Skip to main content
  • 28 Accesses

Abstract

The chapter takes four steps to explore the relationship between democracy and cyber deterrence. First, I investigate the intellectual foundation of cyber deterrence, examine several types of deterrence strategies, and point out methodological challenges we face in analyzing cyber deterrence. Second, I show how key actors of democratic states such as voters, firms, civil groups, and NGO, often play a role in constraining the use of cyber force and how the constraints help attackers draw operational advantage. Third, I examine the strategic environment of Western and Asian democracies by investigating the tension with regimes in Russia, China, North Korea, and Iran. Lastly, I discuss how democracies in Western Europe, North America, and East Asia have responded to the threats they face.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nori Katagiri .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Katagiri, N. (2024). Democracy and Cyber Deterrence. In: How Liberal Democracies Defend Their Cyber Networks from Hackers. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-54561-0_2

Download citation

Publish with us

Policies and ethics