<node id="657074">
  <nid>657074</nid>
  <type>news</type>
  <uid>
    <user id="34946"><![CDATA[34946]]></user>
  </uid>
  <created>1649353499</created>
  <changed>1656013493</changed>
  <title><![CDATA[Kostyuk Publishes Articles on Why Russian Cyberattacks Haven't Played a Major Role in Invasion Yet]]></title>
  <body><![CDATA[<p><a href="https://spp.gatech.edu/people/person/c3b89bed-4a08-5c31-b244-0cad76855623">Nadiya Kostyuk</a>, assistant professor in the School of Public Policy and the <a href="https://scp.cc.gatech.edu/">School of Cybersecurity and Privacy</a>, published two&nbsp;articles with Erik Gartzke, professor of political science at the University of California San Diego.</p>

<p>The <a href="http://theconversation.com/cyberattacks-have-yet-to-play-a-significant-role-in-russias-battlefield-operations-in-ukraine-cyberwarfare-experts-explain-the-likely-reasons-178604">first one</a>, published&nbsp;in <em>The Conversation&nbsp;</em>in April, is titled &ldquo;Cyberattacks Have yet to Play a Significant Role in Russia&rsquo;s Battlefield Operations in Ukraine &ndash; Cyberwarfare Experts Explain the Likely Reasons.&rdquo; The second <a href="https://tnsr.org/2022/06/why-cyber-dogs-have-yet-to-bark-loudly-in-russias-invasion-of-ukraine/">piece</a>, published in&nbsp;<em>Texas National Security Review</em>&#39;s Summer 2022 issue, is titled &quot;Why Cyber Dogs Have Yet to Bark Loudly in Russia&rsquo;s Invasion of Ukraine.&quot;</p>

<p>In both articles, Kostyuk and Gartzke note that Russia has not used significant cyberattacks in its invasion of Ukraine thus far, proving pundits and analysts who believed it would be an integral part of their military strategy wrong. In their April article, the authors theorize that Russia has yet to make cyberattacks a core part of the invasion because the cyber and military strikes accomplish different objectives. While cyberattacks help achieve informational goals, military ones are designed to overtake people and territory.</p>

<p>&ldquo;The various goals offered by Russian President Vladimir Putin for invading Ukraine, such as preventing Ukraine from joining NATO, replacing the government or countering fictitious Ukrainian weapons of mass destruction, require occupying territory,&rdquo; the authors write.</p>

<p>In their most recent piece, Kostyuk and Gartzke explain this lack of cyberattacks through their&nbsp;theory of &quot;indirect substitution,&quot; wherein countries with greater access to the Internet are more likely to be involved in cyberattacks, both as aggressors and as targets.</p>

<p>&quot;Though our research indicates that, for the time being, cyber warfare is more likely to be deployed independently from, rather than as a substitute for or complement to conventional warfare, it also indicates that a country&rsquo;s increased internet access is likely to lead to more cyber conflicts and less conventional conflict behavior,&quot; they write.</p>

<p>Read the full articles in&nbsp;<em><a href="https://theconversation.com/cyberattacks-have-yet-to-play-a-significant-role-in-russias-battlefield-operations-in-ukraine-cyberwarfare-experts-explain-the-likely-reasons-178604">The Conversation</a>&nbsp;</em>and&nbsp;<a href="https://tnsr.org/2022/06/why-cyber-dogs-have-yet-to-bark-loudly-in-russias-invasion-of-ukraine/"><em>Texas National Security Review</em></a>.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2022-06-23T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[The articles were published in "The Conversation" and "Texas National Security Review."]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>The articles were published in &quot;The Conversation&quot; and &quot;Texas National Security Review.&quot;</p>
]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="641781">
            <nid>641781</nid>
            <type>image</type>
            <title><![CDATA[Dr. Nadiya Kostyuk]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>243846</fid>
                  <filename><![CDATA[Kostyuk.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Kostyuk.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Kostyuk.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:gwyner3@gatech.edu">Grace Wyner</a></p>

<p>Communications Officer</p>

<p>School of Public Policy | Sam Nunn School of International Affairs</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>648414</item>
          <item>1289</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>648414</item>
          <item>1289</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[_OLD: Ivan Allen College &quot;The Buzz&quot;]]></item>
          <item><![CDATA[School of Public Policy]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>88401</tid>
        <value><![CDATA[Ukraine]]></value>
      </item>
          <item>
        <tid>170215</tid>
        <value><![CDATA[cyberattacks]]></value>
      </item>
          <item>
        <tid>1404</tid>
        <value><![CDATA[Cybersecurity]]></value>
      </item>
          <item>
        <tid>189792</tid>
        <value><![CDATA[Russia-Ukraine]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
