J
Jon R. Lindsay
Researcher at University of Toronto
Publications - 31
Citations - 933
Jon R. Lindsay is an academic researcher from University of Toronto. The author has contributed to research in topics: Politics & Domain (software engineering). The author has an hindex of 12, co-authored 29 publications receiving 730 citations. Previous affiliations of Jon R. Lindsay include University of California, San Diego & University of California, Los Angeles.
Papers
More filters
Journal ArticleDOI
Stuxnet and the Limits of Cyber Warfare
TL;DR: The empirical facts of Stuxnet support an opposite interpretation; cyber capabilities can marginally enhance the power of stronger over weaker actors, the complexity of weaponization makes cyber offense less easy and defense more feasible than generally appreciated, and cyber options are most attractive when deterrence is intact.
Journal ArticleDOI
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack
TL;DR: A formal model is used to explain why there are many low-value anonymous attacks but few high-value ones, showing how different assumptions about the scaling of exploitation and retaliation costs lead to different degrees of coverage and effectiveness for deterrence by denial and punishment.
Journal ArticleDOI
Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace
Erik Gartzke,Jon R. Lindsay +1 more
TL;DR: The strategy of deception has other important implications: as deterrence became foundational in the nuclear era, deception should rise in prominence in a world that increasingly depends on technology to mediate interaction.
Journal ArticleDOI
The Impact of China on Cybersecurity: Fiction and Friction
TL;DR: A cyber version of the stability-instability paradox constrains the intensity of cyber interaction in the U.S.-China relationship and in international relations more broadly, even as lesser irritants continue to proliferate as mentioned in this paper.
BookDOI
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
TL;DR: In this paper, the authors present a comprehensive analysis of China's cyber-security threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West.