Research Article
BibTex RIS Cite
Year 2023, Volume: 23 Issue: 2, 163 - 184, 10.05.2023
https://doi.org/10.21121/eab.1083229

Abstract

References

  • Akoto, W. (2021). International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks. Journal of Peace Research. https://doi.org/10.1177/0022343320964549
  • Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings.
  • Andrijcic, E., & Horowitz, B. (2006). A macro‐economic framework for evaluation of cyber security risks related to protection of intellectual property. Risk analysis, 26(4), 907-923.
  • Applegate, S. D., & Stavrou, A. (2013). Towards a cyber conflict taxonomy. In 2013 5th International Conference on Cyber Conflict (CYCON 2013) (pp. 1-18). IEEE.
  • Barrett, M., Davidson, E., Prabhu, J., & Vargo, S. L. (2015). Service innovation in the digital age. MIS quarterly, 39(1), 135-154.
  • Barrinha, A., & Renard, T. (2017). Cyber-diplomacy: the making of an international society in the digital age. Global Affairs, 3(4-5), 353-364.
  • Bobo, L. (1983). Whites' opposition to busing: Symbolic racism or realistic group conflict?. journal of personality and social psychology, 45(6), 1196.
  • Braun, V., & Clarke, V. (2021). To saturate or not to saturate? Questioning data saturation as a useful concept for thematic analysis and sample-size rationales. Qualitative research in sport, exercise and health, 13(2), 201-216.
  • Brief, A. P., Umphress, E. E., Dietz, J., Burrows, J. W., Butz, R. M., & Scholten, L. (2005). Community matters: Realistic group conflict theory and the impact of diversity. Academy of Management Journal, 48(5), 830-844.
  • Broadhurst, R. (2006). Developments in the global law enforcement of cyber‐crime. Policing: An International Journal, 29(3), 408-433.https://doi.org/10.1108/13639510610684674
  • Bryant, A. (2017). Grounded theory and grounded theorizing: Pragmatism in research practice. Oxford University Press.
  • Bryant, A., & Charmaz, K. (Eds.). (2007). The Sage handbook of grounded theory. Sage.
  • Butler, A. E., Copnell, B., & Hall, H. (2018). The development of theoretical sampling in practice. Collegian, 25(5), 561-566.
  • Campbell, T. A., & Ivanova, O. S. (2013). 3D printing of multifunctional nanocomposites. Nano Today, 8(2), 119-120.
  • Caridi, M., Moretto, A., Perego, A., & Tumino, A. (2014). The benefits of supply chain visibility: A value assessment model. International Journal of Production Economics, 151, 1-19.
  • Carmigniani, J., Furht, B., Anisetti, M., Ceravolo, P., Damiani, E., & Ivkovic, M. (2011). Augmented reality technologies, systems and applications. Multimedia tools and applications, 51(1), 341-377.
  • Charmaz, K. (2014). Constructing grounded theory. Sage.
  • Charmaz, K. (2017). Special invited paper: Continuities, contradictions, and critical inquiry in grounded theory. International Journal of Qualitative Methods, 16(1), 1-8.
  • Conlon, C., Timonen, V., Elliott-O’Dare, C., O’Keeffe, S., & Foley, G. (2020). Confused about theoretical sampling? Engaging theoretical sampling in diverse grounded theory studies. Qualitative Health Research, 30(6), 947-959.
  • Danyk, Y., Maliarchuk, T., & Briggs, C. (2017). Hybrid war: High-tech, information and cyber conflicts. Connections, 16(2), 5-24.
  • Denning, D. E. (2014). Framework and principles for active cyber defense. Computers & Security, 40, 108-113.
  • Dipert, R. R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384-410.
  • Draucker, C. B., Martsolf, D. S., Ross, R., & Rusk, T. B. (2007). Theoretical sampling and category development in grounded theory. Qualitative health research, 17(8), 1137-1148.
  • Emig, C., Brandt, F., Kreuzer, S., & Abeck, S. (2007). Identity as a service–towards a service-oriented identity management architecture. In Meeting of the European Network of Universities and Companies in Information and Communication Engineering (pp. 1-8). Springer, Berlin, Heidelberg.
  • Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P. (2011). Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 30(1), 28-38.
  • Gayer, C. C., Landman, S., Halperin, E., & Bar-Tal, D. (2009). Overcoming psychological barriers to peaceful conflict resolution: The role of arguments about losses. Journal of Conflict Resolution, 53(6), 951-975.
  • Gompert, D. C., & Libicki, M. (2014). Cyber warfare and Sino-American crisis instability. Survival, 56(4), 7-22.
  • Heckman, K. E., Walsh, M. J., Stech, F. J., O'boyle, T. A., DiCato, S. R., & Herber, A. F. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment. computers & security, 37, 72-77.
  • Ishii, K. (2010). Conflict management in online relationships. Cyberpsychology, Behavior, and Social Networking, 13(4), 365-370.
  • Junio, T. J. (2013). How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. Journal of Strategic Studies, 36(1), 125-133.
  • Karatzogianni, A. (2008). Cyber-conflict and global politics. Routledge.
  • Kato, S., Takeuchi, E., Ishiguro, Y., Ninomiya, Y., Takeda, K., & Hamada, T. (2015). An open approach to autonomous vehicles. IEEE Micro, 35(6), 60-68.
  • Kendall, J. (1999). Axial coding and the grounded theory controversy. Western journal of nursing research, 21(6), 743-757.
  • Lee, J., Ardakani, H. D., Yang, S., & Bagheri, B. (2015). Industrial big data analytics and cyber-physical systems for future maintenance & service innovation. Procedia cirp, 38, 3-7.
  • Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2020). A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841-853.
  • Li, X., Liang, X., Lu, R., Shen, X., Lin, X., & Zhu, H. (2012). Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine, 50(8), 38-45.
  • Li, R., Zhao, Z., Zhou, X., Ding, G., Chen, Y., Wang, Z., & Zhang, H. (2017). Intelligent 5G: When cellular networks meet artificial intelligence. IEEE Wireless communications, 24(5), 175-183.
  • Lin, H. (2012). Escalation dynamics and conflict termination in cyberspace. Strategic Studies Quarterly, 6(3), 46-70.
  • Lu, W., Xu, S., & Yi, X. (2013). Optimizing active cyber defense. In International Conference on Decision and Game Theory for Security (pp. 206-225). Springer, Cham.
  • Monostori, L. (2014). Cyber-physical production systems: Roots, expectations and R&D challenges. Procedia Cirp, 17, 9-13.
  • Nelson, L. K. (2020). Computational grounded theory: A methodological framework. Sociological Methods & Research, 49(1), 3-42.
  • Palinkas, L. A., Horwitz, S. M., Green, C. A., Wisdom, J. P., Duan, N., & Hoagwood, K. (2015). Purposeful Sampling for Qualitative Data Collection and Analysis in Mixed Method Implementation Research. Administration and policy in mental health, 42(5), 533–544. https://doi.org/10.1007/s10488-013-0528-y
  • Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in industry, 102, 14-22.
  • Rand, E. J. (2013). Queer critical rhetoric bites back. Western Journal of Communication, 77(5), 533-537.
  • Robinson, O. C. (2014). Sampling in interview-based qualitative research: A theoretical and practical guide. Qualitative research in psychology, 11(1), 25-41. Rush, F. (2004). Critical Theory. Cambridge: Cambridge UP.
  • Shackelford, S. J. (2014). Managing cyber attacks in international law, business, and relations: In search of cyber peace. Cambridge University Press.
  • Sharma, S. K., Telfer, M., Phua, S. T., & Chandler, H. (2012). A pragmatic method for estimating greenhouse gas emissions from leakage for Improved Forest Management projects under the Verified Carbon Standard. Greenhouse Gas Measurement and Management, 2(1), 22-32.
  • Shi, L., Jia, C., Lü, S., & Liu, Z. (2007). Port and address hopping for active cyber-defense. In Pacific-Asia Workshop on Intelligence and Security Informatics (pp. 295-300). Springer, Berlin, Heidelberg.
  • Strauss, A., & Corbin, J. M. (1997). Grounded theory in practice. Sage.
  • Taillat, S. (2019). Disrupt and restraint: The evolution of cyber conflict and the implications for collective security. Contemporary Security Policy, 40(3), 368-381. Walker, D., & Myrick, F. (2006). Grounded theory: An exploration of process and procedure. Qualitative health research, 16(4), 547-559.
  • Xu, S., Lu, W., & Li, H. (2015). A stochastic model of active cyber defense dynamics. Internet Mathematics, 11(1), 23-61.
  • Valeriano, B., & Maness, R. C. (2014). The dynamics of cyber conflict between rival antagonists, 2001–11. Journal of Peace Research, 51(3), 347–360. https://doi.org/10.1177/0022343313518940
  • Vollstedt, M., & Rezat, S. (2019). An introduction to grounded theory with a special focus on axial coding and the coding paradigm. Compendium for early career researchers in mathematics education, 13, 81-100.
  • Zollo, L., Roccella, S., Guglielmelli, E., Carrozza, M. C., & Dario, P. (2007). Biomechatronic design and control of an anthropomorphic artificial hand for prosthetic and robotic applications. IEEE/ASME Transactions On Mechatronics, 12(4), 418-429.

Relativity Approach to the Strategic Cyber Conflict Management in Businesses

Year 2023, Volume: 23 Issue: 2, 163 - 184, 10.05.2023
https://doi.org/10.21121/eab.1083229

Abstract

Purpose: The study aims to form a theoretical basis for the development of strategies needed by businesses and establish strategic principles. The starting point of this research is that cyber conflict is an operational, managerial, relational, and strategic problem of businesses rather than a cross-country administrative problem.
Design/methodology/approach: This research was carried out by adopting grounded theory, known as theorizing-based theory. The study was carried out with 593 limited liability and joint-stock companies operating in Turkey.
Findings: The research results revealed a new theory named "relativity of strategic cyber conflict management". According to the research findings, the five orbital forces (negotiation, managerial, infrastructure, defense, competition) were determined in cyber conflict management. Four principles were determined as a business within the system (location in space), the business within cyber cosmos (relativity of time), warping spacetime due to cyber conflict (Curvature of strategy), and illusions due to cyber conflict (Gravitational lenses).
Originality: This study introduces a new theory of the cyber conflict management with the inspiration of the principles of relativity theory.

References

  • Akoto, W. (2021). International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks. Journal of Peace Research. https://doi.org/10.1177/0022343320964549
  • Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings.
  • Andrijcic, E., & Horowitz, B. (2006). A macro‐economic framework for evaluation of cyber security risks related to protection of intellectual property. Risk analysis, 26(4), 907-923.
  • Applegate, S. D., & Stavrou, A. (2013). Towards a cyber conflict taxonomy. In 2013 5th International Conference on Cyber Conflict (CYCON 2013) (pp. 1-18). IEEE.
  • Barrett, M., Davidson, E., Prabhu, J., & Vargo, S. L. (2015). Service innovation in the digital age. MIS quarterly, 39(1), 135-154.
  • Barrinha, A., & Renard, T. (2017). Cyber-diplomacy: the making of an international society in the digital age. Global Affairs, 3(4-5), 353-364.
  • Bobo, L. (1983). Whites' opposition to busing: Symbolic racism or realistic group conflict?. journal of personality and social psychology, 45(6), 1196.
  • Braun, V., & Clarke, V. (2021). To saturate or not to saturate? Questioning data saturation as a useful concept for thematic analysis and sample-size rationales. Qualitative research in sport, exercise and health, 13(2), 201-216.
  • Brief, A. P., Umphress, E. E., Dietz, J., Burrows, J. W., Butz, R. M., & Scholten, L. (2005). Community matters: Realistic group conflict theory and the impact of diversity. Academy of Management Journal, 48(5), 830-844.
  • Broadhurst, R. (2006). Developments in the global law enforcement of cyber‐crime. Policing: An International Journal, 29(3), 408-433.https://doi.org/10.1108/13639510610684674
  • Bryant, A. (2017). Grounded theory and grounded theorizing: Pragmatism in research practice. Oxford University Press.
  • Bryant, A., & Charmaz, K. (Eds.). (2007). The Sage handbook of grounded theory. Sage.
  • Butler, A. E., Copnell, B., & Hall, H. (2018). The development of theoretical sampling in practice. Collegian, 25(5), 561-566.
  • Campbell, T. A., & Ivanova, O. S. (2013). 3D printing of multifunctional nanocomposites. Nano Today, 8(2), 119-120.
  • Caridi, M., Moretto, A., Perego, A., & Tumino, A. (2014). The benefits of supply chain visibility: A value assessment model. International Journal of Production Economics, 151, 1-19.
  • Carmigniani, J., Furht, B., Anisetti, M., Ceravolo, P., Damiani, E., & Ivkovic, M. (2011). Augmented reality technologies, systems and applications. Multimedia tools and applications, 51(1), 341-377.
  • Charmaz, K. (2014). Constructing grounded theory. Sage.
  • Charmaz, K. (2017). Special invited paper: Continuities, contradictions, and critical inquiry in grounded theory. International Journal of Qualitative Methods, 16(1), 1-8.
  • Conlon, C., Timonen, V., Elliott-O’Dare, C., O’Keeffe, S., & Foley, G. (2020). Confused about theoretical sampling? Engaging theoretical sampling in diverse grounded theory studies. Qualitative Health Research, 30(6), 947-959.
  • Danyk, Y., Maliarchuk, T., & Briggs, C. (2017). Hybrid war: High-tech, information and cyber conflicts. Connections, 16(2), 5-24.
  • Denning, D. E. (2014). Framework and principles for active cyber defense. Computers & Security, 40, 108-113.
  • Dipert, R. R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9(4), 384-410.
  • Draucker, C. B., Martsolf, D. S., Ross, R., & Rusk, T. B. (2007). Theoretical sampling and category development in grounded theory. Qualitative health research, 17(8), 1137-1148.
  • Emig, C., Brandt, F., Kreuzer, S., & Abeck, S. (2007). Identity as a service–towards a service-oriented identity management architecture. In Meeting of the European Network of Universities and Companies in Information and Communication Engineering (pp. 1-8). Springer, Berlin, Heidelberg.
  • Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P. (2011). Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 30(1), 28-38.
  • Gayer, C. C., Landman, S., Halperin, E., & Bar-Tal, D. (2009). Overcoming psychological barriers to peaceful conflict resolution: The role of arguments about losses. Journal of Conflict Resolution, 53(6), 951-975.
  • Gompert, D. C., & Libicki, M. (2014). Cyber warfare and Sino-American crisis instability. Survival, 56(4), 7-22.
  • Heckman, K. E., Walsh, M. J., Stech, F. J., O'boyle, T. A., DiCato, S. R., & Herber, A. F. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment. computers & security, 37, 72-77.
  • Ishii, K. (2010). Conflict management in online relationships. Cyberpsychology, Behavior, and Social Networking, 13(4), 365-370.
  • Junio, T. J. (2013). How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. Journal of Strategic Studies, 36(1), 125-133.
  • Karatzogianni, A. (2008). Cyber-conflict and global politics. Routledge.
  • Kato, S., Takeuchi, E., Ishiguro, Y., Ninomiya, Y., Takeda, K., & Hamada, T. (2015). An open approach to autonomous vehicles. IEEE Micro, 35(6), 60-68.
  • Kendall, J. (1999). Axial coding and the grounded theory controversy. Western journal of nursing research, 21(6), 743-757.
  • Lee, J., Ardakani, H. D., Yang, S., & Bagheri, B. (2015). Industrial big data analytics and cyber-physical systems for future maintenance & service innovation. Procedia cirp, 38, 3-7.
  • Li, X., Jiang, P., Chen, T., Luo, X., & Wen, Q. (2020). A survey on the security of blockchain systems. Future Generation Computer Systems, 107, 841-853.
  • Li, X., Liang, X., Lu, R., Shen, X., Lin, X., & Zhu, H. (2012). Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine, 50(8), 38-45.
  • Li, R., Zhao, Z., Zhou, X., Ding, G., Chen, Y., Wang, Z., & Zhang, H. (2017). Intelligent 5G: When cellular networks meet artificial intelligence. IEEE Wireless communications, 24(5), 175-183.
  • Lin, H. (2012). Escalation dynamics and conflict termination in cyberspace. Strategic Studies Quarterly, 6(3), 46-70.
  • Lu, W., Xu, S., & Yi, X. (2013). Optimizing active cyber defense. In International Conference on Decision and Game Theory for Security (pp. 206-225). Springer, Cham.
  • Monostori, L. (2014). Cyber-physical production systems: Roots, expectations and R&D challenges. Procedia Cirp, 17, 9-13.
  • Nelson, L. K. (2020). Computational grounded theory: A methodological framework. Sociological Methods & Research, 49(1), 3-42.
  • Palinkas, L. A., Horwitz, S. M., Green, C. A., Wisdom, J. P., Duan, N., & Hoagwood, K. (2015). Purposeful Sampling for Qualitative Data Collection and Analysis in Mixed Method Implementation Research. Administration and policy in mental health, 42(5), 533–544. https://doi.org/10.1007/s10488-013-0528-y
  • Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in industry, 102, 14-22.
  • Rand, E. J. (2013). Queer critical rhetoric bites back. Western Journal of Communication, 77(5), 533-537.
  • Robinson, O. C. (2014). Sampling in interview-based qualitative research: A theoretical and practical guide. Qualitative research in psychology, 11(1), 25-41. Rush, F. (2004). Critical Theory. Cambridge: Cambridge UP.
  • Shackelford, S. J. (2014). Managing cyber attacks in international law, business, and relations: In search of cyber peace. Cambridge University Press.
  • Sharma, S. K., Telfer, M., Phua, S. T., & Chandler, H. (2012). A pragmatic method for estimating greenhouse gas emissions from leakage for Improved Forest Management projects under the Verified Carbon Standard. Greenhouse Gas Measurement and Management, 2(1), 22-32.
  • Shi, L., Jia, C., Lü, S., & Liu, Z. (2007). Port and address hopping for active cyber-defense. In Pacific-Asia Workshop on Intelligence and Security Informatics (pp. 295-300). Springer, Berlin, Heidelberg.
  • Strauss, A., & Corbin, J. M. (1997). Grounded theory in practice. Sage.
  • Taillat, S. (2019). Disrupt and restraint: The evolution of cyber conflict and the implications for collective security. Contemporary Security Policy, 40(3), 368-381. Walker, D., & Myrick, F. (2006). Grounded theory: An exploration of process and procedure. Qualitative health research, 16(4), 547-559.
  • Xu, S., Lu, W., & Li, H. (2015). A stochastic model of active cyber defense dynamics. Internet Mathematics, 11(1), 23-61.
  • Valeriano, B., & Maness, R. C. (2014). The dynamics of cyber conflict between rival antagonists, 2001–11. Journal of Peace Research, 51(3), 347–360. https://doi.org/10.1177/0022343313518940
  • Vollstedt, M., & Rezat, S. (2019). An introduction to grounded theory with a special focus on axial coding and the coding paradigm. Compendium for early career researchers in mathematics education, 13, 81-100.
  • Zollo, L., Roccella, S., Guglielmelli, E., Carrozza, M. C., & Dario, P. (2007). Biomechatronic design and control of an anthropomorphic artificial hand for prosthetic and robotic applications. IEEE/ASME Transactions On Mechatronics, 12(4), 418-429.
There are 54 citations in total.

Details

Primary Language English
Subjects Business Administration
Journal Section Research Article
Authors

Fahri Özsungur 0000-0001-6567-766X

Early Pub Date May 4, 2023
Publication Date May 10, 2023
Acceptance Date September 29, 2022
Published in Issue Year 2023 Volume: 23 Issue: 2

Cite

APA Özsungur, F. (2023). Relativity Approach to the Strategic Cyber Conflict Management in Businesses. Ege Academic Review, 23(2), 163-184. https://doi.org/10.21121/eab.1083229
AMA Özsungur F. Relativity Approach to the Strategic Cyber Conflict Management in Businesses. ear. May 2023;23(2):163-184. doi:10.21121/eab.1083229
Chicago Özsungur, Fahri. “Relativity Approach to the Strategic Cyber Conflict Management in Businesses”. Ege Academic Review 23, no. 2 (May 2023): 163-84. https://doi.org/10.21121/eab.1083229.
EndNote Özsungur F (May 1, 2023) Relativity Approach to the Strategic Cyber Conflict Management in Businesses. Ege Academic Review 23 2 163–184.
IEEE F. Özsungur, “Relativity Approach to the Strategic Cyber Conflict Management in Businesses”, ear, vol. 23, no. 2, pp. 163–184, 2023, doi: 10.21121/eab.1083229.
ISNAD Özsungur, Fahri. “Relativity Approach to the Strategic Cyber Conflict Management in Businesses”. Ege Academic Review 23/2 (May 2023), 163-184. https://doi.org/10.21121/eab.1083229.
JAMA Özsungur F. Relativity Approach to the Strategic Cyber Conflict Management in Businesses. ear. 2023;23:163–184.
MLA Özsungur, Fahri. “Relativity Approach to the Strategic Cyber Conflict Management in Businesses”. Ege Academic Review, vol. 23, no. 2, 2023, pp. 163-84, doi:10.21121/eab.1083229.
Vancouver Özsungur F. Relativity Approach to the Strategic Cyber Conflict Management in Businesses. ear. 2023;23(2):163-84.