{"title":"预测伊朗政府对网络攻击的反应","authors":"Austen D. Givens, Nikki Sanders, Corye J. Douglas","doi":"10.21140/mcuj.20221301011","DOIUrl":null,"url":null,"abstract":"Abstract:Extant scholarship on Iranian cyber warfare emphasizes the ways in which Tehran's cyber capabilities might be employed offensively to achieve its foreign policy objectives. Comparatively little attention, however, has been given to the ways in which Iran might leverage these same cyber assets in retaliatory strikes. This article argues that because of the unique combination of endogenous and exogenous variables affecting contemporary Iran, including diplomatic isolation and economic sanctions, as well as Iran's historical track record of carrying out its foreign policy through proxies, Iranian cyber retaliation is likely to be executed through third parties, mostly symbolic in nature, and proportionate in scale.","PeriodicalId":168300,"journal":{"name":"Journal of Advanced Military Studies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Forecasting Iranian Government Responses to Cyberattacks\",\"authors\":\"Austen D. Givens, Nikki Sanders, Corye J. Douglas\",\"doi\":\"10.21140/mcuj.20221301011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract:Extant scholarship on Iranian cyber warfare emphasizes the ways in which Tehran's cyber capabilities might be employed offensively to achieve its foreign policy objectives. Comparatively little attention, however, has been given to the ways in which Iran might leverage these same cyber assets in retaliatory strikes. This article argues that because of the unique combination of endogenous and exogenous variables affecting contemporary Iran, including diplomatic isolation and economic sanctions, as well as Iran's historical track record of carrying out its foreign policy through proxies, Iranian cyber retaliation is likely to be executed through third parties, mostly symbolic in nature, and proportionate in scale.\",\"PeriodicalId\":168300,\"journal\":{\"name\":\"Journal of Advanced Military Studies\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Advanced Military Studies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21140/mcuj.20221301011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Advanced Military Studies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21140/mcuj.20221301011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Forecasting Iranian Government Responses to Cyberattacks
Abstract:Extant scholarship on Iranian cyber warfare emphasizes the ways in which Tehran's cyber capabilities might be employed offensively to achieve its foreign policy objectives. Comparatively little attention, however, has been given to the ways in which Iran might leverage these same cyber assets in retaliatory strikes. This article argues that because of the unique combination of endogenous and exogenous variables affecting contemporary Iran, including diplomatic isolation and economic sanctions, as well as Iran's historical track record of carrying out its foreign policy through proxies, Iranian cyber retaliation is likely to be executed through third parties, mostly symbolic in nature, and proportionate in scale.