IDEAS home Printed from https://ideas.repec.org/a/pal/palcom/v12y2025i1d10.1057_s41599-025-04897-7.html
   My bibliography  Save this article

Spatiotemporal characteristics and drivers of global cyber conflicts

Author

Listed:
  • Jiping Dong

    (Chinese Academy of Sciences
    University of Chinese Academy of Sciences)

  • Shuai Chen

    (Chinese Academy of Sciences
    University of Chinese Academy of Sciences)

  • Fangyu Ding

    (Chinese Academy of Sciences
    University of Chinese Academy of Sciences)

  • Jun Zhuo

    (Chinese Academy of Sciences
    University of Chinese Academy of Sciences)

  • Mengmeng Hao

    (Chinese Academy of Sciences
    University of Chinese Academy of Sciences)

Abstract

In recent years, state-sponsored malicious cyber activities have emerged incessantly, which has resulted in an increasingly severe international cybersecurity landscape. To respond to this challenge, researchers have engaged in extensive inquiries. Regrettably, these studies seldom quantitatively analyse the characteristics and factors influencing cyber conflicts from a geopolitical perspective. In this context, on the basis of a dataset encompassing cyber conflict incidents, national internal attributes and bilateral relations, we employ methods such as social network analysis and statistical regression analysis to explore the evolutionary trends, network structure, connectivity patterns, and drivers behind cyber conflicts. The results indicate that, on the one hand, cyber conflicts among countries mirror the geopolitical dynamics of the physical world and exhibit characteristics of regionalism similar to traditional geopolitical competition. There are several obvious cyber conflict groups in cyberspace, such as the South Asian conflict group, which is composed of India, Afghanistan, and Pakistan. On the other hand, interstate cyber conflicts are influenced by domestic characteristics and foreign policies, with pronounced regional differences. For example, in areas such as the Middle East and Eastern Europe, where disputes and wars are frequent, confrontational military policies and strong technological innovation capabilities could exacerbate cyber conflicts within the region. In summary, we adopt a comprehensive and multidimensional approach with the aim to provide insights and references for related studies.

Suggested Citation

  • Jiping Dong & Shuai Chen & Fangyu Ding & Jun Zhuo & Mengmeng Hao, 2025. "Spatiotemporal characteristics and drivers of global cyber conflicts," Palgrave Communications, Palgrave Macmillan, vol. 12(1), pages 1-12, December.
  • Handle: RePEc:pal:palcom:v:12:y:2025:i:1:d:10.1057_s41599-025-04897-7
    DOI: 10.1057/s41599-025-04897-7
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1057/s41599-025-04897-7
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1057/s41599-025-04897-7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Candice Tran Dai & Miguel Alberto Gomez, 2018. "Challenges and opportunities for cyber norms in ASEAN," Journal of Cyber Policy, Taylor & Francis Journals, vol. 3(2), pages 217-235, May.
    2. Tim Stevens, 2018. "Global Cybersecurity: New Directions in Theory and Methods," Politics and Governance, Cogitatio Press, vol. 6(2), pages 1-4.
    3. Shuai Chen & Mengmeng Hao & Fangyu Ding & Dong Jiang & Jiping Dong & Shize Zhang & Qiquan Guo & Chundong Gao, 2023. "Exploring the global geography of cybercrime and its driving forces," Palgrave Communications, Palgrave Macmillan, vol. 10(1), pages 1-10, December.
    4. Rajeev Goel & Michael Nelson, 2009. "Determinants of software piracy: economics, institutions, and technology," The Journal of Technology Transfer, Springer, vol. 34(6), pages 637-658, December.
    5. Ott, Christopher, 2022. "The new offensive cyber security: Strategically using asymmetrical tactics to promote information security," Cyber Security: A Peer-Reviewed Journal, Henry Stewart Publications, vol. 5(4), pages 286-293, June.
    6. Ziming Yan & Xiaojuan Qiu & Debin Du & Seamus Grimes, 2022. "Transboundary Water Cooperation in the Post-Cold War Era: Spatial Patterns and the Role of Proximity," IJERPH, MDPI, vol. 19(3), pages 1-19, January.
    7. William Akoto, 2021. "International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks," Journal of Peace Research, Peace Research Institute Oslo, vol. 58(5), pages 1083-1097, September.
    8. Tim Stevens, 2018. "Global Cybersecurity: New Directions in Theory and Methods," Politics and Governance, Cogitatio Press, vol. 6(2), pages 1-4.
    9. Elizabeth Gibney, 2022. "Where is Russia’s cyberwar? Researchers decipher its strategy," Nature, Nature, vol. 603(7903), pages 775-776, March.
    10. Lance Y. Hunter & Craig D. Albert & Eric Garrett & Josh Rutland, 2022. "Democracy and cyberconflict: how regime type affects state-sponsored cyberattacks," Journal of Cyber Policy, Taylor & Francis Journals, vol. 7(1), pages 72-94, January.
    11. Ziming Bai & Chenyang Liu & Hongye Wang & Cuixia Li, 2023. "Evolution Characteristics and Influencing Factors of Global Dairy Trade," Sustainability, MDPI, vol. 15(2), pages 1-20, January.
    12. Moravcsik, Andrew, 1997. "Taking Preferences Seriously: A Liberal Theory of International Politics," International Organization, Cambridge University Press, vol. 51(4), pages 513-553, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Aukje van Loon, 2020. "The Selective Politicization of Transatlantic Trade Negotiations," Politics and Governance, Cogitatio Press, vol. 8(1), pages 325-335.
    2. Andrés, Antonio R. & Goel, Rajeev K., 2012. "Does software piracy affect economic growth? Evidence across countries," Journal of Policy Modeling, Elsevier, vol. 34(2), pages 284-295.
    3. Klaus H. Goetz & Ronny Patz & Theresa Squatrito, 2017. "Resourcing Global Justice: The Resource Management Design of International Courts," Global Policy, London School of Economics and Political Science, vol. 8, pages 62-74, August.
    4. Annie Young Song, 2023. "Beyond intergovernmental cooperation: domestic politics of transboundary air pollution in Korea and Singapore," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 23(4), pages 397-413, December.
    5. Simplice A. Asongu & Antonio R. Andrés, 2017. "The impact of software piracy on inclusive human development: evidence from Africa," International Review of Applied Economics, Taylor & Francis Journals, vol. 31(5), pages 585-607, September.
    6. Jeffry Frieden & Stefanie Walter, 2019. "Analyzing inter-state negotiations in the Eurozone crisis and beyond," European Union Politics, , vol. 20(1), pages 134-151, March.
    7. Anna Michalski, 2013. "Europeanization of National Foreign Policy: The Case of Denmark's and Sweden's Relations with China," Journal of Common Market Studies, Wiley Blackwell, vol. 51(5), pages 884-900, September.
    8. Vennesson Pascal, 2010. "Military Strategy in the Global Village," New Global Studies, De Gruyter, vol. 3(3), pages 1-43, February.
    9. German Blanco & Rajeev K. Goel & Rati Ram, 2023. "What drives the production and diffusion of mobile apps? An international investigation," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 44(2), pages 828-838, March.
    10. Matera Paulina & Matera Rafał, 2019. "Why does cooperation work or fail? The case of EU-US sanction policy against Iran," Croatian International Relations Review, Sciendo, vol. 25(85), pages 30-62, November.
    11. Simplice Asongu, 2014. "Software piracy, inequality and the poor: evidence from Africa," Journal of Economic Studies, Emerald Group Publishing Limited, vol. 41(4), pages 526-553, July.
    12. Daniel S. Andrews & Stav Fainshmidt & Michael A. Witt & Ajai Gaur, 2025. "Foreign policy: implications for multinational firms," Journal of International Business Policy, Palgrave Macmillan, vol. 8(1), pages 105-119, March.
    13. Asongu Simplice & Andrés Antonio, 2014. "Global trajectories, dynamics, and tendencies of business software piracy: benchmarking IPRs harmonization," Working Papers of the African Governance and Development Institute. 14/011, African Governance and Development Institute..
    14. Rebecca Adler-Nissen, 2016. "Towards a Practice Turn in EU Studies: The Everyday of European Integration," Journal of Common Market Studies, Wiley Blackwell, vol. 54(1), pages 87-103, January.
    15. Simplice A. Asongu & Pritam Singh & Sara Le Roux, 2018. "Fighting Software Piracy: Some Global Conditional Policy Instruments," Journal of Business Ethics, Springer, vol. 152(1), pages 175-189, September.
    16. Mathieu Rousselin, 2012. "The EU as a Multilateral Rule Exporter - The Global Transfer of European Rules via International Organizations," KFG Working Papers p0048, Free University Berlin.
    17. Wolfgang Wagner, 2017. "Liberal Power Europe," Journal of Common Market Studies, Wiley Blackwell, vol. 55(6), pages 1398-1414, November.
    18. Justin Leinaweaver & Robert Thomson, 2014. "Testing models of legislative decision-making with measurement error: The robust predictive power of bargaining models over procedural models," European Union Politics, , vol. 15(1), pages 43-58, March.
    19. Thiago Lima, 2021. "Brazil’s Humanitarian Food Cooperation: From an Innovative Policy to the Politics of Traditional Aid," Agrarian South: Journal of Political Economy, Centre for Agrarian Research and Education for South, vol. 10(2), pages 249-274, August.
    20. Akbar, Yusaf H. & Kisilowski, Maciej, 2015. "Managerial agency, risk, and strategic posture: Nonmarket strategies in the transitional core and periphery," International Business Review, Elsevier, vol. 24(6), pages 984-996.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pal:palcom:v:12:y:2025:i:1:d:10.1057_s41599-025-04897-7. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: https://www.nature.com/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.