
The project seeks to make a significant empirical contribution, and to develop theory on the politics of space –a domain that remains uninhabited and essentially unregulated. Since 2018 I lead a project on Ru ssian space visions, with the aim of analyzing patterns of continuity and change in post-Soviet Russian space visions and policy. How is outer space envisioned? What kind of international relations of space are advocated by different actors? Space politics is a core research interest of mine. This focus provides a promising direction to study cyber deterrence and address these challenges. I argue that since communicating threats is a core element of deterrence, it is easier to observe how the strategy is adopted and employed than whether it succeeds or fails. To this end, I suggest focusing on the adoption and employment of the strategy rather than on its success. Despite the many studies on cyber deterrence, methodological solutions to address these challenges still need to be developed. When studying cyber deterrence, scholars face uncertainty not only in identifying situations of deterrence success, but also-due to the secrecy surrounding cyber practices-in identifying situations of deterrence failure.

Studying cyber deterrence presents even greater challenges, as traditional deterrence challenges are exacerbated and interactions in the cyber domain create further difficulties.

The study of deterrence presents a number of challenges, mainly to do with identifying deterrence success and defining how deterrence works. Findings show that the subversive trilemma limited the strategic utility of all five major disruptive cyber operations in this conflict. Qualitative analysis leverages original data from field interviews, leaked documents, forensic evidence, and local media. A case study of the Russo-Ukrainian conflict provides empirical support for the argument. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables. The mismatch between promise and practice is the consequence of the subversive trilemma of cyber operations, whereby speed, intensity, and control are negatively correlated. In theory, subversion provides a way to exert influence at lower risks than force because it is secret and indirect, exploiting systems to use them against adversaries. The reason for this shortfall is their subversive mechanism of action. But a growing body of research shows how cyber operations tend to fall short of their promise. Underlying these expectations are broadly shared assumptions that information technology increases operational effectiveness. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition. A survey of other nations' cybersecurity policies might be included in the future research.Īlthough cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Identifying the common policies across several nations may assist academics and policymakers in developing cybersecurity policies. For example, the USA has scored the highest in terms of online banking policy, but Canada has scored the highest in terms of E-commerce and spam policies. Some nations seemed to focus, based on the study of key available policies, on certain cybersecurity attributes more than others. This paper identified fourteen common cybersecurity attributes such as telecommunication, network, Cloud computing, online banking, E-commerce, identity theft, privacy, and smart grid. This study investigates cybersecurity regulations and attributes used in seven nations in an attempt to fill this research gap. Hence, a comprehensive cybersecurity policy is needed to enable governments to take a proactive approach to all types of cyber threats.

Different nations' cybersecurity rules make it simpler for cybercriminals to carry out damaging actions while making it tougher for governments to track them down. Individual users and corporations are not the only ones who are affected by cyber-attacks national security is also a serious concern. Organizations must have effective cybersecurity policies in place to respond to escalating cyber threats. Cyber threats have risen as a result of the growing usage of the Internet.
