Publications


Peer-Reviewed Publications

Journal Articles

Brenner, Joel, and Jon R. Lindsay. “Correspondence: Debating the Chinese Cyber Threat.” International Security 2015.
Gartzke, Erik, and Jon R. Lindsay. “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,” Security Studies, Forthcoming 2015.
Haggard, Stephan, and Jon R. Lindsay. “North Korea and the Sony Hack: Exporting Instability Through Cyberspace.” East-West Center AsiaPacific Issues, no. 117 (May 2015).
Lindsay, Jon R. “The Impact of China on Cybersecurity: Fiction and Friction.” International Security 39, no. 3 (Winter 2014): 7–47.
Lindsay, Jon R., and Lucas Kello.  “Correspondence: A Cyber Disagreement.” International Security 39, No. 2 (October 1, 2014): 181–92.
Gartzke, Erik. “An Apology for Numbers in the Study of National Security…if an apology is really necessary,” H-Diplo/ISSF, No. 2 (2014): 77-90. URL: http://issforum.org/ISSF/PDF/ISSF-Forum-2.pdf
Gartzke, Erik. “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth.” International Security 38, no. 2 (2013): 41–73.
Lindsay, Jon R. “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2013): 365–404.


Under Review

Gartzke, Erik. “No Humans Were Harmed in the Making of this War: On the Nature and Consequences of `Costless’ Combat”
Gartzke, Erik and Koji Kagotani. “Trust in Tripwires: Deployments, Costly Signaling and Extended General Deterrence.”
Gartzke, Erik and Oliver Westerwinter, “The Complex Structure of Commercial Peace: Contrasting Trade Interdependence, Asymmetry and Multipolarity” Under review forJournal of Peace Research
Lindsay, Jon R. “The Attribution Problem and the Stability of Deterrence”
Lindsay, Jon R., and Erik Gartzke. “Coercion through Cyberspace: The Stability-Instability Paradox Revisited.” In The Power to Hurt, edited by Kelly M. Greenhill and Peter J. P. Krause.
Lindsay, Jon R. and Jiakun Jack Zhang. “The Commercial Peace in Space and Cyberspace: Cautious Optimism about US-China Relations.”

Book Chapters

Gartzke, Erik and Lindsay, Jon R. "Cybersecurity and Cross-Domain Deterrence: The Consequences of Complexity." National Security in Cyberspace. Routledge, forthcoming.
Gartzke, Erik and Lindsay, Jon R. "Coercion through Cyberspace: The Stability-Instability Paradox Revisited." The Power to Hurt: Coercion in Theory and in Practice. Oxford University Press, forthcoming.
Gartzke, Erik and Lindsay, Jon R. "Cross-Domain Deterrence as a Practical Problem and a Theoretical Concept.Cross-Domain Deterrence: Strategy in an Era of Complexity


Other Publications

Policy Papers

Lindsay, Jon R. “Exaggerating the Chinese Cyber Threat.” Policy Brief, Belfer Center for Science and International Affairs, Harvard Kennedy School, May 2015.
Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron. “Will China and America Clash in Cyberspace?” The National Interest, April 12, 2015, http://nationalinterest.org/feature/will-china-america-clash-cyberspace-12607
Gartzke, Erik. “Making Sense of Cyberwar.” Policy Brief, Belfer Center for Science and International Affairs, Harvard Kennedy School, January 2014, http://belfercenter.hks.harvard.edu/publication/23796/making_sense_of_cyberwar.html
Gartzke, Erik. “Fear and War in Cyberspace.” Lawfare, December 1, 2013, http://www.lawfareblog.com/foreign-policy-essay-erik-gartzke-on-fear-and-war-in-cyberspace

Op-Ed/Blog

Lindsay, Jon R. “Cybersecurity and International Relations: Evaluating the Threat from China.” Op-Ed/Blog.
Lindsay, Jon R. "The Real Cyberespionage Rule: Don't Get Caught." Op-Ed/Blog, January 4, 2016, http://www.policyforum.net/the-real-cyberespionage-rule-dont-get-caught/