Use this URL to cite or link to this record in EThOS:
Title: Optimizing deterrence strategies in state-state cyber conflicts : theoretical models for strategic cyber deterrence
Author: Al Azwani, Nasser
ISNI:       0000 0004 9354 7610
Awarding Body: City, University of London
Current Institution: City, University of London
Date of Award: 2020
Availability of Full Text:
Access from EThOS:
Full text unavailable from EThOS. Thesis embargoed until 31 Jan 2023
Access from Institution:
Deterrence has successfully prevented nuclear confrontation for more than five decades. The motive for conducting this research is to response to the problem of cyber threat growth and find out if deterrence is able to stop state cyber adversaries from utilizing cyber threats against its cyber space. A considerable effort of defensive cyber technologies and solutions have been developed, although massive cyber-attacks are still occurring and growing in terms of complexity, severity and quantity. For that, States need a new tactic to deal with cyber threats rather than relying only on cyber defense or offense. However, there is a satisfactory chance for cyber deterrence to work despite of challenges. Research approach is to examine cyber deterrence theory inspired by traditional deterrence theory combined with game theory models. This approach respond to the argument via three dimensions. First, it responds to analyze relevance of credibility to deterrence assumptions and the reasons beyond associating credibility of cyber threat with cyber deterrence strategy and its role either success or failure of deterrence strategy. The developed analytical model consists of two players involved in a cyber conflict. The selected case study assist in generating clear understanding of the pivotal role of credibility to support optimizing deterrence strategy from real life context. Second, cyber escalation model developed reflecting the failure of cyber threat credibility (as a threat of punishment) in deterring state cyber adversaries. The model has attempted to explore nature of cyber escalation ladder either it is going to be limited within cyber space or might exceed to involve nuclear or other domains of conflicts. Third, deterrence by entanglement model as a new approach could be the best approach for succeeding cyber deterrence strategy compared to other traditional deterrence model. Deterrence by entanglement model analysis has moved from general deterrence concepts to more narrowed investigation measuring effectiveness of deterrence by entanglement in reducing conflict heat. It explores the degree to which cyber deterrence by entanglement can assist state in deterring its cyber adversaries within more peacefully approach. Each chapter is concluded with a section that prescribes certain strategies which states can benefit from in real life practice. These strategies and learned lessons will assist states to understand the essential requirements for developing its credibility in cyber space and draw the lines for states optimizing its cyber deterrence.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available
Keywords: QA75 Electronic computers. Computer science