis: A Comparison of Public and Private Rhetoric’, Political Psychology 21(3): 545–58.
Markoff, John and David Barboza (2009) ‘Academic Paper in China Sets off Alarms in U.S.’, New York Times, 20 March, from http://www.nytimes.com/2010/03/21/world/asia/21grid.html accessed 17 October, 2013.
McDermott, Rose (1998) Risk-Taking in International Politics: Prospect Theory in American Foreign Policy, Ann Arbor: University of Michigan Press.
Mintz, Alex, Yi Yang and Rose McDermott (2011) ‘Experimental Approaches to International Relations’, International Studies Quarterly 55(2): 493–501.
Mite, Valentinas (2007) ‘Attacks Seen as First Case of “Cyberwar”’, Radio Free Europe/Radio Liberty, 30 May, from http://www.rferl.org/content/article/1076805.html, accessed 1 September, 2015.
Mitzen, Jennifer and Randall L. Schweller (2011) ‘Knowing the Unknown Unknowns: Misplaced Certainty and the Onset of War’, Security Studies 20(1): 2–35.
Moran, Daniel (2007) ‘Geography and Strategy’, in John Baylis et al., eds, Strategy in the Contemporary World: An Introduction to Strategic Studies, 122–40, Oxford: Oxford University Press.
Moravcsik, Andrew (1997) ‘Taking Preferences Seriously: A Liberal Theory of International Politics’, International Organization 51(4): 513–53.
Nelson, Bill et al. (1999) Cyberterror: Prospects and Implications, Monterey, CA: Center for the Study of Terrorism and Irregular Warfare.
Neuneck, Götz (2010) ‘Towards TCBMS in the Cybersphere’, in UNIDIR, ed, The Cyber Index: International Security Trends and Realities, New York and Geneva.
Neustadt, Richard E. and Ernest R. May (1986) Thinking in Time: The Uses of History for Decision Makers, New York: Free Press.
Nye, Joseph S. (2011) ‘Power and National Security in Cyberspace’, in Kristin M. Lord and Travis Sharp, eds, America’s Cyber Future: Security and Prosperity in the Information Age: Volume II, 7–23, Washington: Center for a New American Security.
Oberg, James (1999) Space Power Theory, Colorado Springs: US Air Force Academy.
OSCE (2013) Initial Set of OECD Confidence-Building Measures to Reduce the Risk of Conflict Stemming from the Use of Information and Communication Technologies, Decision No. 1106, PC.DEC/1106, 3 December.
Owens, William A., Kenneth W. Dam and Herbert S. Lin (2009) Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Washington: National Academies Press.
Pau, Aivar (2007) ‘Statement by the Foreign Minister Urmas Paet’, Eesti Päevaleht, 1 May, from http://www.epl.ee/artikkel/384207, accessed 17 October, 2013.
Qingling, Dong (2014) Confidence Building for Cybersecurity between China and the United States, China Institute of International Studies, 23 September, from http://www.ciis.org.cn/english/2014-09/23/content_7254470.htm, accessed 15 June, 2015.
Rathmell, Andrew (2001) ‘Controlling Computer Network Operations’, Information and Security 7(1): 121–44.
Rauscher, Karl Frederick and Valery Yaschenko (2011) Russia-U.S. Bilateral on Cybersecurity: Critical Terminology Foundations, New York and Moscow: East West Institute/Information Security Institute.
Renshon, Jonathan (2009) ‘When Public Statements Reveal Private Beliefs: Assessing Operational Codes at a Distance’, Political Psychology 30(4): 649–61.
Rid, Thomas (2012) ‘Think Again: Cyberwar’, Foreign Policy, 27 February, from http://foreignpolicy.com/2012/02/27/think-again-cyberwar/, accessed on 30 January, 2016.
Rid, Thomas (2013) Cyber War Will Not Take Place, London: Hurst & Company.
Russell, Alison L. (2014) Cyber Blockades, Washington: Georgetown University Press.
Ruus, Kertu (2008) ‘Cyber War I: Estonia Attacked from Russia’, European Affairs 9(1–2): from http://www.europeaninstitute.org/index.php/component/content/article?id=67:cyber-war-i-estonia-attacked-from-russia, accessed 3 September, 2015.
Sanger, David E. (2015) ‘U.S. and China Seek Arms Deal for Cyberspace’, New York Times, 19 September, from http://www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html, accessed 31 January, 2016.
Shachtman, Noah (2009) ‘Top Georgian Offical: Moscow Cyber Attacked Us – We Just Can’t Prove it,’ Wired, 11 March, from http://www.wired.com/dangerroom/2009/03/georgia-blames/, accessed 31 May, 2011.
Smith, David J. (1998) ‘Russia, Estonia and the Search for a Stable Ethno-Politics’, Journal of Baltic Studies 29(1): 3–18.
Simon, Herbert A. (1985) ‘Human Nature in Politics: The Dialogue of Psychology with Political Science’, American Political Science Review 79(2): 293–304.
Stauffacher, Daniel and Camino Kavanagh (2013) Confidence Building Measures and International Cyber Security, Geneva: ICT4Peace Foundation, from http://ict4peace.org/wp-content/uploads/2015/04/processbrief_2013_cbm_wt-71.pdf, accessed 15 June, 2015.
Swayne, Jon (2008) ‘Georgia: “Russia Conducting Cyberwar”’, Telegraph, 11 August, from http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russia-conducting-cyber-war.html, from 31 May, 2011.
Tetlock, Philip E. (1998) ‘Social Psychology and World Politics’, in Daniel T.Gilbert, Susan Fiske and Gardner Lindzey, eds, The Handbook of Social Psychology, Vol. II, 868–912, Boston: McGraw-Hill.
Tetlock, Philip E. and Charles McGuire (1986) ‘Cognitive Perspectives on Foreign Policy’, in Samuel Long, ed, Political Behavior Annual, Volume I, 147–79, London: Westview Press.
Traynor, Ian (2007) ‘Russia Accused of Unleashing Cyberwar to Disable Estonia’, Guardian, 17 May, from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia, accessed 17 October, 2013.
Tversky, Amos and Daniel Kahnemann (1974) ‘Judgement under Uncertainty: Heuristics and Biases’, Science 185: 1124–31.
United Nations General Assembly (2011) International Code of Conduct for Information Security, A/66/359, 12 September.
United Nations General Assembly (2013) Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, A/68/69, 24 June, from http://www.mofa.go.jp/files/000016407.pdf, accessed 30 January, 2016.
US Embassy Tallinn (2007a) Estonia’s Cyber Attacks: World’s First Virtual Attack against Nation State, 4 June, published by WikiLeaks, from http://WikiLeaks.ch/cable/2007/06/07TALLINN366.html, accessed 28 May, 2011.
US Embassy Tallinn (2007b) Estonia: GOE Officials on the Bronze Solider, Russia and Integration, 11 May, published by WikiLeaks, from http://aebr.home.xs4all.nl/wl/tallinn/07Talinn/07TALLINN310.html, accessed 28 May, 2011.
US Embassy Tallinn (2007c) Russian Bear Hug Squeezes Estonian Economy, 24 May, published by WikiLeaks, from http://77aebr.home.xs4all.nl/wl/tallinn/07TALLINN347.html, accessed 28 May, 2011.
Verhulst, Brad and Mary-Kate Lizotte (2011) ‘The Influence of Affective States on the Depth of Information Processing’, in Marcos Engelken-Jorge et al., eds., Politics and Emotions — The Obama Phenomenon, 73–94, Wiesbaden: VS.
Vertzberger, Yaacov Y. I. (1990) The World in their Minds: Information Processing, Cognition, and Perception in Foreign Policy Decision Making, Stanford: Stanford University Press.
Vijayan, Jaikumar (2007) ‘Black Hat: Estonia Attacks an Example of Online Rioting, Says Researcher’, Computerworld, 2 August, from http://www.computerworld.com/article/2542850/security0/black-hat–estonia-attacks-an-example-of-online-rioting–says-researcher.html, accessed 3 September, 2015.
Voss, James F. and Ellen Dorsey (1992) ‘Perception and International Relations: An Overview’, in Eric Singer and Valerie M. Hudson, eds, Political Psychology and Foreign Policy, 3–30, Boulder, CO: Westview Press.
Walker, George K. (2000) ‘Information Warfare and Neutrality’, Vanderbilt Journal of Transnational Law 33(5): 1079–200.
Wang, Jian-Wei and Li-Li Rong (2009) ‘Cascade-based Attack Vulnerability on the US Power Grid’, Safety Science 47(10): 1332–36.
Waterman, Shaun (2009) ‘July 4 Cyberattack Called “very minor”’, Washington Times, 16 July, from http://www.washingtontimes.com/news/2009/jul/16/july-4-cyberattack-called-very-minor/, accessed 17 October, 2013.
Waterman, Shaun (2008) ‘Analysis: Russia-Georgia Cyberwar Doubted,’ Spacewar.com, from http://www.spacewar.com/reports/Analysis_Russia-Georgia_cyberwar_doubted_999.html, accessed 31 May, 2011.
Welch-Larson, Deborah (1988) ‘The Psychology of Reciprocity in international Relations’, Negotiation Journal 4(3): 281–301.
Wendt, Alexander (1999) Social Theory of International Politics, Cambridge: Cambridge University Press.
White House (2011) Joint Statement by Cybersecurity Coordinator Schmidt and Deputy Secretary Klimashin, Washington, from http://www.whitehouse.gov/sites/default/files/uploads/2011_klimashin_schmidt_cyber_joint_statement.pdf, accessed 17 October, 2013.
Wingfield, Thomas C. (2009) ‘International Law and Information Operations’, in Franklin D. Kramer, Stuart H.Starr and Larry K. Wentz, eds, Cyberpower and National Security, 525–42, Washington: National Defense University Press.
Wortzel, Larry M. (2010) China’s Approach to Cyber Operations, Testimony before the Committee on Foreign Affairs, 10 March, Washington, from http://www.internationalrelations.house.gov/111/wor031010.pdf, accessed 10 August, 2011.
Zetter, Kim (2009a) ‘Lawmaker Wants “Show of Force” against North Korea for Website Attacks’, Wired, 10 July, from http://www.wired.com/threatlevel/2009/07/show-of-force/, accessed 17 October, 2013.
Zetter, Kim (2009b) ‘Lazy Hacker and Little Worm Set Off Cyberwar Fenzy’, Wired, 8 July, from http://www.wired.com/threatlevel/2009/07/mydoom/, accessed 17 October, 2013.
Zetter, Kim (2011) ‘Exclusive: Comedy of Errors Led to False “Water-Pump Hack” Report,’ Wired, 30 November, frfom http://www.wired.com/threatlevel/2011/11/water-pump-hack-mystery-solved/, accessed 17 October, 2013.
Acknowledgments
Some of the empirical material in this article has come out of my PhD research at the University of Cologne. An earlier version of the paper has been presented at the 2015 Annual Conference of the British International Studies Association (BISA) in London. The author wishes to thank all panellists as well as two anonymous reviewers for many helpful comments and suggestions that enabled him to clarify and improve his argument.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hansel, M. Cyber-attacks and psychological IR perspectives: explaining misperceptions and escalation risks. J Int Relat Dev 21, 523–551 (2018). https://doi.org/10.1057/s41268-016-0075-8
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41268-016-0075-8
Keywords
- cognitive approaches
- cyber-attacks
- cyberspace
- misperception
- psychological IR theories