Follow
Jon R. Lindsay
Jon R. Lindsay
Associate Professor of International Relations, Georgia Institute of Technology
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Stuxnet and the limits of cyber warfare
JR Lindsay
Security Studies 22 (3), 365-404, 2013
5562013
Weaving tangled webs: offense, defense, and deception in cyberspace
E Gartzke, JR Lindsay
Security Studies 24 (2), 316-348, 2015
2722015
The impact of China on cybersecurity: Fiction and friction
JR Lindsay
International Security 39 (3), 7-47, 2014
2242014
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack
JR Lindsay
Journal of Cybersecurity 1 (1), 53-67, 2015
1862015
China and cybersecurity: Espionage, strategy, and politics in the digital domain
JR Lindsay, TM Cheung, DS Reveron
Oxford University Press, USA, 2015
1662015
Cross-Domain Deterrence: Strategy in an Era of Complexity
E Gartzke, JR Lindsay
Oxford University Press, 2019
1312019
Thermonuclear cyberwar
E Gartzke, JR Lindsay
Journal of cybersecurity 3 (1), 37-48, 2017
962017
Coercion through cyberspace: the stability-instability paradox revisited
JR Lindsay, E Gartzke
Coercion: The Power to Hurt in International Politics, 179-203, 2018
802018
North Korea and the Sony hack: Exporting instability through cyberspace
S Haggard, JR Lindsay
Honolulu, HI: East-West Center, 2015
782015
Restrained by design: The political economy of cybersecurity
JR Lindsay
Digital Policy, Regulation and Governance 19 (6), 493-514, 2017
722017
A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society
L Maschmeyer, RJ Deibert, JR Lindsay
Journal of Information Technology & Politics 18 (1), 1-20, 2021
592021
Prediction and judgment: Why artificial intelligence increases the importance of humans in war
A Goldfarb, JR Lindsay
International Security 46 (3), 7-50, 2021
502021
Information technology and military power
JR Lindsay
Cornell University Press, 2020
492020
Reinventing the revolution: Technological visions, counterinsurgent criticism, and the rise of special operations
JR Lindsay
Journal of Strategic Studies 36 (3), 422-453, 2013
452013
From Exploitation to Innovation: Acquisition, Absorption, and Application
JR Lindsay, TM Cheung
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital …, 2015
372015
Demystifying the quantum threat: infrastructure, institutions, and intelligence advantage
JR Lindsay
Security Studies 29 (2), 335-361, 2020
342020
The influence of sea power on politics: domain-and platform-specific attributes of material capabilities
E Gartzke, JR Lindsay
Security Studies 29 (4), 601-636, 2020
332020
Correspondence: a cyber disagreement
JR Lindsay, L Kello
International Security 39 (2), 181-192, 2014
332014
Politics by many other means: The comparative strategic advantages of operational domains
JR Lindsay, E Gartzke
Journal of Strategic Studies 45 (5), 743-776, 2022
302022
" War upon the Map": User Innovation in American Military Software
JR Lindsay
Technology and Culture 51 (3), 619-651, 2010
302010
The system can't perform the operation now. Try again later.
Articles 1–20