{"657074":{"#nid":"657074","#data":{"type":"news","title":"Kostyuk Publishes Articles on Why Russian Cyberattacks Haven\u0027t Played a Major Role in Invasion Yet","body":[{"value":"\u003Cp\u003E\u003Ca href=\u0022https:\/\/spp.gatech.edu\/people\/person\/c3b89bed-4a08-5c31-b244-0cad76855623\u0022\u003ENadiya Kostyuk\u003C\/a\u003E, assistant professor in the School of Public Policy and the \u003Ca href=\u0022https:\/\/scp.cc.gatech.edu\/\u0022\u003ESchool of Cybersecurity and Privacy\u003C\/a\u003E, published two\u0026nbsp;articles with Erik Gartzke, professor of political science at the University of California San Diego.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe \u003Ca href=\u0022http:\/\/theconversation.com\/cyberattacks-have-yet-to-play-a-significant-role-in-russias-battlefield-operations-in-ukraine-cyberwarfare-experts-explain-the-likely-reasons-178604\u0022\u003Efirst one\u003C\/a\u003E, published\u0026nbsp;in \u003Cem\u003EThe Conversation\u0026nbsp;\u003C\/em\u003Ein April, is titled \u0026ldquo;Cyberattacks Have yet to Play a Significant Role in Russia\u0026rsquo;s Battlefield Operations in Ukraine \u0026ndash; Cyberwarfare Experts Explain the Likely Reasons.\u0026rdquo; The second \u003Ca href=\u0022https:\/\/tnsr.org\/2022\/06\/why-cyber-dogs-have-yet-to-bark-loudly-in-russias-invasion-of-ukraine\/\u0022\u003Epiece\u003C\/a\u003E, published in\u0026nbsp;\u003Cem\u003ETexas National Security Review\u003C\/em\u003E\u0026#39;s Summer 2022 issue, is titled \u0026quot;Why Cyber Dogs Have Yet to Bark Loudly in Russia\u0026rsquo;s Invasion of Ukraine.\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn both articles, Kostyuk and Gartzke note that Russia has not used significant cyberattacks in its invasion of Ukraine thus far, proving pundits and analysts who believed it would be an integral part of their military strategy wrong. In their April article, the authors theorize that Russia has yet to make cyberattacks a core part of the invasion because the cyber and military strikes accomplish different objectives. While cyberattacks help achieve informational goals, military ones are designed to overtake people and territory.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;The various goals offered by Russian President Vladimir Putin for invading Ukraine, such as preventing Ukraine from joining NATO, replacing the government or countering fictitious Ukrainian weapons of mass destruction, require occupying territory,\u0026rdquo; the authors write.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn their most recent piece, Kostyuk and Gartzke explain this lack of cyberattacks through their\u0026nbsp;theory of \u0026quot;indirect substitution,\u0026quot; wherein countries with greater access to the Internet are more likely to be involved in cyberattacks, both as aggressors and as targets.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026quot;Though our research indicates that, for the time being, cyber warfare is more likely to be deployed independently from, rather than as a substitute for or complement to conventional warfare, it also indicates that a country\u0026rsquo;s increased internet access is likely to lead to more cyber conflicts and less conventional conflict behavior,\u0026quot; they write.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ERead the full articles in\u0026nbsp;\u003Cem\u003E\u003Ca href=\u0022https:\/\/theconversation.com\/cyberattacks-have-yet-to-play-a-significant-role-in-russias-battlefield-operations-in-ukraine-cyberwarfare-experts-explain-the-likely-reasons-178604\u0022\u003EThe Conversation\u003C\/a\u003E\u0026nbsp;\u003C\/em\u003Eand\u0026nbsp;\u003Ca href=\u0022https:\/\/tnsr.org\/2022\/06\/why-cyber-dogs-have-yet-to-bark-loudly-in-russias-invasion-of-ukraine\/\u0022\u003E\u003Cem\u003ETexas National Security Review\u003C\/em\u003E\u003C\/a\u003E.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe articles were published in \u0026quot;The Conversation\u0026quot; and \u0026quot;Texas National Security Review.\u0026quot;\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"The articles were published in \u0022The Conversation\u0022 and \u0022Texas National Security Review.\u0022"}],"uid":"34946","created_gmt":"2022-04-07 17:44:59","changed_gmt":"2022-06-23 19:44:53","author":"gwyner3","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2022-06-23T00:00:00-04:00","iso_date":"2022-06-23T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"641781":{"id":"641781","type":"image","title":"Dr. Nadiya Kostyuk","body":null,"created":"1606921912","gmt_created":"2020-12-02 15:11:52","changed":"1606921912","gmt_changed":"2020-12-02 15:11:52","alt":"","file":{"fid":"243846","name":"Kostyuk.jpg","image_path":"\/sites\/default\/files\/images\/Kostyuk.jpg","image_full_path":"http:\/\/www.tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/Kostyuk.jpg","mime":"image\/jpeg","size":12342,"path_740":"http:\/\/www.tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Kostyuk.jpg?itok=c5FmWrNI"}}},"media_ids":["641781"],"groups":[{"id":"648414","name":"_OLD: Ivan Allen College \u0022The Buzz\u0022"},{"id":"1289","name":"School of Public Policy"}],"categories":[],"keywords":[{"id":"88401","name":"Ukraine"},{"id":"170215","name":"cyberattacks"},{"id":"1404","name":"Cybersecurity"},{"id":"189792","name":"Russia-Ukraine"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:gwyner3@gatech.edu\u0022\u003EGrace Wyner\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003ECommunications Officer\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of Public Policy | Sam Nunn School of International Affairs\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}