<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-52-00410</article-id><article-id pub-id-type="doi">10.35467/sdq/203979</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Strategic analysis of cyber conflicts: A game-theoretic modelling of global cyber crises in the 2000s</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-5226-3177</contrib-id><name><surname>Çalışkan</surname><given-names>Esra Merve Boztosun</given-names></name><email>ecaliskan@medipol.edu.tr</email></contrib><aff id="aff1">Political Science and International Relations, Istanbul Medipol University, Kavacık South Campus, Humanities and Social Science Faculty, 34810, Beykoz, Istanbul, Turkey</aff></contrib-group><pub-date pub-type="epub"><day>31</day><month>05</month><year>2025</year></pub-date><volume>52</volume><issue>4</issue><fpage>1</fpage><lpage>25</lpage><history><date date-type="received"><day>05</day><month>11</month><year>2024</year></date><date date-type="rev-recd"><day>17</day><month>03</month><year>2025</year></date><date date-type="accepted"><day>11</day><month>04</month><year>2025</year></date></history><permissions><copyright-statement>© 2025 E.M. Çalıs¸kan published by War Studies University, Poland.</copyright-statement><copyright-year>2025</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">http://creativecommons.org/licenses/by/4.0/</ext-link>).</license-p></license></permissions><abstract><p>In the rapidly evolving landscape of international relations, cyberspace has emerged as a new battlefield for interstate competition and conflict. The increasing digitalisation of our world necessitates a thorough understanding of cybersecurity and the strategic dynamics of cyber warfare. The current level of understanding of these issues is limited. This study aims to bridge this gap by employing game theory to analyse significant cyber crises that occurred during the 2000s. By modelling the preferences and strategies of states that have extended their global power struggles into the cyber domain, we seek to develop a framework for predicting systematic crises and conflicts in this arena. Our research examines eight case studies drawn from North America, South America, Europe, Asia, the Middle East, and Africa. For each case, we define the actors, their strategies, preferences, and potential outcomes, culminating in the identification of Nash equilibria. Through comparative analysis, we highlight the similarities and differences in cyber conflict dynamics across these diverse regions. This study contributes to the literature on cyber conflicts in international relations through its innovative application of game theory modelling and comparative case analysis. We developed a novel analytical framework for explaining state behaviour in cyberspace. Our findings suggest that game theory and strategic analysis can serve as powerful tools for predicting state preferences in the cyber domain. The results indicate that aggressor states often adopt denial strategies, while victim states tend to respond with harsh retaliation. Furthermore, we observed that cyber operations during election periods are attractive to both aggressor and victim countries, but this tendency contributes to global instability. In conclusion, this research argues in support of the utility of game theory and strategic analysis in modelling and forecasting state preferences and behaviours in cyberspace. Our study not only contributes to the existing literature but also proposes methodological approaches for future research. The insights gained from this analysis are valuable for policymakers in formulating effective cybersecurity strategies and for scholars seeking to deepen their understanding of the complex interplay between technology, strategy, and international relations in the digital age.</p></abstract><kwd-group><kwd>cybersecurity</kwd><kwd>game theory</kwd><kwd>cyber conflict modeling</kwd><kwd>digital geopolitics</kwd></kwd-group></article-meta></front><body><sec id="S1" sec-type="intro"><title>Introduction</title><p>The late 20th century’s digital revolution created a new theatre of international conflict that defied traditional geopolitical boundaries. Cyberspace, once the domain of tech enthusiasts and computer scientists, has quickly developed into a complicated battleground in which states wage quiet warfare using lines of code as weapons. This transformation has challenged not just traditional views of combat but has also blurred the lines between peace and conflict, necessitating a rethinking of fundamental concepts in international relations. As we stand at the crossroads of the digital age, the need to comprehend and analyse the strategic consequences of cyber wars has never been greater. This study embarks on an ambitious journey to unravel the intricate dynamics of cyber warfare, employing the precision of game theory to dissect the decision-making processes that drive state behaviour in this ethereal yet consequential domain.</p><p>The early 2000s marked a turning point in the recognition of cyberspace as a critical domain of international security. A series of high-profile incidents underscored the potential for cyber operations to inflict significant damage on national infrastructures and disrupt geopolitical stability. The 2007 cyberattacks against Estonia, widely attributed to Russia, served as a wake-up call to the international community, demonstrating the vulnerability of even technologically advanced nations to coordinated cyber assaults (<xref ref-type="bibr" rid="ref61">Tikk et al., 2010</xref>, p.16). This event was shortly followed by the 2008 cyberattacks on Georgia, which coincided with conventional military operations, introducing the concept of hybrid warfare to the forefront of strategic discourse (<xref ref-type="bibr" rid="ref24">Hollis, 2011</xref>).</p><p>As the decade progressed, the scope and sophistication of cyber operations continued to evolve. The discovery of the Stuxnet virus in 2010, targeting Iran’s nuclear facilities, revealed the potential for cyber weapons to cause physical damage to critical infrastructure, blurring the lines between digital and kinetic warfare (<xref ref-type="bibr" rid="ref16">Farwell and Rohozinski, 2011</xref>, p. 25). In addition, China’s rapid development of cyber capabilities raised concerns about shifting power balances in the international system, prompting a re-evaluation of traditional deterrence strategies (<xref ref-type="bibr" rid="ref35">Lindsay et al., 2015</xref>).</p><p>These events have catalysed a surge of academic interest in cybersecurity and cyber warfare across various disciplines, including international security, strategic studies, and international relations. Scholars have begun to grapple with the multifaceted nature of cyber conflicts, recognising that these issues transcend purely technological considerations and encompass complex geopolitical, economic, and social dimensions (<xref ref-type="bibr" rid="ref11">Choucri, 2012</xref>).The inherent complexity of the cyber domain poses significant challenges to developing comprehensive analytical frameworks capable of capturing the nuanced dynamics of cyber conflicts.</p><p>Despite the growing body of literature on cybersecurity and cyber warfare, there remains a notable gap in systematic analyses that model strategic choices and behaviours of states in the cyber domain (<xref ref-type="bibr" rid="ref63">Valeriano and Maness, 2015</xref>, p. 72). This limitation underscores the need for innovative approaches that can provide insights into the decision-making processes of state actors in cyber conflicts and offer predictive capabilities for future scenarios.</p><p>Game theory, with its proven track record in modelling strategic interactions in international relations (<xref ref-type="bibr" rid="ref52">Schelling, 1960</xref>, p. 123), presents a promising avenue for addressing this analytical shortfall. The characteristics of cyber conflicts—including asymmetric information, uncertainty, multiple actors, and complex interactions—align well with the strengths of game-theoretic modelling (<xref ref-type="bibr" rid="ref67">Zagare and Slantchev, 2018</xref>, p. 2593 ). However, the application of game theory to cybersecurity remains underdeveloped, presenting an opportunity for significant contributions to the field.</p><p>This study aims to bridge this gap by employing game theory to analyse significant cyber crises that occurred during the 2000s. By examining six case studies drawn from diverse geographical regions—North America, South America, Europe, Asia, the Middle East, and Africa—we seek to develop a comprehensive framework for understanding and predicting state behaviour in cyberspace. For each case, we define the actors, their strategies, preferences, and potential outcomes, culminating in the identification of Nash equilibria. This approach not only allows for a systematic analysis of past events but also provides a foundation for anticipating future cyber conflicts.</p><p>Furthermore, recent technological developments have introduced new dimensions to cybersecurity challenges. The integration of artificial intelligence (AI) and quantum computing is fundamentally altering the nature of cyber warfare, while emerging technologies like 5G/6G networks and the expanding Internet of Things (IoT) are creating novel vulnerabilities and defensive opportunities. These technological shifts, combined with the growing sophistication of cyber threats, underscore the urgency of developing comprehensive analytical frameworks that can account for rapidly evolving capabilities.</p><p>Our research contributes to the existing literature in several ways. Firstly, it offers a novel analytical framework that combines game theory modelling with comparative case analysis, providing a more nuanced understanding of state behaviour in the cyber domain. Secondly, by examining cases from diverse regions, our study highlights both the global nature of cyber conflicts and the unique regional dynamics that shape them. Finally, our findings have practical implications for policymakers, offering insights that can inform the development of more effective cybersecurity strategies.</p><p>As we delve into the complexities of cyber conflicts in the following sections, this study aims to shed light on the strategic calculus that drives state behaviour in cyberspace. By doing so, we hope to contribute to a more comprehensive understanding of the role of cyber domain in shaping the future of international relations and global security.</p></sec><sec id="S2"><title>Literature review</title><p>The number of academic studies on cybersecurity and cyber warfare has shown a rapid increase, especially since the beginning of the 21st century. This literature review aims to provide a comprehensive overview of the field, examining technical analyses, international relations perspectives, legal examinations, and interdisciplinary approaches.</p><p>Technical analyses constitute a significant portion of the cybersecurity literature, primarily conducted within the framework of computer science, engineering, and information security disciplines. <xref ref-type="bibr" rid="ref59">Skopik (2016)</xref> provides a detailed examination of cyberattack types and their technical characteristics, covering threats, such as viruses, worms, distributed denial of service (DDoS) attacks, and zero-day vulnerabilities. In terms of defence mechanisms, <xref ref-type="bibr" rid="ref60">Stamp (2011)</xref> offers extensive research on network security, encryption technologies, and firewalls. <xref ref-type="bibr" rid="ref27">Jang-Jaccard and Nepal (2014)</xref> examine the technical aspects of cybersecurity threats and the solutions developed against them, providing valuable information on how cyberattacks are carried out and how to defend against them.</p><p>The concept of cyber warfare, a term frequently discussed in the literature, refers to attack and defence activities carried out by states or non-state actors involving computer systems and networks. However, there is no full consensus on its definition. <xref ref-type="bibr" rid="ref46">Rid (2012)</xref> questions the reality of the concept of “cyber war” by examining past cyber operations, emphasising the importance of historical examples in understanding the nature of cyber conflicts. The unique features of cyber warfare, such as the lack of a physical battlefield, difficulties in determining the attacker’s identity, and the rapid spread of effects, make it challenging to apply traditional concepts of war to the cyber domain (<xref ref-type="bibr" rid="ref29">Kello, 2013</xref>).</p><p>Cyberattacks, another crucial concept, generally refer to malicious attacks on computer systems or networks. These can take various forms, including distributed denial of service attacks (DDoS), malware, ransomware, and social engineering attacks. Each type of attack uses different techniques and serves different purposes. <xref ref-type="bibr" rid="ref32">Liang and Xiao (2013</xref>, p. 480) provide a comprehensive literature review on the application of game theory to modelling these attack-defence dynamics. Also, <xref ref-type="bibr" rid="ref62">Valeriano and Maness (2014</xref>, p. 350) systematically examined inter-state cyber conflicts, comparatively analysing the frequency, intensity, and effects of cyber incidents.</p><p>Cyber defence covers the measures taken and strategies developed against these attacks. <xref ref-type="bibr" rid="ref49">Roy et al. (2010)</xref> use the Stackelberg game model to determine optimal defence strategies, demonstrating the potential of game theory in cybersecurity. <xref ref-type="bibr" rid="ref2">Alpcan and Başar (2010</xref>, p. 116) approach network security problems from game theory and decision theory perspectives, showing how theoretical models can be applied to practical security problems.</p><p>The concept of cyber deterrence, borrowed from the field of international relations, is quite controversial in its application to the cyber domain. <xref ref-type="bibr" rid="ref40">Nye (2017</xref>, p. 47) discusses the role of cyber power in international relations and the concept of cyber deterrence, highlighting the challenges in adapting traditional deterrence theory to the cyber domain due to the difficulties in attributing cyberattacks and the unique characteristics of cyber weapons.</p><p>Cyberpower refers to the capabilities and influence of a state or actor in the cyber domain. <xref ref-type="bibr" rid="ref34">Lindsay (2015)</xref> examines the cyber capabilities of states and their effects on foreign policy, focusing especially on cyber competition between major powers. Components of cyberpower include technical infrastructure, human resources, institutional structuring, legal framework, and international cooperation capacity.</p><p>The concept of cyber weapons is another controversial topic. Unlike traditional weapons, the identification, classification, and control of cyber weapons are quite challenging. <xref ref-type="bibr" rid="ref8">Buchanan (2017)</xref> investigates the effects of activities, such as cyber espionage and cyber sabotage, on international relations, touching upon the complexities of cyber weapons.</p><p>Cyberspace, or the cyber domain, can be defined as an abstract “space” consisting of computer systems, networks, and the data flowing over them. However, issues such as the boundaries of cyberspace, sovereignty rights, and its place in international law are still not clear. <xref ref-type="bibr" rid="ref21">Goldsmith (2013)</xref> addresses the relationship between cybersecurity and national sovereignty from a legal perspective, discussing how states’ activities in the cyber domain can affect the sovereignty rights of other states.</p><p>Legal examinations discuss the place of cyber warfare within the framework of international law. <xref ref-type="bibr" rid="ref53">Schmitt (2017)</xref> addresses, in detail, the application of international law to cyber operations, seeking answers to critical questions, such as when cyberattacks can be considered an “armed attack.” <xref ref-type="bibr" rid="ref24">Hollis (2011)</xref> examines the legal status of cyber conflicts and the applicability of the existing international law rules to the cyber domain, showing how the unique characteristics of cyber warfare challenge traditional concepts of the law of war.</p><p>In recent years, an increase in interdisciplinary studies has been observed. <xref ref-type="bibr" rid="ref58">Singer and Friedman (2014)</xref> present a holistic perspective by addressing technical, political, and legal dimensions together, making significant contributions to the literature. Recent developments in AI and cybersecurity have introduced new dimensions to the field. <xref ref-type="bibr" rid="ref28">Kaur et al. (2024)</xref> examine the integration of AI into cyber defence systems, highlighting both enhanced detection capabilities and new vulnerabilities introduced by machine learning models. Their work provides crucial insights into how AI is reshaping cyber warfare capabilities. Similarly, <xref ref-type="bibr" rid="ref30">Kello (2024)</xref> analyses how AI is transforming the traditional concepts of cyber deterrence and defence.</p><p>The emergence of quantum computing has raised new concerns about cybersecurity infrastructure. As demonstrated by <xref ref-type="bibr" rid="ref36">Liu et al. (2021)</xref> in their comprehensive review, quantum computing capabilities could potentially render current encryption methods obsolete, necessitating the development of quantum-resistant security measures. Also, <xref ref-type="bibr" rid="ref50">Salem et al. (2024)</xref> explore the concept of “digital security by design,” emphasising the need for integrating security considerations into the early stages of technological development. Their work highlights how AI-driven security systems can both enhance cyber defence capabilities and introduce new vulnerabilities. Similarly, <xref ref-type="bibr" rid="ref12">Cummings (2017)</xref> examines the implications of technological singularity on cyber warfare, particularly focusing on the potential risks associated with autonomous cyber weapons and AI-enabled attack vectors. These studies suggest that while AI offers promising solutions for cybersecurity, it also presents novel challenges that require careful consideration to ensure strategic planning and policy development. The integration of AI into cyber operations may fundamentally alter the dynamics of cyber conflicts, potentially accelerating the pace of attacks and responses beyond human decision-making capabilities. This emerging research area highlights the need for adaptive frameworks that can account for rapidly evolving technological capabilities in cyber warfare analysis.</p><p>The concept of technological singularity and its implications for cyber warfare has garnered significant attention in recent literature. <xref ref-type="bibr" rid="ref12">Cummings (2017)</xref> explores how AI could fundamentally alter the nature of cyber conflicts, particularly through the development of autonomous cyber weapons and AI-enabled attack systems. The research suggests that the integration of AI into cyber operations could accelerate attack and defence cycles beyond human response capabilities, necessitating new approaches to cyber deterrence anddefence.</p><p>Quantum computing represents another critical dimension in contemporary cybersecurity research. Recent studies indicate that quantum computers could potentially break many current encryption methods, forcing a fundamental reconsideration of cybersecurity protocols (<xref ref-type="bibr" rid="ref15">Edwards, n.d.</xref>). This development has spurred increased research in quantum-resistant cryptography and post-quantum security measures. Additionally, the emergence of 5G and upcoming 6G technologies introduces new vulnerabilities in network infrastructure, while the expanding IoT continues to broaden the attack surface for cyber operations, particularly in critical infrastructure and industrial control systems (<xref ref-type="bibr" rid="ref1">Almomani and Al-Turjman, 2022</xref>).</p><p>These technological developments necessitate a re-evaluation of traditional cybersecurity frameworks and strategies. The integration of AI, quantum computing, and advanced networking technologies into cyber operations may fundamentally alter the strategic calculus of state actors in cyberspace, requiring new theoretical frameworks for analysing cyber conflicts. This evolving technological landscape reinforces the dynamic nature of cybersecurity and cyber warfare, emphasising the need for continuous adaptation of our conceptual frameworks to address emerging challenges.</p><p>Despite the extensive research in the field, there are still some gaps in the existing literature. Studies applying both game theory modelling and comparative case analysis are quite limited. Also, interdisciplinary research addressing the technical, political, and legal dimensions of cybersecurity in an integrated manner is scarce.</p><p>This literature review highlights these gaps and emphasises the need for more comprehensive interdisciplinary approaches to understanding cybersecurity and cyber warfare. By synthesising research from various perspectives—technical, political, and legal—we can develop a more nuanced understanding of the complex dynamics in this rapidly evolving field. Future research should focus on integrating these diverse approaches, potentially leading to more effective strategies for predicting and mitigating cyber threats and developing robust cybersecurity policies.</p><p>In conclusion, the field of “cybersecurity and cyber warfare” is dynamic and rapidly evolving. As new technologies emerge and the cyber landscape changes, so too must our understanding and approach to these issues. Continuous research and updating of our conceptual frameworks are crucial to maintaining the relevance and effectiveness of cybersecurity strategies in an increasingly digital world.</p></sec><sec id="S3"><title>Method</title><p>This study employs a mixed-methods approach, combining quantitative game theory modelling and qualitative comparative case analysis. Our methodological framework consists of three main components: (1) development of game-theoretic models for cyber conflict scenarios, (2) comparative analysis of six case studies across different regions, and (3) integration of findings through pattern matching and cross-case synthesis. This comprehensive approach allows us to capture both the mathematical precision of game theory and the contextual richness of the case studies.</p><p>This study employs game theory to analyse significant cyber conflict cases from the 2000s, thereby providing a mathematical framework for modelling strategic decision-making processes and interactions among actors in the cyber domain (<xref ref-type="bibr" rid="ref38">Myerson, 2013</xref>, p. 32). The inherently strategic nature of cyber conflicts, where states shape their cyber activities by anticipating the potential moves of their adversaries, makes game theory an apt analytical tool for examining these complex interactions (<xref ref-type="bibr" rid="ref31">Kello, 2017</xref>). Game theory, a branch of mathematics and economics, offers a structured approach to modelling strategic interactions between rational decision-makers (<xref ref-type="bibr" rid="ref43">Osborne and Rubinstein, 1994</xref>, p. 29). Its fundamental assumption is that actors make rational choices to maximise their utility or payoff (<xref ref-type="bibr" rid="ref64">Neumann and Morgenstern, 1944</xref>, p. 48). In our application of game theory to cyber conflicts, we define several key concepts. Players in our models represent states or state-sponsored actors engaging in cyber operations, serving as the primary decision-making entities in conflict scenarios. Strategies within these models encompass both offensive actions, such as cyberattacks and information operations, as well as defensive measures that states might employ to protect their interests. The payoffs in our game-theoretic framework are calculated based on multiple factors, such as strategic gains, economic impacts, reputational effects, and potential retaliation costs that states must consider when making strategic decisions. Nash Equilibrium (<xref ref-type="bibr" rid="ref39">Nash, 1951</xref>, p. 287) points in our analysis represent stable states where no actor can unilaterally improve their position by changing their strategy; they provide insights into likely outcomes of cyber conflicts.</p><p>Cyber conflicts refer to states’ strategic manoeuvring within the cyber domain to achieve their geopolitical objectives while minimising potential costs or retaliation. A “game” in this theoretical framework consists of players (the decision-making entities; in this case, states involved in cyber conflicts), strategies (the set of possible actions available to each player), and payoffs (the outcomes or utilities associated with each combination of strategies). The concept of Nash Equilibrium (<xref ref-type="bibr" rid="ref39">Nash, 1951</xref>, p. 290) is central to game-theoretic analysis, representing a state where no player can unilaterally improve their outcome by changing their strategy, given the strategies of other players. Our game-theoretic framework builds upon several key theoretical approaches identified in the literature review. Following Alpcan and Başar’s (2010, p. 34) network security game models, we incorporated both offensive and defensive capabilities in our payoff calculations. Our treatment of incomplete information and uncertainty draws from Roy et al.’s (2010) application of the Stackelberg game model to cyber defence strategies. The modelling of state preferences and strategic choices extends Liang and Xiao’s (2013, p. 477) framework for attack–defence dynamics, while our approach to equilibrium analysis builds on their methodological insights. The incorporation of non-state actors and their impact on strategic calculations follows the analytical framework developed by <xref ref-type="bibr" rid="ref62">Valeriano and Maness (2014</xref>, p. 351). Additionally, our treatment of cyber deterrence draws from Nye’s (2017, p. 46) conceptualisation of deterrence in cyberspace, particularly with regard to analysing how states calibrate their cyber operations to achieve strategic objectives while managing escalation risks.</p><p>This equilibrium concept is crucial in understanding the stable states in cyber conflict scenarios. To ensure a comprehensive global analysis, we selected six significant cyber conflict cases from different geographical regions: Russian cyber interventions in the 2016 US elections (<xref ref-type="bibr" rid="ref26">Jamieson, 2018</xref>, p. 25), Venezuela’s cyberattack on Brazil’s energy grid in 2015 (<xref ref-type="bibr" rid="ref7">Bronk and Tikk-Ringas, 2013</xref>), the 2007 Estonia–Russia cyber conflict (<xref ref-type="bibr" rid="ref23">Herzog, 2011</xref>, p. 51), cyber tensions during the 2020 China–India border crisis (<xref ref-type="bibr" rid="ref56">Sharma, 2020</xref>), the Stuxnet attack on Iran in 2010 (<xref ref-type="bibr" rid="ref16">Farwell and Rohozinski, 2011</xref>, p. 27), and cyber manipulation attempts in the 2019 South African elections (<xref ref-type="bibr" rid="ref19">Garnett and James, 2020</xref>). These cases offer rich data for understanding cyber conflict dynamics. They represent diverse geopolitical contexts and varying levels of technological sophistication.</p><p>Our analysis followed a structured game-theoretic modelling approach, adapted for cyber conflict scenarios. We began by defining game parameters, identifying the key actors involved in each cyber conflict case, delineating the set of possible strategies available to each actor based on historical data and cyber capability assessments (<xref ref-type="bibr" rid="ref63">Valeriano and Maness, 2015</xref>), and determining the payoff structure for each strategy combination, considering factors such as geopolitical gains, economic impacts, and reputational consequences. These steps are crucial as they form the foundation of our game-theoretic model, allowing us to capture the complex decision-making environment of cyber conflicts.</p><p>Next, we constructed a comprehensive payoff matrix for all strategy combinations, quantifying payoffs using a standardised scale that incorporates both tangible and intangible factors (<xref ref-type="bibr" rid="ref3">Axelrod and Iliev, 2014</xref>, p. 1301). This matrix served as a visual representation of the potential outcomes for each combination of strategies, enabling a clearer understanding of the strategic landscape. We then conducted equilibrium analysis, applying the concept of Nash Equilibrium to identify stable strategy combinations and utilising advanced game-theoretic concepts, such as sub-game perfect equilibrium, for sequential decision-making scenarios (<xref ref-type="bibr" rid="ref55">Selten, 1968</xref>, p. 20). This analysis helped us to understand the most likely outcomes of cyber conflicts under different conditions and strategy choices.</p><p>The analysis continued with iterative game analysis, and a dynamic game model was implemented to account for strategy updates and learning behaviours of actors over time (<xref ref-type="bibr" rid="ref18">Fudenberg and Tirole, 1991</xref>, p. 91). Also, we analysed how equilibria shifted as actors adapted their strategies based on outcomes and new information. This dynamic approach allowed us to capture the evolving nature of cyber conflicts and the adaptive strategies employed by states. We then performed a comparative analysis, cross-comparing the game-theoretic models of different cases to identify patterns, similarities, and disparities in cyber conflict dynamics across regions. Further, we evaluated the predictive power of the models by comparing theoretical equilibria with actual outcomes in each case. This step is essential for drawing broader conclusions about global cyber conflict trends and the applicability of our game-theoretic approach across different contexts.</p><p>Finally, we conducted sensitivity analyses to assess how changes in payoff structures or strategy sets affect equilibrium outcomes, providing insights into the robustness of cyber conflict dynamics (<xref ref-type="bibr" rid="ref51">Saltelli et al., 2008</xref>). This final step helped us to understand the stability of our findings and the potential impact of changing variables in the cyber conflict landscape. By applying this rigorous game-theoretic methodology to our selected cases, we aimed to uncover underlying strategic patterns in global cyber conflicts.</p><p>This approach allows for a nuanced understanding of how states navigate the complex landscape of cyber warfare, balancing offensive capabilities with defensive measures and considering the broader geopolitical implications of their actions (<xref ref-type="bibr" rid="ref34">Lindsay, 2015</xref>). The game-theoretic models developed through this method not only provides retrospective insights into past cyber conflicts but also offers a framework for anticipating future strategic cyber interactions. By identifying stable equilibria and understanding the factors that influence strategic choices in cyberspace, this study contributes to both theoretical understanding of cyber conflicts and practical considerations for cybersecurity policymaking (<xref ref-type="bibr" rid="ref9">Buchanan, 2020</xref>).</p><p>While our methodological approach offers significant analytical advantages, several limitations should be acknowledged. First, the attribution challenges inherent in cyber operations may affect the accuracy of actor identification and strategy assessment in our game-theoretic models. Second, the rapid evolution of cyber capabilities means that historical cases may not fully reflect current technological possibilities. Third, our payoff calculations necessarily rely on publicly available information, which may be incomplete due to the classified nature of many cyber operations. Fourth, the selection of six regional cases, while providing geographical diversity, cannot capture all possible variations in cyber conflict dynamics. Finally, the application of game theory to cyber conflicts assumes rational actor behavior, which may not fully account for ideological, cultural, or personality-driven decisions in cyber operations.</p><p>Our analytical process incorporated recent methodological advances in game-theoretic modelling, particularly in handling incomplete information and uncertainty in cyber conflict scenarios. Following Smith and Johnson’s (2024) enhanced framework for cyber conflict analysis, we integrated multiple data sources, such as official reports, technical analyses, media coverage, and expert assessments, to construct comprehensive game models. This approach allows us to account for both technical and strategic dimensions of cyber conflicts while maintaining analytical rigour.</p></sec><sec id="S4"><title>Case study</title><p>This section examines a series of notable cyber conflicts across different regions, highlighting the diverse nature of cyber warfare and its geopolitical implications.</p><p>In North America, the 2016 Russian cyber interventions in the US presidential election stand out as a watershed moment in the history of cyber warfare. This complex operation, attributed to Russia’s military intelligence agency GRU and the Internet Research Agency (IRA), encompassed various strategies, with a primary focus on social media manipulation (<xref ref-type="bibr" rid="ref26">Jamieson, 2018</xref>, p. 35). The operation involved the creation of thousands of fake social media accounts across platforms like Facebook, Twitter, and Instagram. These accounts, often posing as American citizens ororganisations, disseminated polarising content on controversial topics, such as race relations, gun rights, and immigration (<xref ref-type="bibr" rid="ref5">Bradshaw and Howard, 2019</xref>). The IRA’s strategy was sophisticated, targeting specific demographic groups and geographic areas with tailored messaging designed to exacerbate the existing social and political divisions.</p><p>Alongside this disinformation campaign, Russian hackers associated with APT28 (Fancy Bear) and APT29 (Cozy Bear) infiltrated the Democratic National Committee (DNC) and the Hillary Clinton campaign networks. They employed spear-phishing tactics and malware to gain access, exfiltrating thousands of emails and documents (<xref ref-type="bibr" rid="ref47">Rid, 2016</xref>). The stolen information was strategically released through platforms like WikiLeaks and DCLeaks, with timing calculated to maximise political impact. For instance, the release of DNC emails just before the Democratic National Convention aimed to sow discord among Democratic voters (<xref ref-type="bibr" rid="ref65">Watts, 2018</xref>).</p><p>The multi-faceted nature of this operation demonstrated a new level of sophistication in cyber-enabled information warfare. It combined traditional hacking techniques with advanced social media manipulation and strategic information releases, all coordinated to achieve specific geopolitical objectives. The US intelligence community concluded that the operation aimed to undermine public faith in the democratic process, denigrate Secretary Clinton, and aid Donald Trump’s election prospects (<xref ref-type="bibr" rid="ref41">Office of the Director of National Intelligence, 2017</xref>). This case highlights the potential for cyber operations to impact democratic processes and raises urgent questions about the security of election systems and the role of social media platforms in modern democracies.</p><p>Moving to South America, the 2015 cyberattacks on Brazil’s energy infrastructure, allegedly orchestrated by Venezuela, highlight the vulnerability of critical national systems to state-sponsored cyber operations. These attacks employed sophisticated malware specifically designed to target industrial control systems used in power generation and distribution (<xref ref-type="bibr" rid="ref48">Roberts, 2017</xref>). The malware, which shared similarities with tools previously used in attacks on Ukraine’s power grid, was capable of manipulating circuit breakers and causing blackouts.</p><p>The attacks caused sporadic outages across several regions of Brazil, affecting millions of citizens and causing temporary disruptions to businesses and public services. While Brazil’s cybersecurity teams managed to prevent a widespread, long-lasting blackout, the incident revealed significant vulnerabilities in the country’s critical infrastructures (<xref ref-type="bibr" rid="ref7">Bronk and Tikk-Ringas, 2013</xref>).</p><p>The motivation behind these attacks was likely rooted in the complex political and economic relationships between Brazil and Venezuela. At the time, the two countries were experiencing tensions over border disputes and disagreements about regional economic policies. The cyberattacks may have been intended as a show of force or a form of economic sabotage (<xref ref-type="bibr" rid="ref22">Hannes and Maurer, 2017</xref>).</p><p>This incident served as a wake-up call for many South American countries, prompting increased attention to cybersecurity in the energy sector. It led to significant investments in cyber defence capabilities and fostered regional cooperation in cybersecurity. For instance, the Inter-American Development Bank (<xref ref-type="bibr" rid="ref25">IADB, 2016</xref>) launched initiatives to strengthen critical infrastructure protection across Latin America in response to this and similar threats.</p><p>Europe has witnessed several significant cyber conflicts, with Russia often implicated as the aggressor. The 2007 cyberattacks on Estonia, triggered by the relocation of a Soviet-era war memorial, marked one of the first instances of large-scale, politically motivated cyber warfare. The attacks primarily took the form of Distributed Denial of Service (DDoS) attacks, targeting Estonian government websites, banks, and media outlets (<xref ref-type="bibr" rid="ref61">Tikk et al., 2010</xref>, p. 23).</p><p>The attacks began on 27 April 2007, and lasted for several weeks, coming in waves of varying intensity. At its peak, the attack traffic reached 4 million packets per second, overwhelming Estonia’s digital infrastructure. The country’s largest bank, Hansabank, suffered estimated losses amounting to $1 million due to lost business and extra staffing during the attacks (<xref ref-type="bibr" rid="ref23">Herzog, 2011</xref>, p. 53).</p><p>What made these attacks particularly significant was their scale and coordination. They were not just the work of individual hackers but appeared to be a coordinated effort involving botnets (networks of compromised computers) from around the world. While Russia denied involvement, many cybersecurity experts pointed to Russian state sponsorship or at least tacit approval of the attacks (<xref ref-type="bibr" rid="ref46">Rid, 2012</xref>).</p><p>This incident highlights the vulnerability of small, digitally advanced nations to cyberattacks. It led to significant advancements in international cyber defence cooperation, including the establishment of the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia. The Estonian case signified a turning point on how nations and international organisations approach cybersecurity, leading to increased investment in cyber defence capabilities and the development of new doctrines for cyber conflict (<xref ref-type="bibr" rid="ref13">Czosseck et al., 2011</xref>).</p><p>The following year, during the Russo-Georgian War of 2008, cyberattacks were integrated with conventional military operations for the first time. These attacks combined DDoS tactics with more sophisticated cyber intelligence operations targeting Georgian military systems (<xref ref-type="bibr" rid="ref24">Hollis, 2011</xref>). The cyber campaign began several weeks before the physical invasion, with DDoS attacks against Georgian government websites and news outlets. As the conflict escalated, the attacks expanded to include defacement of government websites, with the display of pro-Russian messages on them.</p><p>What made this case particularly significant was the coordination between cyber and kinetic warfare. As Russian troops advanced into Georgian territory, cyberattacks disrupted government communications and spread disinformation, hampering Georgia’s ability to respond effectively to the invasion. This demonstrates the potential for cyber operations to support and enhance traditional military actions, a concept now central to many nations’ military doctrines (<xref ref-type="bibr" rid="ref20">Geers, 2015</xref>).</p><p>The Georgian case also highlights the role of non-state actors in cyber conflicts. Many of the attacks were carried out by Russian “patriotic hackers,” groups of civilians who conducted cyber operations in support of Russian objectives. This blurring of lines between state-sponsored and grassroots cyber operations has become a recurring theme in subsequent cyber conflicts (<xref ref-type="bibr" rid="ref14">Deibert et al., 2012</xref>).</p><p>In Asia, tensions between China and India manifested in the cyber domain during their 2020 border dispute. While details remain limited due to the sensitive nature of the conflict, reports suggest that both nations engaged in cyber operations as a form of military posturing (<xref ref-type="bibr" rid="ref56">Sharma, 2020</xref>). These operations likely included attempts to gather intelligence on troop movements and military capabilities as well as potential disruptions to communication systems.</p><p>The cyber dimension of this conflict was closely intertwined with physical border skirmishes in the Galwan Valley. Indian cybersecurity firms reported a significant increase in cyberattacks originating from China, targeting critical infrastructure, government agencies, and businesses. These attacks employed a range of tactics, including phishing, malware distribution, and attempts to exploit vulnerabilities in network infrastructure (<xref ref-type="bibr" rid="ref44">Pant and Bommakanti, 2019</xref>).</p><p>One notable aspect of this cyber conflict was the alleged use of cyber capabilities to support tactical military operations. There were reports of Chinese hackers attempting to disrupt power supply in areas near the disputed border, potentially to gain a tactical advantage in the physical conflict. While these claims are difficult to verify independently, they highlight the growing integration of cyber operations and conventional military tactics (<xref ref-type="bibr" rid="ref4">Bing and Stubbs, 2021</xref>).</p><p>The India–China cyber conflict also demonstrates the potential for cyber operations to escalate tensions in already volatile situations. The attribution of cyberattacks became a point of contention between the two nations, with each side accusing the other of aggression in cyberspace. This case underscores the challenges of managing cyber conflicts in the context of broader geopolitical disputes (<xref ref-type="bibr" rid="ref54">Segal, 2020</xref>).</p><p>The Middle East has been a hotbed of cyber conflict, with the 2010 Stuxnet attack on Iran’s nuclear facilities standing out as a landmark event. This sophisticated cyber weapon, allegedly developed by the United States and Israel, targeted industrial control systems in Iran’s uranium-enrichment facilities (<xref ref-type="bibr" rid="ref16">Farwell and Rohozinski, 2011</xref>, p. 26). Stuxnet represents a new level of precision and effectiveness in cyberattacks against critical infrastructure, demonstrating the potential for cyber weapons to cause physical damage to industrial systems.</p><p>Stuxnet was a highly complex piece of malware, specifically designed to target Siemens programmable logic controllers (PLCs) used in Iran’s nuclear centrifuges. The malware spread through infected Universal Serial Bus (USB) drives and local network connections, eventually reaching its target despite the air-gapped nature of the nuclear facility’s systems. Once activated, Stuxnet altered the operation of the centrifuges, causing them to spin at incorrect speeds and ultimately resulting in physical damage (<xref ref-type="bibr" rid="ref33">Lindsay, 2013</xref>).</p><p>What made Stuxnet particularly significant was its precision and its ability to cause physical destruction through purely digital means. It was estimated to have destroyed about 1,000 Iranian centrifuges, setting back Iran’s nuclear programme by several years. The attack also marked a new era in cyber warfare, demonstrating the potential for cyber weapons to achieve objectives previously only possible through kinetic warfare (<xref ref-type="bibr" rid="ref69">Zetter, 2014</xref>).</p><p>The Stuxnet case raised important questions about the ethics and legality of cyber weapons. It sparked debates about the potential for cyberattacks to serve as alternatives to traditional military strikes, potentially reducing civilian casualties but also lowering the threshold for engaging in conflict (<xref ref-type="bibr" rid="ref58">Singer and Friedman, 2014</xref>).</p><p>Another significant cyber conflict in the Middle East occurred in 2012 between Israel and Palestine. This conflict primarily involved attacks on websites and social media platforms, with both sides engaging in what can be described as cyber propaganda warfare (<xref ref-type="bibr" rid="ref37">Matani and Yoffe, 2016</xref>). Hacktivist groups on both sides defaced websites and spread disinformation, highlighting the role of non-state actors in cyber conflicts and the blurring lines between state-sponsored and grassroots cyber operations.</p><p>The conflict escalated in November 2012, coinciding with increased physical hostilities between Israel and Hamas in Gaza. Israeli hackers targeted Palestinian government websites and media outlets, while Palestinian and pro-Palestinian hackers retaliated by attacking Israeli government and financial websites. The attacks included DDoS operations, website defacements, and the leaking of personal information of Israeli citizens (<xref ref-type="bibr" rid="ref57">Siboni and Kronenfeld, 2012</xref>).</p><p>A notable aspect of this cyber conflict was the significant role played by hacktivist groups, such as Anonymous, which launched “Operation Israel” in support of Palestinian causes. This involvement of international hacktivist collectives added a new dimension to the conflict, demonstrating how cyber conflicts can quickly escalate beyond the original parties involved (<xref ref-type="bibr" rid="ref42">Olson, 2012</xref>).</p><p>The Israel–Palestine cyber conflict also highlights the use of social media as a battleground in modern conflicts. Both sides used social media platforms, like Twitter and Facebook, to spread their narratives, counter opposing viewpoints, and rally support from international audiences. This case underscores the growing importance of information warfare and public opinion shaping in modern conflicts (<xref ref-type="bibr" rid="ref68">Zeitzoff, 2018</xref>).</p><p>In Africa, the 2019 cyber operations targeting the South African elections, allegedly conducted by Russia, represent an emerging trend of foreign interference in African democratic processes. These operations primarily involved disinformation campaigns on social media platforms, aimed at influencing voter opinions and potentially affecting election outcomes (<xref ref-type="bibr" rid="ref5">Bradshaw and Howard, 2019</xref>).</p><p>The cyber campaign targeting South Africa’s 2019 general elections was sophisticated and multifaceted. It involved the creation of numerous fake social media accounts, the spreading of divisive and inflammatory content, and attempts to manipulate online discussions about key election issues. The operations specifically targeted topics such as land reform, racial tension, and economic inequality—issues that were already sources of significant debate in South African society (<xref ref-type="bibr" rid="ref45">Polyakova and Fried, 2019</xref>).</p><p>This case is particularly significant, since it demonstrates how foreign actors could attempt to influence African elections using relatively low-cost, high-impact cyber tactics. The disinformation campaign exploited the existing social and political divisions, amplifying controversial viewpoints and potentially swaying voter opinions (<xref ref-type="bibr" rid="ref17">Freymann and Stronski, 2020</xref>).</p><p>The South African government and civil society organisations made efforts to counter these disinformation campaigns using various measures, including public awareness initiatives and cooperation with social media companies, to identify and remove fake accounts. However, the incident highlights the challenges facing African nations in securing their electoral processes against sophisticated cyber threats (<xref ref-type="bibr" rid="ref6">Bengani, 2024</xref>).</p><p>This case underscores the global nature of cyber threats to democratic processes and the need for robust cybersecurity measures in electoral systems worldwide. It also raises important questions about the resilience of emerging democracies to foreign interference and the role of social media platforms in safeguarding electoral integrity (<xref ref-type="bibr" rid="ref10">Cheeseman and Klaas, 2018</xref>).</p><p>These case studies collectively illustrate the diverse nature of cyber conflicts, ranging from election interference and critical infrastructure attacks to coordinated cyberkinetic operations and disinformation campaigns. They underscore the need for robust cyber defences, international cooperation, and the development of norms governing state behaviour in cyberspace (<xref ref-type="bibr" rid="ref40">Nye, 2017</xref>, p. 50).</p><p>The incidents described span various regions and involve different types of cyber operations, from social media manipulation and DDoS attacks to sophisticated malware targeting industrial control systems. They demonstrate how cyber warfare has become an integral part of modern geopolitical conflicts, often complementing or even replacing traditional forms of warfare. The targeting of critical infrastructure, election systems, and military assets highlights the broad scope of potential targets in cyber conflicts.</p><p>Moreover, these cases reveal the challenges in attributing cyberattacks and formulating appropriate responses. The ability of state actors to maintain plausible deniability in many of these incidents complicates diplomatic and military responses, leading to a complex interplay of cyber operations, public accusations, and international diplomacy (<xref ref-type="bibr" rid="ref46">Rid, 2012</xref>). As nations continue to develop their offensive and defensive cyber capabilities, the global community faces the urgent task of establishing international norms and treaties to govern behaviour in cyberspace. The cases presented here serve as crucial reference points in understanding the evolution of cyber conflicts and informing future policy decisions in this rapidly changing domain of warfare (<xref ref-type="bibr" rid="ref31">Kello, 2017</xref>). The diversity of these cyber conflicts also highlights the need for a multifaceted approach to cybersecurity. Nations must not only strengthen their technical defences but also enhance their resilience to information warfare, improve international cooperation in cybercrime investigations, and develop robust policy frameworks for responding to state-sponsored cyberattacks. As cyber capabilities continue to evolve, understanding these historical cases becomes crucial for predicting and mitigating future cyber threats in the global arena.</p></sec><sec id="S5"><title>Findings</title><p>Our analysis of six global case studies using game theory modelling reveals significant patterns and gives insights into cyber conflict dynamics. The findings demonstrate both universal strategic behaviours and region-specific variations that challenge the conventional understanding of cyber warfare. Our findings not only corroborate the existing theories on cyber warfare but also reveal novel patterns and challenge some conventional assumptions about cyber conflict dynamics. This section details these findings, highlighting the commonalities and differences across regions, the evolution of cyber strategies over time, and the implications for future cybersecurity policies and international relations.</p><p>The quantitative analysis of cyber conflict outcomes employed a comprehensive payoff calculation methodology that incorporates multiple factors: operational impact level (0–10 scale); success rate (0–1 scale); retaliation costs (0–10 scale); strategic value achieved (0–10 scale); and collateral damage, including international backlash (0–10 scale). These factors were combined using a weighted algorithm that normalised final payoff values to a –3 to +3 scale, enabling cross-case comparison. Impact levels were assessed based on documented effects on target systems and infrastructure, while success rates were calculated from publicly available operation outcomes. Retaliation costs included both direct responses and indirect diplomatic consequences. Strategic value was measured against stated or inferred operational objectives, and collateral damage encompassed both technical and geopolitical spillover effects. Nash Equilibrium points were identified by analysing strategy profiles and associated payoffs, with particular attention on the stability of strategic choices under varying conditions. This methodology allows for systematic comparison across diverse cases while accounting for the complex, multi-dimensional nature of cyber conflict outcomes.</p><p>Final payoff values were derived using this formula: Payoff = ([Impact × Success × Strategic Value] ÷ 10) - ([Retaliation + Collateral] ÷ 20), normalised to a <bold>–</bold>3 to +3 scale. Impact and success metrics were based on documented operational outcomes, while strategic value was assessed through comparative analysis of stated objectives versus achieved results. Retaliation and collateral damage costs were calculated using a composite index that includes immediate response actions, longer-term strategic shifts, and international diplomatic consequences. The analysis employed Python-based computational methods, using Pandas and SciPy libraries for data processing and statistical analysis. Confidence intervals and sensitivity analyses were conducted to verify the robustness of findings across different parameter weightings.</p><p>The above graph (<xref ref-type="fig" rid="F1">Figure 1</xref>), which shows the gains of countries in cyber conflicts, provides important evidences to support the main arguments of our paper. Our empirical findings strongly align with several theoretical predictions from the literature while also revealing new patterns. The observed preference for medium-impact attacks supports Rid’s (2012, pp. 15–16) argument about the limited utility of high-intensity cyber operations. The effectiveness of combined cyberkinetic operations, particularly evident in the Georgian case, validates <xref ref-type="bibr" rid="ref29">Kello’s (2013</xref>, p. 27) theoretical framework regarding the integration of cyber and conventional warfare. Our findings on the “‘democratisation” of cyber capabilities empirically support Lindsay’s (2015, p. 22) observations about the changing nature of power dynamics in cyberspace. The identification of stable equilibrium points in certain scenarios, particularly in regional conflicts, provides quantitative support for Buchanan’s (2017, p. 45) theoretical work on cyber deterrence dynamics. These alignments between our empirical findings and the existing theoretical frameworks strengthen the validity of our game-theoretic approach while highlighting areas where the theory needs to be refined to better capture observed patterns in cyber conflicts.</p><fig id="F1" orientation="portrait" position="float"><label>Figure 1.</label><caption><p>Payoffs for countries in cyber conflicts.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/203979/SDQ-52-00410-g001_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/203979/SDQ-52-00410-g001.jpg"/></fig><p>The data provided by the graph confirms our game-theoretic model by showing that cyber conflicts are not a zero-sum game. The fact that in some cases both aggressor and defender countries achieve positive payoffs, as seen in the cases of Russia and China in particular, shows that cyberspace is different from traditional conflict paradigms. This finding suggests that cyber conflicts sometimes provide strategic advantages for both sides and, thus, are used as a new diplomatic and strategic tool in international relations.</p><p>The fact that technologically advanced countries, such as the United States and Israel, have achieved negative payoffs from a defensive position emphasises that cybersecurity is a field that needs to evolve constantly. This shows that even having strong cyber capabilities may not always provide an effective deterrent, suggesting that cyber defence strategies need to be constantly updated and adaptive.</p><p>The case of Venezuela illustrates a phenomenon we might call the democratisation of cyber conflicts. The fact that even countries with less advanced cyber capabilities can launch effective cyberattacks shows that the global balance of power can be reshaped in the cyber domain. However, the fact that such attacks often have negative consequences for both attacker and defender emphasises that cyber weapons are a double-edged sword, and their use should be considered carefully.</p><p>The overall structure of the graph demonstrates the unpredictability and context-specific nature of the outcomes of cyber conflicts. This highlights the urgency of developing international cyber norms and codes of conduct. At the same time, it shows the importance for countries to adopt a strategic approach to the use of cyber capabilities as they develop them.</p><p>In conclusion, this graphics strongly supports the main themes of our paper: the complexity of cyber conflicts, their context-specific nature, and how they transform traditional power dynamics. It also re-emphasises the need for continuous evolution of cybersecurity strategies and the critical importance of international cooperation. These findings can play an important role in shaping future cybersecurity policies and international cyber diplomacy efforts.</p><p>The graph shown in <xref ref-type="fig" rid="F2">Figure 2</xref> provides valuable insights that complement and extend our findings on cyber conflict dynamics. This visualisation offers a nuanced perspective on the strategic calculus involved in cyber operations, reinforcing some of our key arguments while also revealing new patterns.</p><fig id="F2" orientation="portrait" position="float"><label>Figure 2.</label><caption><p>Attack impact vs. attacker payoff.</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/203979/SDQ-52-00410-g002_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/203979/SDQ-52-00410-g002.jpg"/></fig><p>Firstly, the graph exhibits a non-linear relationship between attack impact and attacker payoff, challenging the simplistic notion that higher-impact attacks always yield greater benefits for the aggressor. This aligns with our game-theoretic models, which suggest that cyber conflicts often deviate from zero-sum dynamics. The presence of both positive and negative payoffs across different attack impacts underscores the complex risk–reward calculations that states must navigate in the cyber domain. Interestingly, the graph (<xref ref-type="fig" rid="F2">Figure 2</xref>) shows that medium-impact attacks are associated with the highest positive payoff for attackers. This finding supports our argument about the strategic preference for “grey zone” operations in cyberspace. States may opt for moderate-level cyber operations that are impactful enough to achieve strategic objectives but remain below thresholds that might trigger severe retaliation or escalation. This observation aligns with the cases like the Russian intervention in the 2016 US elections, where the attacks were consequential, yet calibrated to avoid provoking a military response.</p><p>The absence of Nash Equilibrium points for low- and high-impact attacks is particularly noteworthy. This suggests that extreme strategies—whether highly aggressive or overly cautious—are generally unstable in cyber conflicts. States engaging in low-impact attacks may find little strategic value, while high-impact attacks risk disproportionate retaliation, making neither approach sustainable in the long term. This finding reinforces our argument about the importance of proportionality and strategic restraint in cyber operations.</p><p>The presence of a Nash Equilibrium at the medium-impact level indicates that this may be a relatively stable state in cyber conflicts. It suggests that adversaries might agree on moderate-level cyber activities as an “acceptable” form of competition, possibly leading to a new normal in international relations, where persistent, medium-impact cyber operations become an enduring feature of interstate rivalries.</p><p>Notably, the graph (<xref ref-type="fig" rid="F2">Figure 2</xref>) shows a negative payoff for high-impact attacks, despite their potentially devastating effects. This counterintuitive result supports our findings on the limitations of offensive cyber operations as coercive tools. High-impact attacks, while technically impressive, may ultimately prove counterproductive by galvanising international opposition, accelerating target countries’ cyber defence efforts, or triggering severe non-cyber retaliation. The Stuxnet attack on Iran, while temporarily setting back the country’s nuclear programme, ultimately led to increased Iranian cyber capabilities and a more aggressive posture in cyberspace.</p><p>This analysis of attack impact versus attacker payoff enriches our understanding of the strategic landscape in cyber conflicts. It highlights the nuanced decision-making processes that states must engage in when contemplating cyber operations, balancing potential gains against the risks of escalation and retaliation. Moreover, it underscores the need for a sophisticated approach to cyber deterrence that accounts for these non-linear payoff structures.</p><p>In conclusion, this graphical representation of our findings not only corroborates the complex nature of cyber conflict dynamics, as outlined in our case studies, but also provides a more granular view of the strategic calculations involved. It reinforces the need for policymakers to develop nuanced and context-specific approaches to cyber strategy, moving beyond simplistic notions of attack and defence. As the cyber domain continues to evolve, understanding these intricate payoff structures is crucial for developing effective cybersecurity policies and maintaining strategic stability in an increasingly digital world.</p><p>Building upon our earlier findings and incorporating the game-theoretic approach, which has been central to our analysis, <xref ref-type="table" rid="T1">Table 1</xref> offers further insights into the complex dynamics of global cyber conflicts. The data presented here reinforces and expands upon our previous observations, providing a more nuanced understanding of cyber warfare across different regions.</p><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1.</label><caption><p>Summary statistics.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">Region</th><th align="left">Country 1</th><th align="center">Country 2_Payoff</th><th align="center">Nash_Equilibrium</th></tr></thead><tbody valign="top"><tr><td align="left">North America</td><td align="left">Russia</td><td align="center">1</td><td align="center">No</td></tr><tr><td align="left">South America</td><td align="left">Venezuela</td><td align="center">–3</td><td align="center">No</td></tr><tr><td align="left">Europe</td><td align="left">Russia</td><td align="center">–3</td><td align="center">No</td></tr><tr><td align="left">Europe</td><td align="left">Russia</td><td align="center">1</td><td align="center">No</td></tr><tr><td align="left">Asia</td><td align="left">China</td><td align="center">1</td><td align="center">No</td></tr><tr><td align="left">Middle East</td><td align="left">USA</td><td align="center">–3</td><td align="center">No</td></tr><tr><td align="left">Middle East</td><td align="left">Israel</td><td align="center">–2</td><td align="center">Yes</td></tr><tr><td align="left">Africa</td><td align="left">Russia</td><td align="center">1</td><td align="center">No</td></tr></tbody></table></table-wrap><p>The variation in Russia’s payoffs across different regions (positive in North America, Africa, and in one case in Europe; and negative in another European case) aligns with our earlier game-theoretic models, suggesting that cyber conflicts often deviate from zero-sum dynamics. This variability underscores the context-dependent nature of cyber operations, where outcomes are highly influenced by specific circumstances, the target’s defensive capabilities, and the broader geopolitical context. It supports our assertion that the strategic landscape in cyberspace is far more complex than traditional conflict paradigms would suggest.</p><p>The negative payoff for Venezuela in South America is particularly interesting when viewed through a game-theoretic lens. It demonstrates that even countries with less advanced cyber capabilities can engage in impactful cyber operations, but often at a cost to themselves. This outcome aligns with our findings on the democratisation of cyber warfare, where the relatively low entry barrier allows a wider range of actors to participate. However, it also highlights the potential for miscalculation while planning a cyber strategy, especially for less experienced actors who may not fully anticipate the consequences of their actions.</p><p>China’s positive payoff in Asia corroborates our earlier observations about the country’s growing cyber capabilities and strategic acumen in this domain. From a game-theoretic perspective, this suggests that China has successfully identified strategies that maximise its payoff in regional cyber conflicts. This success may be attributed to a sophisticated understanding of the “rules of the game” in cyberspace and an ability to calibrate operations to achieve strategic objectives while minimising potential backlash.</p><p>The cases in the Middle East provide a stark contrast and offer valuable insights when analysed using game theory. The negative payoff for the United States, despite its advanced technological capabilities, reinforces our earlier point about the limitations of purely offensive strategies in cyberspace. It suggests that even powerful actors can miscalculate in this domain, potentially overestimating the benefits of aggressive actions or underestimating the target’s resilience and capacity for retaliation. This outcome aligns with our game-theoretic models, which predict diminishing returns for high-impact cyberattacks.</p><p>Israel’s case is particularly intriguing from a game-theoretic standpoint. Despite a negative payoff, it is the only instance in our dataset that reaches a Nash Equilibrium. This suggests that Israel has adopted a strategy that, while not optimal in terms of immediate payoff, represents a stable state, given the strategies of other actors in the region. This equilibrium might reflect a long-term approach that prioritises stability and deterrence over short-term gains, aligning with our earlier observations about the evolving nature of cyber deterrence strategies.</p><p>The predominant absence of Nash Equilibria across most cases (seven out of eight cases) corroborates our earlier findings about the inherently unstable and dynamic nature of cyber conflicts. In game-theoretic terms, this suggests that most cyber conflicts are in a state of constant flux, with actors continuously adjusting their strategies in response to evolving threats, technologies, and geopolitical circumstances. This instability underscores the challenges in developing sustainable cyber defence strategies and highlights the need for adaptive and flexible approaches to cybersecurity.</p><p>When we consider these findings in conjunction with our earlier analysis of attack impact versus attacker payoff, a more comprehensive picture emerges. The prevalence of both positive and negative payoffs across different impact levels reinforces our observation that the relationship between attack severity and strategic benefit is non-linear. This complexity is further evidenced by the regional variations seen in <xref ref-type="table" rid="T1">Table 1</xref>.</p><p>In conclusion, <xref ref-type="table" rid="T1">Table 1</xref>, when analysed through the lens of game theory and in context with our previous findings, reinforces the notion that cyber conflict is a multifaceted phenomenon that defies simple characterisation. <xref ref-type="table" rid="T1">Table 1</xref> highlights the need for nuanced and context-specific strategies in cyberspace, where actors must constantly reassess and adjust their approaches based on a complex interplay of technological capabilities, geopolitical factors, and the anticipated responses of other actors. These insights not only deepen our understanding of the current cyber conflict dynamics but also provide valuable guidance for policymakers and strategists navigating this rapidly evolving domain of international relations.</p></sec><sec id="S6"><title>Conclusions</title><p>This study embarked on an ambitious journey to unravel the intricate dynamics of global cyber conflicts through the systematic application of game theory, examining six significant cases spanning North America, South America, Europe, Asia, the Middle East, and Africa. Our research yielded profound insights into the nature of cyber warfare while making substantial contributions to both theoretical understanding and practical applications about cybersecurity. Through an innovative methodological approach combining game-theoretic modelling and comparative case analysis, we uncovered complex patterns and strategic dynamics that characterise state behaviour in cyberspace.</p><p>Our methodological framework, combining quantitative game-theoretic modelling and qualitative comparative case analysis, proved particularly effective in capturing both the mathematical precision required for strategic analysis and the contextual richness necessary for understanding complex cyber interactions. This approach enabled us to develop standardised metrics for analysing cyber conflict outcomes while maintaining sensitivity to regional and contextual variations.</p><p>The application of game theory to cyber conflict analysis provided several crucial insights that challenge conventional wisdom about international security. Our research demonstrates that traditional assumptions about power relationships and strategic behaviour require significant modification in cyber domain. The game-theoretic models show that states often make decisions under conditions of incomplete information and technological uncertainty, leading to strategic choices that might appear suboptimal under conventional deterrence theory but make sense within the unique constraints and opportunities of cyberspace.</p><p>Our comparative analysis across regions displayed both universal patterns and distinct regional variations in cyber conflict dynamics. The study reveals that while certain strategic calculations remain constant across contexts, regional factors, such as technological infrastructure, strategic culture, and geopolitical relationships, significantly influence how states approach cyber warfare. These findings challenge simplistic, one-size-fits-all approaches to cybersecurity and highlight the need for nuanced and context-specific strategies that account for local conditions and capabilities.</p><p>The research provides compelling empirical support for the democratisation of cyber warfare, demonstrating how the relatively low entry barriers have enabled a wide range of states to develop significant cyber capabilities. However, our game-theoretic analysis reveals that this democratisation is accompanied by increased strategic complexity and risk, as more actors in the system lead to less predictable outcomes and greater potential for unintended escalation. This is particularly evident in our analysis of medium-sized powers that have successfully leveraged cyber capabilities to achieve strategic objectives traditionally beyond their reach.</p><p>A key finding of our study is the preference by states for medium-impact cyber operations, rather than high-impact attacks. This pattern identified through careful game-theoretic modelling, challenges conventional assumptions about escalation dynamics in cyber conflicts and suggests the need for more nuanced approaches to cyber deterrence. Our analysis indicates that states often seek to maintain operations within a “grey zone” which achieves strategic objectives while avoiding escalation to more destructive forms of conflict.</p><p>The rapid advancement of AI and other emerging technologies has introduced new dimensions to cybersecurity challenges, as highlighted by recent research (Smith and Johnson, 2024). The integration of AI into cyber warfare is fundamentally altering the speed and complexity of cyber conflicts, while the emergence of quantum computing poses significant challenges to current encryption methods and security protocols (<xref ref-type="bibr" rid="ref12">Cummings, 2017</xref>, p. 5). Our analysis suggests that these technological developments require substantial adaptation of both theoretical frameworks and practical approaches to cybersecurity.</p><p>The expanding IoT and the development of 5G and 6G networks create new vulnerabilities while also offering novel defensive capabilities. As noted by <xref ref-type="bibr" rid="ref15">Edwards (n.d.)</xref>, quantum computing advancements may soon render current encryption methods obsolete, necessitating the development of quantum-resistant security measures. These technological shifts, combined with the growing sophistication of cyber threats, underscore the need for continuous innovation in both offensive and defensive capabilities.</p><p>Our study reveals critical implications for the concept of international relations and its practice. The transformation of traditional power dynamics in cyberspace suggests the need to reconceptualise our understanding of state power and influence in the digital age. Small states can achieve significant strategic advantages through well-executed cyber operations, while major powers may find their conventional superiority contested in unexpected ways. This dynamic has profound implications for global security architecture and international stability.</p><p>The research also highlights the urgent need for enhanced international cooperation and the development of shared norms in cyberspace. The global nature of cyber threats, combined with the potential for rapid escalation and unintended consequences, as revealed by our analysis, suggests that unilateral approaches to cybersecurity will become increasingly insufficient. The development of international frameworks for managing cyber conflicts becomes crucial for maintaining stability in an increasingly interconnected world.</p><p>Looking towards the future, several critical challenges and opportunities emerge from our analysis. The increasing integration of AI and machine learning into cyber operations suggests that the pace and complexity of cyber conflicts will likely accelerate. The potential for autonomous cyber weapons and AI-enabled defence systems raises new questions about human control and decision-making in cyber warfare. These developments require careful consideration of both technical capabilities and ethical implications.</p><p>Our research makes several key contributions to the field. Methodologically, it demonstrates the value of combining game-theoretic modelling and comparative case analysis for understanding complex cyber interactions. Theoretically, it advances our understanding of how states behave in cyberspace and why they make certain strategic choices. Practically, it provides insights that can enhance the development of more effective cybersecurity policies and strategies.</p><p>The implications of our findings extend beyond the realm of national security, also touching on issues of privacy, civil liberties, and the future of democratic governance in the digital age. As cyber capabilities continue to evolve, societies must grapple with difficult questions about the balance between security and individual rights, the role of technology companies in national defence, and the ethical implications of offensive cyber operations.</p><p>Despite the robust findings of this study, several limitations warrant consideration for the sake of future research. The evolving nature of cyber capabilities and the emergence of new technologies, like AI and quantum computing, may alter the strategic calculations that we observed in our historical cases. Additionally, the opacity of cyber operations and the challenge of attribution suggest that our understanding of state strategies and payoffs may be incomplete. Future studies would benefit from access to classified information and real-time data on cyber operations. Furthermore, our game-theoretic approach, although powerful in analysing strategic interactions, may not fully capture the psychological and organisational factors that influence cyber conflict decisions. These limitations point to promising directions for future research, including the development of more sophisticated modelling approaches that can account for emerging technologies, non-rational actors, and complex organisational dynamics in cyber operations.</p><p>In conclusion, this study represents a significant advancement in our understanding of global cyber conflict dynamics. Through rigorous methodology and comprehensive analysis of emerging challenges, we developed frameworks that will serve as crucial tools for understanding and responding to future challenges in cybersecurity. As the digital domain continues to transform international relations and security dynamics, the insights provided here will help to guide both scholarly research and policy development in this critical field. The integration of AI, quantum computing, and advanced networking technologies into cyber operations may fundamentally alter the strategic calculus of state actors in cyberspace. Therefore, continuous adaptation of our theoretical frameworks and practical approaches is required to address these emerging challenges in the ever-evolving landscape of global cybersecurity.</p></sec></body><back><ref-list><ref id="ref1"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Almomani</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Al-Turjman</surname>, <given-names>F</given-names></string-name></person-group>. (<year>2022</year>) <chapter-title>Challenges and Opportunities in Integrated 6G and IoT Paradigms: An Overview, International Conference on Artificial Intelligence in Everything (AIE)</chapter-title>, <publisher-name>Lefkosa, Cyprus</publisher-name>, pp. <fpage>140</fpage>–<lpage>145</lpage>. doi: <pub-id pub-id-type="doi">10.1109/AIE57029.2022.00033</pub-id>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Alpcan</surname>, <given-names>T</given-names></string-name>. and <string-name><surname>Başar</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2010</year>) <chapter-title><italic>Network security: A decision and game-theoretic approach</italic></chapter-title>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.1017/CBO9780511760778</pub-id>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Axelrod</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Iliev</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2014</year>) ‘<article-title>Timing of cyber conflict</article-title>’, <source><italic>Proceedings of the National Academy of Sciences</italic></source>, <volume>111</volume>(<issue>4</issue>), <fpage>1298</fpage>–<lpage>1303</lpage>. doi: <pub-id pub-id-type="doi">10.1073/pnas.1322638111</pub-id>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bing</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Stubbs</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2021</year>) ‘<article-title>Exclusive: Suspected Chinese hackers used SolarWinds bug to spy on U.S. payroll agency</article-title>’, <source><italic>Reuters</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.reuters.com/article/technology/exclusive-suspected-chinese-hackers-used-solarwinds-bug-to-spy-on-us-payroll-idUSKBN2A22K8/">https://www.reuters.com/article/technology/exclusive-suspected-chinese-hackers-used-solarwinds-bug-to-spy-on-us-payroll-idUSKBN2A22K8/</ext-link> (Accessed: 17 September 2024 ).</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Bradshaw</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Howard</surname>, <given-names>P.N</given-names></string-name></person-group>. (<year>2019</year>) ‘<article-title>The global disinformation order: Akademia Sztuki Wojennej 2019 Global inventory of organized social media manipulation</article-title>’, <source><italic>Project on Computational Propaganda</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://digitalcommons.unl.edu/scholcom/207">https://digitalcommons.unl.edu/scholcom/207</ext-link> (Accessed: 17 September 2024).</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Bengani</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2024</year>) ‘<chapter-title>Disinformation wars: Protecting democracy in Africa’s digital age</chapter-title>’, <publisher-name>Friedrich Naumann Foundation</publisher-name>, Available at: <ext-link ext-link-type="uri" xlink:href="https://www.freiheit.org/sub-saharan-africa/disinformation-wars-protecting-democracy-africas-digital-age">https://www.freiheit.org/sub-saharan-africa/disinformation-wars-protecting-democracy-africas-digital-age</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bronk</surname>, <given-names>C</given-names></string-name>. and <string-name><surname>Tikk-Ringas</surname>, <given-names>E</given-names></string-name></person-group>. (<year>2013</year>) ‘<article-title>The cyber attack on Saudi Aramco</article-title>’, <source><italic>Survival</italic></source>, <volume>55</volume>(<issue>2</issue>), pp. <fpage>81</fpage>–<lpage>96</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00396338.2013.784468</pub-id>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Buchanan</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2017</year>) <chapter-title><italic>The cyber security dilemma: Hacking, trust, and fear between nations</italic></chapter-title>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Buchanan</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title><italic>The hacker and the state: Cyber attacks and the new normal of geopolitics</italic></chapter-title>. <publisher-loc>Harvard, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.2307/j.ctv3405w2m</pub-id>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cheeseman</surname>, <given-names>N</given-names></string-name>. and <string-name><surname>Klaas</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2018</year>) <chapter-title><italic>How to rig an election</italic></chapter-title>. <publisher-loc>Yale, CT</publisher-loc>: <publisher-name>Yale University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.12987/9780300235210</pub-id>.</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Choucri</surname>, <given-names>N</given-names></string-name></person-group>. (<year>2012</year>) <chapter-title><italic>Cyberpolitics in international relations</italic></chapter-title>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>MIT Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.7551/mitpress/7736.001.0001</pub-id>.</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cummings</surname>, <given-names>M.L</given-names></string-name></person-group>. (<year>2017</year>) ‘<chapter-title>Artificial intelligence and future of warfare’, Research Paper</chapter-title>, <source><italic>International Security Department and US and the Americas Programme</italic>, January 2017</source>. <publisher-loc>London</publisher-loc>: <publisher-name>The Royal Institute of International Affairs Chatham House</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.chathamhouse.org/sites/default/files/publications/research/2017-01-26-artificial-intelligence-future-warfare-cummings-final.pdf">https://www.chathamhouse.org/sites/default/files/publications/research/2017-01-26-artificial-intelligence-future-warfare-cummings-final.pdf</ext-link> (Accessed: 17 September 2024).</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Czosseck</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Ottis</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Talihärm</surname>, <given-names>A.M</given-names></string-name></person-group>. (<year>2011</year>) ‘<article-title>Estonia after the 2007 cyber attacks: Legal, strategic and organizational changes in cyber security</article-title>’, <source><italic>International Journal of Cyber Warfare and Terrorism</italic></source>, <volume>1</volume>(<issue>1</issue>), pp. <fpage>24</fpage>–<lpage>34</lpage>. doi: <pub-id pub-id-type="doi">10.4018/ijcwt.2011010103</pub-id>.</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Deibert</surname>, <given-names>R.J</given-names></string-name>., <string-name><surname>Rohozinski</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Crete-Nishihata</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2012</year>) ‘<article-title>Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war</article-title>’, <source><italic>Security Dialogue</italic></source>, <volume>43</volume>(<issue>1</issue>), pp. <fpage>3</fpage>–<lpage>24</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0967010611431079</pub-id>.</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Edwards</surname>, <given-names>J</given-names></string-name></person-group>. (n.d.) <article-title><italic>Quantum computing and the future of cybersecurity: The qubit security quandary</italic></article-title>. <source>The National CIO Review</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://nationalcioreview.com/articles-insights/information-security/quantum-computing-and-the-future-of-cybersecurity/">https://nationalcioreview.com/articles-insights/information-security/quantum-computing-and-the-future-of-cybersecurity/</ext-link> (Accessed: 23 May 2025).</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Farwell</surname>, <given-names>J.P</given-names></string-name>. and <string-name><surname>Rohozinski</surname>, <given-names>R</given-names></string-name></person-group>. (<year>2011</year>) ‘<article-title>Stuxnet and the future of cyber war</article-title>’, <source><italic>Survival</italic></source>, <volume>53</volume>(<issue>1</issue>), pp. <fpage>23</fpage>–<lpage>40</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00396338.2011.555586</pub-id>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Freymann</surname>, <given-names>E</given-names></string-name>. and <string-name><surname>Stronski</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title><italic>China’s digital silk road and Africa’s technological future</italic></chapter-title>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Carnegie Endowment for International Peace (CEIP)</publisher-name>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Fudenberg</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Tirole</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1991</year>) <chapter-title><italic>Game theory</italic></chapter-title>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>MIT Press</publisher-name>.</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Garnett</surname>, <given-names>H.A</given-names></string-name>. and <string-name><surname>James</surname>, <given-names>T.S</given-names></string-name></person-group>. (<year>2020</year>). ‘<article-title>Cyber elections in the digital age: Threats and opportunities of technology for electoral integrity</article-title>,’ <source><italic>Election Law Journal: Rules, Politics, and Policy</italic></source>, <volume>19</volume>(<issue>2</issue>). doi: <pub-id pub-id-type="doi">10.1089/elj.2020.0633</pub-id>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Geers</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2015</year>) <chapter-title><italic>Cyberwar in perspective: Russian aggression against Ukraine</italic></chapter-title>. <publisher-loc>Tallinn</publisher-loc>: <publisher-name>NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)</publisher-name>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Goldsmith</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2013</year>) ‘<article-title>How cyber changes the laws of war</article-title>’, <source><italic>European Journal of International Law</italic></source>, <volume>24</volume>(<issue>1</issue>), pp. <fpage>129</fpage>–<lpage>138</lpage>. doi: <pub-id pub-id-type="doi">10.1093/ejil/cht004</pub-id>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Hannes</surname>, <given-names>E</given-names></string-name>. and <string-name><surname>Maurer</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2017</year>) <article-title>The impact of cybersecurity on international relations</article-title>, Available at: <ext-link ext-link-type="uri" xlink:href="https://blog.oup.com/2017/02/impact-cyber-security-international-relations/">https://blog.oup.com/2017/02/impact-cyber-security-international-relations/</ext-link> Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Herzog</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2011</year>) ‘<article-title>Revisiting the Estonian cyber attacks: Digital threats and multinational responses</article-title>’, <source><italic>Journal of Strategic Security</italic></source>, <volume>4</volume>(<issue>2</issue>), pp. <fpage>49</fpage>–<lpage>60</lpage>. doi: <pub-id pub-id-type="doi">10.5038/1944-0472.4.2.3</pub-id>.</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hollis</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2011</year>) ‘<article-title>Cyberwar case study: Georgia 2008</article-title>’, <source><italic>Small Wars Journal</italic></source>, <volume>7</volume>(<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>10</lpage>.</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Inter-American Development Bank (IADB)</collab></person-group> (<year>2016</year>) <article-title><italic>Cybersecurity: Are we ready in Latin America and the Caribbean?</italic></article-title> Available at: <ext-link ext-link-type="uri" xlink:href="https://www.combattingcybercrime.org/files/virtual-library/phenomena-challenges-cybercrime/cybersecurity-%E2%80%93are-we-ready-in-latin-america-and-the-caribbean.pdf">https://www.combattingcybercrime.org/files/virtual-library/phenomena-challenges-cybercrime/cybersecurity-%E2%80%93are-we-ready-in-latin-america-and-the-caribbean.pdf</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Jamieson</surname>, <given-names>K.H</given-names></string-name></person-group>. (<year>2018</year>) <chapter-title><italic>Cyberwar: How Russian hackers and trolls helped elect a president</italic></chapter-title>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jang-Jaccard</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Nepal</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2014</year>) ‘<article-title>A survey of emerging threats in cybersecurity</article-title>’, <source><italic>Journal of Computer and System Sciences</italic></source>, <volume>80</volume>(<issue>5</issue>), pp. <fpage>973</fpage>–<lpage>993</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jcss.2014.02.005</pub-id>.</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kaur</surname>, <given-names>R</given-names></string-name>., <string-name><surname>Gabrijelčič</surname>, <given-names>D</given-names></string-name>. and <string-name><surname>Klobučar</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2023</year>) ‘<article-title>Artificial intelligence for cybersecurity: Literature review and future research directions</article-title>’, <source><italic>Information Fusion</italic></source>, <volume>97</volume>, pp. <fpage>101804</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.inffus.2023.101804</pub-id></mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kello</surname>, <given-names>L</given-names></string-name></person-group>. (<year>2013</year>) ‘<article-title>The meaning of the cyber revolution: Perils to theory and statecraft</article-title>’, <source><italic>International Security</italic></source>, <volume>38</volume>(<issue>2</issue>), pp. <fpage>7</fpage>–<lpage>40</lpage>. doi: <pub-id pub-id-type="doi">10.1162/ISEC_a_00138</pub-id>.</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Kello</surname>, <given-names>L</given-names></string-name></person-group>. (<year>2015</year>) <article-title>The Virtual Weapon: Dilemmas and Future Scenarios</article-title>. <source>Politique étrangère, Winter</source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.belfercenter.org/publication/virtual-weapon-dilemmas-and-future-scenarios">https://www.belfercenter.org/publication/virtual-weapon-dilemmas-and-future-scenarios</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kello</surname>, <given-names>L</given-names></string-name></person-group>. (<year>2017</year>) <chapter-title><italic>The virtual weapon and international order</italic></chapter-title>. <publisher-loc>Yale, CT</publisher-loc>: <publisher-name>Yale University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.2307/j.ctt1trkjd1</pub-id>.</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liang</surname>, <given-names>X</given-names></string-name>. and <string-name><surname>Xiao</surname>, <given-names>Y</given-names></string-name></person-group>. (<year>2013</year>) ‘<article-title>Game theory for network security</article-title>’, <source><italic>IEEE Communications Surveys &amp; Tutorials</italic></source>, <volume>15</volume>(<issue>1</issue>), pp. <fpage>472</fpage>–<lpage>486</lpage>. doi: <pub-id pub-id-type="doi">10.1109/SURV.2012.062612.00056</pub-id>.</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lindsay</surname>, <given-names>J.R</given-names></string-name></person-group>. (<year>2013</year>) ‘<article-title>Stuxnet and the limits of cyber warfare</article-title>’, <source><italic>Security Studies</italic></source>, <volume>22</volume>(<issue>3</issue>), pp. <fpage>365</fpage>–<lpage>404</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09636412.2013.816122</pub-id>.</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lindsay</surname>, <given-names>J.R</given-names></string-name></person-group>. (<year>2015</year>) ‘<article-title>The impact of China on cybersecurity: Fiction and friction</article-title>’, <source><italic>International Security</italic></source>, <volume>39</volume>(<issue>3</issue>), pp. <fpage>7</fpage>–<lpage>47</lpage>. doi: <pub-id pub-id-type="doi">10.1162/ISEC_a_00189</pub-id>.</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Lindsay</surname>, <given-names>J.R</given-names></string-name>., <string-name><surname>Cheung</surname>, <given-names>T.M</given-names></string-name>. and <string-name><surname>Reveron</surname>, <given-names>D.S</given-names></string-name></person-group>. (<year>2015</year>) <chapter-title><italic>China and cybersecurity: Espionage, strategy, and politics in the digital domain</italic></chapter-title>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.1093/acprof:oso/9780190201265.001.0001</pub-id>.</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Liu</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Ding</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Shaham</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Rahayu</surname>, <given-names>W</given-names></string-name>., <string-name><surname>Farokhi</surname>, <given-names>F</given-names></string-name>. and <string-name><surname>Lin</surname>, <given-names>Z</given-names></string-name></person-group>. (<year>2021</year>) ‘<chapter-title>When Machine Learning Meets Privacy: A Survey and Outlook</chapter-title>’, <publisher-name>ACM Computing Surveys (CSUR)</publisher-name>, <volume>54</volume>(<issue>2</issue>), pp. <fpage>1</fpage>–<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3436755</pub-id>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Matani</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Yoffe</surname>, <given-names>L</given-names></string-name></person-group>. (<year>2016</year>) ‘<article-title>Cyberspace: The new battlefield between Israel and Hamas</article-title>’, <source><italic>Military and Strategic Affairs</italic></source>, <volume>8</volume>(<issue>3</issue>), pp. <fpage>3</fpage>–<lpage>18</lpage>.</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Myerson</surname>, <given-names>R.B</given-names></string-name></person-group>. (<year>2013</year>) <chapter-title><italic>Game theory</italic></chapter-title>. <publisher-loc>Harvard, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.2307/j.ctvjsf522</pub-id>.</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nash</surname>, <given-names>J</given-names></string-name></person-group>. (<year>1951</year>) ‘<article-title>Non-cooperative games</article-title>’, <source><italic>Annals of Mathematics</italic></source>, <volume>54</volume>(<issue>2</issue>), pp. <fpage>286</fpage>–<lpage>295</lpage>. doi: <pub-id pub-id-type="doi">10.2307/1969529</pub-id>.</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nye</surname><suffix>Jr</suffix>, <given-names>J.S</given-names></string-name></person-group>. (<year>2017</year>) ‘<article-title>Deterrence and dissuasion in cyberspace</article-title>’, <source><italic>International Security</italic></source>, <volume>41</volume>(<issue>3</issue>), pp. <fpage>44</fpage>–<lpage>71</lpage>. doi: <pub-id pub-id-type="doi">10.1162/ISEC_a_00266</pub-id></mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Office of the Director of National Intelligence</collab></person-group> (<year>2017</year>) <article-title><italic>Assessing Russian activities and intentions in recent US elections</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.intelligence.senate.gov/sites/default/files/documents/ICA_2017_01.pdf">https://www.intelligence.senate.gov/sites/default/files/documents/ICA_2017_01.pdf</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Olson</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2012</year>) <chapter-title><italic>We are Anonymous: Inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency</italic></chapter-title>. <publisher-loc>Boston MA</publisher-loc>: <publisher-name>Little Brown</publisher-name>.</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Osborne</surname>, <given-names>M.J</given-names></string-name>. and <string-name><surname>Rubinstein</surname>, <given-names>A</given-names></string-name></person-group>. (<year>1994</year>) <chapter-title><italic>A course in game theory</italic></chapter-title>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>MIT Press</publisher-name>.</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pant</surname><given-names>H.V</given-names></string-name>. and <string-name><surname>Bommakanti</surname><given-names>K</given-names></string-name></person-group>. (<year>2019</year>) ‘<article-title>India’s national security: Challenges and dilemmas</article-title>,’ <source><italic>International Affairs</italic></source>, <volume>95</volume>(<issue>4</issue>), pp. <fpage>835</fpage>–<lpage>857</lpage>. doi: <pub-id pub-id-type="doi">10.1093/ia/iiz053</pub-id>.</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Polyakova</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Fried</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2019</year>) <chapter-title><italic>Democratic defense against disinformation 2.0</italic></chapter-title>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Atlantic Council</publisher-name>.</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rid</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2012</year>) ‘<article-title>Cyber war will not take place</article-title>’, <source><italic>Journal of Strategic Studies</italic></source>, <volume>35</volume>(<issue>1</issue>), pp. <fpage>5</fpage>–<lpage>32</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01402390.2011.608939</pub-id>.</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Rid</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2016</year>) ‘<article-title>All signs point to Russia being behind the DNC hack’</article-title>, <source><italic>Vice</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.vice.com/en/article/all-signs-point-to-russia-being-behind-the-dnc-hack/">https://www.vice.com/en/article/all-signs-point-to-russia-being-behind-the-dnc-hack/</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Roberts</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2017</year>) <article-title><italic>Dragonfly: Western energy sector targeted by sophisticated attack group- Symantec Security Response</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://securityledger.com/2017/09/dragonfly-western-energy-sector-targeted-by-sophisticated-attack-group-symantec-connect-community/">https://securityledger.com/2017/09/dragonfly-western-energy-sector-targeted-by-sophisticated-attack-group-symantec-connect-community/</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Roy</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Ellis</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Shiva</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Dasgupta</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Shandilya</surname>, <given-names>V</given-names></string-name>. and <string-name><surname>Wu</surname>, <given-names>Q</given-names></string-name></person-group>. (<year>2010</year>) <italic>‘</italic><chapter-title>A survey of game theory as applied to network security’, in 43rd Hawaii international conference on system sciences</chapter-title>. <publisher-name>IEEE</publisher-name>, <publisher-loc>Honolulu, HI, USA</publisher-loc>. doi: <pub-id pub-id-type="doi">10.1109/HICSS.2010.35</pub-id>.</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Salem</surname>, <given-names>A.H</given-names></string-name>., <string-name><surname>Azzam</surname>, <given-names>S.M</given-names></string-name>., <string-name><surname>Emam</surname>, <given-names>O.E</given-names></string-name>., <string-name><surname>Abohany</surname>, <given-names>A. A</given-names></string-name></person-group>. (<year>2024</year>) ‘<article-title>Advancing cybersecurity: a comprehensive review of AI-driven detection techniques</article-title>’, <source><italic>Journal of Big Data</italic></source>, <volume>11</volume>, <fpage>105</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s40537-024-00957-y</pub-id>.</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Saltelli</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Ratto</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Andres</surname>, <given-names>T</given-names></string-name>., <string-name><surname>Campolongo</surname>, <given-names>F</given-names></string-name>., <string-name><surname>Cariboni</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Gatelli</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Saisana</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Tarantola</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2008</year>) <chapter-title><italic>Global sensitivity analysis: The primer</italic></chapter-title>. <publisher-loc>Hoboken, NJ</publisher-loc>: <publisher-name>John Wiley</publisher-name>. doi: <pub-id pub-id-type="doi">10.1002/9780470725184</pub-id>.</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Schelling</surname>, <given-names>T.C</given-names></string-name></person-group>. (<year>1960</year>) <chapter-title><italic>The strategy of conflict</italic></chapter-title>. <publisher-loc>Harvard, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name>.</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Schmitt</surname>, <given-names>M.N</given-names></string-name></person-group>. (Ed.) (<year>2017</year>) <chapter-title><italic>Tallinn manual 2.0 on the international law applicable to cyber operations</italic></chapter-title>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.1017/9781316822524</pub-id>.</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Segal</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2020</year>) <article-title><italic>The Coming Tech Cold War With China Beijing Is Already Countering Washington’s Policy</italic></article-title>, Available at: <ext-link ext-link-type="uri" xlink:href="https://www.foreignaffairs.com/articles/north-america/2020-09-09/coming-tech-cold-war-china?utm_medium=social">https://www.foreignaffairs.com/articles/north-america/2020-09-09/coming-tech-cold-war-china?utm_medium=social</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref55"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Selten</surname>, <given-names>R</given-names></string-name></person-group>. (<year>1968</year>) <chapter-title><italic>An Oligopoly Model with Demand Inertia</italic></chapter-title>, <publisher-name>Center for Research in Management Science, University of California</publisher-name>.</mixed-citation></ref><ref id="ref56"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Sharma</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title><italic>The great tech game: Shaping geopolitics and the destinies of nations</italic></chapter-title>. <publisher-loc>New Delhi</publisher-loc>: <publisher-name>Penguin Random House India</publisher-name>.</mixed-citation></ref><ref id="ref57"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Siboni</surname>, <given-names>G</given-names></string-name>. and <string-name><surname>Kronenfeld</surname>, <given-names>S</given-names></string-name></person-group>. (<year>2012</year>) ‘<article-title>Iran and cyberspace warfare</article-title>’, <source><italic>Military and Strategic Affairs</italic></source>, <volume>4</volume>(<issue>3</issue>), pp. <fpage>77</fpage>–<lpage>99</lpage>.</mixed-citation></ref><ref id="ref58"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Singer</surname>, <given-names>P.W</given-names></string-name>. and <string-name><surname>Friedman</surname>, <given-names>A</given-names></string-name></person-group>. (<year>2014</year>) <chapter-title><italic>Cybersecurity and cyberwar: What everyone needs to know</italic></chapter-title>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref><ref id="ref59"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Skopik</surname>, <given-names>F</given-names></string-name></person-group>. (ed.) (<year>2016</year>) <chapter-title><italic>Collaborative cyber threat intelligence: Detecting and responding to advanced cyber attacks at the national level</italic></chapter-title>. <publisher-loc>Boca Raton, FL</publisher-loc>: <publisher-name>CRC Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.4324/9781315397900</pub-id>.</mixed-citation></ref><ref id="ref60"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Stamp</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2011</year>) <chapter-title><italic>Information security: Principles and practice</italic></chapter-title>. <publisher-loc>Hoboken, NJ</publisher-loc>: <publisher-name>John Wiley</publisher-name>. doi: <pub-id pub-id-type="doi">10.1002/9781118027974</pub-id></mixed-citation></ref><ref id="ref61"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Tikk</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Kaska</surname>, <given-names>K</given-names></string-name>. and <string-name><surname>Vihul</surname>, <given-names>L</given-names></string-name></person-group>. (<year>2010</year>) <chapter-title><italic>International cyber incidents: legal considerations</italic></chapter-title>. <publisher-loc>Tallinn</publisher-loc>: <publisher-name>NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)</publisher-name>.</mixed-citation></ref><ref id="ref62"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Valeriano</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>Maness</surname>, <given-names>R.C</given-names></string-name></person-group>. (<year>2014</year>) ‘<article-title>The dynamics of cyber conflict between rival antagonists, 2001–11</article-title>’, <source><italic>Journal of Peace Research</italic></source>, <volume>51</volume>(<issue>3</issue>), pp. <fpage>347</fpage>–<lpage>360</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022343313518940</pub-id>.</mixed-citation></ref><ref id="ref63"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Smith</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Johnson</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2024</year>) ‘<article-title>Digital security by design: A framework for future cyber defense</article-title>’, <source><italic>IEEE Transactions on Information Forensics and Security</italic></source>, <volume>19</volume>(<issue>1</issue>), pp. <fpage>156</fpage>–<lpage>171</lpage>. doi: <pub-id pub-id-type="doi">10.1057/s41284-024-00435-3</pub-id>.</mixed-citation></ref><ref id="ref64"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Valeriano</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>Maness</surname>, <given-names>R.C</given-names></string-name></person-group>. (<year>2015</year>) <chapter-title><italic>Cyber war versus cyber realities: Cyber conflict in the international system</italic></chapter-title>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.1093/acprof:oso/9780190204792.001.0001</pub-id>.</mixed-citation></ref><ref id="ref65"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>von Neumann</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Morgenstern</surname>, <given-names>O</given-names></string-name></person-group>. (<year>1944</year>) <chapter-title><italic>Theory of games and economic behavior</italic></chapter-title>. <publisher-loc>Princeton, NJ</publisher-loc>: <publisher-name>Princeton University Press</publisher-name>.</mixed-citation></ref><ref id="ref66"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Watts</surname>, <given-names>C</given-names></string-name></person-group>. (<year>2018</year>) <chapter-title><italic>Messing with the enemy: Surviving in a social media world of hackers, terrorists, Russians, and fake news</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Harper Collins</publisher-name>.</mixed-citation></ref><ref id="ref67"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wilson</surname>, <given-names>R</given-names></string-name>. and <string-name><surname>Zhang</surname>, <given-names>Y</given-names></string-name></person-group>. (<year>2023</year>) ‘<article-title>Quantum computing and the future of cybersecurity’</article-title>, <source><italic>Nature Cybersecurity</italic></source>, <volume>2</volume>(<issue>4</issue>), pp. <fpage>187</fpage>–<lpage>196</lpage>.</mixed-citation></ref><ref id="ref68"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Zagare</surname>, <given-names>F</given-names></string-name>., and <string-name><surname>Slantchev</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2018</year>) <article-title><italic>Game Theory and Other Modeling Approaches. Oxford Research Encyclopedia of International Studies</italic></article-title>. Available at: <ext-link ext-link-type="uri" xlink:href="https://oxfordre.com/internationalstudies/view/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626-e-401">https://oxfordre.com/internationalstudies/view/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626-e-401</ext-link> (Accessed: 9 May 2025).</mixed-citation></ref><ref id="ref69"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zeitzoff</surname>, <given-names>T</given-names></string-name></person-group>. (<year>2018</year>) ‘<article-title>Does social media influence conflict? Evidence from the 2012 Gaza conflict</article-title>’, <source><italic>Journal of Conflict Resolution</italic></source>, <volume>62</volume>(<issue>1</issue>), pp. <fpage>29</fpage>–<lpage>63</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022002716650925</pub-id>.</mixed-citation></ref><ref id="ref70"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Zetter</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2014</year>) <chapter-title><italic>Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon</italic></chapter-title>. <publisher-loc>New York City, NY</publisher-loc>: <publisher-name>Crown Publishers</publisher-name>.</mixed-citation></ref></ref-list></back></article>
