Show Summary Details

Page of

Printed from Oxford Research Encyclopedias, Politics. Under the terms of the licence agreement, an individual user may print out a single article for personal use (for details see Privacy Policy and Legal Notice).

date: 07 February 2025

Vulnerabilities and Cyberspace: A New Kind of Criseslocked

Vulnerabilities and Cyberspace: A New Kind of Criseslocked

  • Bibi van den BergBibi van den BergInstitute of Security and Global Affairs, Leiden University
  • , and Sanneke KuipersSanneke KuipersInstitute of Security and Global Affairs, Leiden University

Summary

While cyberspace has become central to all vital processes in the global economy and people’s social lives, it also carries a wide variety of risks. Framing these risks is no easy feat: Some lead to harm in cyberspace itself, while others lead to harm in the offline world as well. Moreover, sometimes harm is brought about intentionally, while at other times it may be the result of accidents. The “cyber harm model” brings these challenges together and provides an opportunity to get a comprehensive overview of the different types of incidents related to cyberspace.

It also reveals where the biggest challenges for cyber crisis management lie, and it provides a typology of different types of cyber crises that may arise. Cyber-induced crises have characteristics that make them hard to grapple with, for instance the fact that they can be induced remotely and instantaneously at multiple locations. Moreover, cyber crises are not always easily traceable, and sometimes it is difficult to see that the cause of a particular crisis in the offline world is an act in cyberspace. Finally, the borderless nature of cyberspace leads to potential large-scale geographical spread for cyber crises.

Cyber crises also lead to a number of specific challenges for leadership, especially with respect to sense-making, meaning making, decision making, termination, and learning.

Subjects

  • Policy, Administration, and Bureaucracy
  • Political Communication

You do not currently have access to this article

Login

Please login to access the full content.

Subscribe

Access to the full content requires a subscription