The information revolution Flashcards

(31 cards)

1
Q

Information Revolution

A

The transformation of international affairs due to the rise of digital technologies, including internet, social media, and artificial intelligence, reshaping diplomacy, warfare, and state sovereignty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber Attack vs Cyber Exploitation

A

Cyber attacks involve overt disruption or destruction (e.g. Stuxnet), while cyber exploitation involves covert surveillance, espionage, or data theft (e.g. PRISM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stuxnet Example

A

A U.S.-Israeli cyberweapon used to sabotage Iranian nuclear facilities by damaging centrifuges—first known offensive cyberattack to cause physical damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Joseph Nye on Cyber Power

A

In the global information age, both soft power (influence) and hard power (coercion) intersect—cyberspace requires smart power strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sovereignty in Cyberspace

A

Digital networks bypass physical borders, challenging traditional state sovereignty and allowing remote intervention in domestic affairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anonymity in Cyber Conflict

A

Attribution is difficult—states can deny involvement, enabling covert escalation and strategic ambiguity (e.g. Russia’s use of proxies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetry of Cyber Conflict

A

Weaker states or non-state actors can harm powerful states using cheap, high-impact cyber tools—e.g. North Korea’s Sony hack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strategic Communication via Social Media

A

States and actors use platforms like Twitter, TikTok to shape global narratives—seen in Ukraine’s real-time PR war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disinformation Campaigns

A

Systematic efforts to spread falsehoods to confuse, divide, or manipulate public opinion—e.g. Russian interference in US elections (2016).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber Espionage

A

The theft of sensitive political, military, or commercial information—e.g. China’s alleged IP theft from U.S. firms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyber Deterrence Challenge

A

Traditional deterrence models struggle in cyberspace due to attribution problems, low barriers to entry, and difficulty proving retaliation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Soft Power in Digital Age

A

States use culture, values, and information flow to attract and influence others—now amplified by global connectivity and platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Diplomacy

A

Foreign policy conducted via digital tools and platforms, e.g. online negotiations, embassy tweets, and cyber norms discussions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Eriksson & Giacomello (2006)

A

Cyber challenges realism and liberalism: IR theory must adapt to non-territorial, anonymous, and fluid digital environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kello (2013) on Cyber Revolution

A

Warns of theoretical lag—cyber threats are unprecedented in scale and ambiguity, yet under-theorised in IR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Post-Snowden Paradigm Shift

A

Revealed the extent of US surveillance, eroding soft power and sparking global debates on privacy, legitimacy, and digital imperialism.

17
Q

Public-Private Cybersecurity

A

Governments depend on tech firms (e.g. Microsoft, Amazon) to protect infrastructure, making them key actors in IR.

18
Q

AI and Strategic Affairs (Payne, 2018)

A

AI revolutionizes decision-making in war and diplomacy—autonomous weapons, predictive analytics, and escalation risks are growing.

19
Q

Cybersecurity and International Law

A

Few binding rules govern cyber conflict—norms are emerging, but enforcement and consensus are weak.

20
Q

Information Terrain as Battlespace

A

Control of digital narratives (memes, hashtags, news cycles) can shape legitimacy and public support in wartime.

21
Q

Russia’s Cyber Strategy (Sohl, 2022)

A

Uses cyber to destabilize adversaries, including discrediting democratic institutions and conducting psychological warfare.

22
Q

Ukraine Cyber Defence (2022)

A

Ukraine used tech partnerships (e.g. with Starlink) and public messaging to counter Russian attacks and gain global support.

23
Q

Cambridge Analytica Scandal

A

Demonstrated how data analytics and microtargeting can influence elections—blurring lines between psywar and political consultancy.

24
Q

AI-Enabled Disinformation

A

Deepfakes and AI-generated media increase speed, scale, and believability of false information in international discourse.

25
Cyber Norms Debate
Disagreement between states over what constitutes a cyberattack, legitimate retaliation, and acceptable espionage.
26
Valeriano & Maness (2015)
Challenge alarmism—argue cyber incidents are more restrained, state-centric, and often used as signaling rather than war.
27
Burton (2022) on Cyber Conflict Studies
Calls for better integration of political theory, technology, and empirical data in studying cyber power dynamics.
28
Low Entry Cost in Cyber Conflict
A teenager with skills or a small group can attack state infrastructure—democratization of destructive potential.
29
Cyber Conflict and Civil Society
Activists and journalists are both targets and participants—seen in China’s censorship or global digital protest movements.
30
Information Revolution and Multipolarity
Tech shifts power from West to rising cyber powers (China, India), fragmenting traditional U.S.-led global order.
31
Cyberspace as the Fifth Domain
In addition to land, sea, air, and space, cyberspace is now recognized as a domain of conflict by NATO and national militaries.