Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Peace Economics, Peace Science and Public Policy

Editor-in-Chief: Caruso, Raul

Ed. by Bove, Vincenzo / Kibris, Arzu / Sekeris, Petros

4 Issues per year

CiteScore 2017: 0.54

SCImago Journal Rank (SJR) 2017: 0.304
Source Normalized Impact per Paper (SNIP) 2017: 0.540

See all formats and pricing
More options …
Ahead of print


Volume 17 (2011)

Volume 4 (1996)

Volume 3 (1995)

Volume 2 (1994)

Volume 1 (1993)

Conflict in Cyber-Space: The Network of Cyber Incidents, 2000–2014

Adelaide Baronchelli
Published Online: 2018-10-20 | DOI: https://doi.org/10.1515/peps-2018-0028


Despite raising fears over the use of states’ cyber capabilities as a tool of foreign policy, little empirical evidence is provided about its actual diffusion. Using a newly developed dataset collecting information on cyber interactions between rival states from 2000 to 2014, I analyse the evolution of the network of cyber incidents over the considered period by the mean of a Social Network Analysis approach. Results show that the level of cohesion in the network is low and the number of countries which does not make use of cyber tactics is high. Furthermore, Russia is emerging as the major offender while the USA is the most attacked country. Finally, geography appears to be a driving factor in influencing links formation.

Keywords: international relations; cyber conflict; social network analysis


  • Borgatti, S. P., Everett, M. G. & Johnson, J. C.(2018). Analyzing social networks. Sage.Google Scholar

  • Breiger, R. (1981). Structures of economic interdependence among nations. In P. M. Blau, & R. K. Merton (Eds.), Continuities in structural inquiry (pp. 353–380). Los Angeles: Sage.Google Scholar

  • Clarke, R. A., & Knake, R. K. (2010). Cyber war: the next threat to national security and what to do about it. The Library of Congress. New York: Harper Collins.Google Scholar

  • Gartzke, E. (2013). The myth of cyberwar: bringing war in cyberspace back down to earth. International Security, 38(2), 41–73.Google Scholar

  • Gartzke, E., & Lindsay, J. R. (2015). Weaving tangled webs: offense, defense, and deception in cyberspace. Security Studies, 24(2), 316–348.Google Scholar

  • Hoff, P. D., & Ward, M. D. (2004). Modeling dependencies in international relations networks. Political Analysis, 12(2), 160–175.Google Scholar

  • Kello, L. (2013). The meaning of the cyber revolution: perils to theory and statecraft. International Security, 38(2), 7–40.Google Scholar

  • Kostyuk, N., & Zhukov, Y. M. (2017). Invisible digital front: can cyber attacks shape battlefield events? Journal of Conflict Resolution, 0022002717737138.Google Scholar

  • Maness, R., Valeriano, B., & Jensen, B. (2017). The dyadic cyber incident and dispute dataset, version 1.1. Retrieved from https://drryanmaness.wixsite.com/cyberconflcit/cyber-conflict-dataset.

  • Maoz, Z. (2006). Network polarization, network interdependence, and international conflict, 1816–2002. Journal of Peace Research, 43(4), 391–411.Google Scholar

  • Maoz, Z. (2010). Networks of nations: the evolution, structure, and impact of international networks, 1816–2001 (Vol. 32). Cambridge University Press.Google Scholar

  • Maoz, Z. (2012). Preferential attachment, homophily, and the structure of international networks, 1816–2003. Conflict Management and Peace Science, 29(3), 341–369.Google Scholar

  • Nemeth, R. J., & Smith, D. A. (1985). International trade and world-system structure: a multiple network analysis. Review (Fernand Braudel Center), 8(4), 517–560.Google Scholar

  • Newman, M. E. (2003). Mixing patterns in networks. Physical Review E, 67(2), 026126.Google Scholar

  • Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5–32.Google Scholar

  • Rid, T. (2013). Cyber war will not take place. USA: Oxford University Press.Google Scholar

  • Smith, D. A., & White, D. R. (1992). Structure and dynamics of the global economy: network analysis of international trade 1965–1980. Social Forces, 70(4), 857–893.Google Scholar

  • Snyder, D., & Kick, E. L. (1979). Structural position in the world system and economic growth, 1955–1970: A multiple-network analysis of transnational interactions. American Journal of Sociology, 84, 1096–1126.Google Scholar

  • Toft, M. D. (2014). Territory and war. Journal of Peace Research, 51(2), 185–198.Google Scholar

  • Toset, H. P. W., Gleditsch, N. P., & Hegre, H. (2000). Shared rivers and interstate conflict. Political Geography, 19(8), 971–996.Google Scholar

  • United Nations. Statistical Office. (1999). Standard country or area codes for statistical use (Vol. 42). UN.Google Scholar

  • Valeriano, B., & Maness, R. C. (2014). The dynamics of cyber conflict between rival antagonists, 2001–11. Journal of Peace Research, 51(3), 347–360.Google Scholar

  • Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. USA: Oxford University Press.Google Scholar

  • Valeriano, B., & Maness, R. C. (2018). How we stopped worrying about cyber doom and started collecting data. Politics and Governance, 6(2), 49–60.Google Scholar

  • Van Rossem, R. (1996). The world system paradigm as general theory of development: a cross-national test. American Sociological Review, 61, 508–527.Google Scholar

  • Vasquez, J. A. (1995). Why do neighbors fight? Proximity, interaction, or territoriality. Journal of Peace Research, 32(3), 277–293.Google Scholar

  • Ward, H. (2006). International linkages and environmental sustainability: the effectiveness of the regime network. Journal of Peace Research, 43(2), 149–166.Google Scholar

  • Ward, M. D., Siverson, R. M., & Cao, X. (2007). Disputes, democracies, and dependencies: a reexamination of the Kantian peace. American Journal of Political Science, 51(3), 583–601.Google Scholar

About the article

Published Online: 2018-10-20

Citation Information: Peace Economics, Peace Science and Public Policy, 20180028, ISSN (Online) 1554-8597, DOI: https://doi.org/10.1515/peps-2018-0028.

Export Citation

©2018 Walter de Gruyter GmbH, Berlin/Boston.Get Permission

Comments (0)

Please log in or register to comment.
Log in