Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes

Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes
Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes
USA Price: 
In stock
GPO Stock Number:

An analysis of weapons-based confidence-building measures shows how academics can work together to self-police their research for national security implications, socialize new members of the academic community into the importance of considering security issues, and develop and disseminate norms regarding what is and is not a moral and ethical use of these technologies. It may be possible for academics and policymakers to come together to work for a ban or build-down on cyber weapons patterned on international efforts to ban chemical and biological weapons and implement export regimes to control the export of code which may form the components of cyber weapons. If we conceptualize cyberspace as territory, we can also learn from the example of territorially-based confidence-building measures such as those implemented along the Indo-Pakistan border. This approach stresses the importance of developing notification procedures to prevent misperceptions and the escalation spiral, as well as communicating regularly to establish trust between all parties. The case studies presented here illustrate the promises and pitfalls of each approach and offer valuable warnings to policymakers seeking to implement such measures in cyberspace. They show what happens when not everyone in a regime is equally committed to a specific outcome by illustrating the difficulties of monitoring compliance in confidence-building regimes, and show the ways in which doctrines and confidence-building measures may not be perfectly aligned.

Related items:

Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications can be found at this link:

Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications can be found at this link:

Cyberterrorism After Stuxnet can be found at this link:

Legality in Cyberspace: An Adversary View can be found at this link:

Cyber Defense: An International View can be found here:

The Rise of Iwar: Identity, Information, and the Individualization of Modern Warfare is available here:

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition can be found here:


This text is primarily targeted at the academia community to work with Government professionals to advise on issues relating to cyber building measures (CBM), including guidance about cyber ethics, conversation starters with international parties about cyber warfare and cyber weapons, and defense militaries.  Ultimately, the goal is for academia to address a series of treaties for policymakers to consider for all states to secure their own nation’s computer systems and ethical standards relating to the cyber community, as well as to civilian manufacturers and laboratories.  Political scientists, technology specialists or officers, the intelligence community, undergraduate and graduate students in computer science/biological or chemical science/homeland security/international relations/international law classes may be interested in the case studies presented in this work.

Product Details

Availability Details:
In Stock
USA Price:
International Price:
Defense Dept., Army, Strategic Studies Institute; and Army War College
  • Manjikian, Mary
Back cover has a barcode and 3 QR codes.
Key Phrases:
  • Confidence and security building measures (International relations)
  • Comparison of Territorial and Weapons Based Regimes
  • Cyberterrorism, Prevention, International cooperation
  • Weapons Based Regimes
  • Cyberspace
  • Cyberspace operations (Military science)
  • Cyberspace, International cooperation
Quantity Price:
Unit of Issue (US):
Unit of Issue (Non-US):
Record Creation Date:
Last Status Update:
Back to Top