{"id":5650131,"date":"2021-07-07T12:35:22","date_gmt":"2021-07-07T12:35:22","guid":{"rendered":"http:\/\/lennartmaschmeyer.com\/?page_id=5650131"},"modified":"2026-03-23T18:24:22","modified_gmt":"2026-03-23T18:24:22","slug":"publications","status":"publish","type":"page","link":"https:\/\/lennartmaschmeyer.com\/index.php\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" style=\"font-size:26px;font-style:italic;font-weight:300\">Peer-reviewed Articles<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><em><a href=\"https:\/\/doi.org\/10.1162\/isec_a_00418\" data-type=\"link\" data-id=\"https:\/\/doi.org\/10.1162\/isec_a_00418\"><strong>&#8220;The Subversive Trilemma &#8211; Why Cyber Operations Fall Short of Expectations&#8221;<\/strong> <\/a><br>International Security\u00a02021; 46 (2): 51\u201390.<\/em><\/li>\n\n\n\n<li><a href=\"https:\/\/doi.org\/10.1162\/ISEC.a.398.\"><strong>\u201cDeception and Detection: Why Artificial Intelligence Empowers Cyber Defense over Offense.\u201d<\/strong><\/a><br><a href=\"https:\/\/doi.org\/10.1162\/ISEC.a.398.\"><\/a>International Security 50, no. 3 (2026): 86\u2013126.<\/li>\n\n\n\n<li><strong>\u201c<a href=\"https:\/\/doi.org\/10.1080\/19331681.2020.1776658\">A Tale of Two Cybers &#8211; How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society.<\/a>\u201d<\/strong> <br><em>Journal of Information Technology &amp; Politics<\/em> 18, no. 1 (June 11, 2020): 1\u201320. (with Ron Deibert and Jon Lindsay)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/doi.org\/10.1017\/eis.2025.10025\">\u201cSand in the Gears: Sabotage in World Politics.\u201d<\/a><\/strong> <br><em>European Journal of International Security<\/em>, October 20, 2025, 1\u201320. (with Joshua Rovner and Rory Cormac)<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/doi.org\/10.1177\/13540661221117051\">&#8220;Subversion, Cyber Operations, and Reverse Structural Power in World Politics&#8221;<\/a><\/strong> <br><em>European Journal of International Relations<\/em>, 16 August 2022. <\/li>\n\n\n\n<li><strong><a href=\"https:\/\/doi.org\/10.1080\/01402390.2022.2104253\">&#8220;A New and Better Quiet Option? Strategies of Subversion and Cyber Conflict&#8221;<\/a><\/strong> <br><em>Journal of Strategic Studies<\/em> 0, no. 0 (27 July 2022): 1\u201325. <a href=\"https:\/\/doi.org\/10.1080\/01402390.2022.2104253\">https:\/\/doi.org\/10.1080\/01402390.2022.2104253<\/a>.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/doi.org\/10.1177\/00223433231220264\">\u201cIf It Bleeps It Leads? Media Coverage on Cyber Conflict and Misperception.\u201d<\/a><\/strong> <br><em>Journal of Peace Research<\/em> 61 (January 2024) (with Christos Makridis and Max Smeets). <\/li>\n\n\n\n<li><strong><a href=\"https:\/\/doi.org\/10.1080\/19331681.2023.2211969\">\u2018Donetsk Don\u2019t Tell \u2013 \u201cHybrid War\u201d in Ukraine and the Limits of Social Media Influence Operations\u2019.<\/a> <\/strong><br><em>Journal of Information Technology &amp; Politics<\/em> 0, no. 0 (14 May 2023): 1\u201316. (with Alexei Abrahams, Peter Pomerantsev, and Volodymyr Yermolenko). <\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:26px;font-style:italic;font-weight:300\">Op-Eds<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.lawfareblog.com\/subversive-trilemma-cyber-conflict-and-beyond\">The Subversive Trilemma in Cyber Conflict and Beyond<\/a>. <em>Lawfare<\/em> (blog), 3 August 2022. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.lawfareblog.com\/infiltrate-exploit-manipulate-why-subversive-nature-cyber-conflict-explains-both-its-strategic\">Infiltrate, Exploit, Manipulate: Why the Subversive Nature of Cyber Conflict Explains Both Its Strategic Promise and Its Limitations<\/a>, <em>Lawfare<\/em> (blog), 12 July 2022.<\/p>\n\n\n\n<p>&#8220;T<a href=\"https:\/\/warontherocks.com\/2022\/02\/there-is-no-cyber-shock-and-awe-plausible-threats-in-the-ukrainian-conflict\/\">here is no &#8216;Cyber Shock and Awe&#8217; &#8211; Plausible Threats in the Ukrainian Conflict&#8221;.<\/a> <em>War on the Rocks.<\/em> Feb 2022<\/p>\n\n\n\n<p>&#8220;Digital Disinformation &#8211; Evidence From Ukraine&#8221;, CSS Analyses in Security Policy, No. 278, February 2021. <a href=\"https:\/\/css.ethz.ch\/content\/dam\/ethz\/special-interest\/gess\/cis\/center-for-securities-studies\/pdfs\/CSSAnalyse278-EN.pdf\" data-type=\"URL\" data-id=\"https:\/\/css.ethz.ch\/content\/dam\/ethz\/special-interest\/gess\/cis\/center-for-securities-studies\/pdfs\/CSSAnalyse278-EN.pdf\">https:\/\/css.ethz.ch\/content\/dam\/ethz\/special-interest\/gess\/cis\/center-for-securities-studies\/pdfs\/CSSAnalyse278-EN.pdf<\/a><\/p>\n\n\n\n<p>\u201cShaping Not Signaling: Understanding Cyber Operations as a Means of Espionage, Attack, and Destabilization.\u201d <em>International Studies Review<\/em>, no. viaa086 (November 3, 2020). (with Florian Egloff) <a href=\"https:\/\/doi.org\/10.1093\/isr\/viaa086\">https:\/\/doi.org\/10.1093\/isr\/viaa086<\/a>.<\/p>\n\n\n\n<p>\u201cPersistent Engagement Neglects Secrecy at Its Peril.\u201d <em>Lawfare<\/em> (blog), March 4, 2020. <a href=\"https:\/\/www.lawfareblog.com\/persistent-engagement-neglects-secrecy-its-peril\">https:\/\/www.lawfareblog.com\/persistent-engagement-neglects-secrecy-its-peril<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Peer-reviewed Articles Op-Eds The Subversive Trilemma in Cyber Conflict and Beyond. Lawfare (blog), 3 August 2022. Infiltrate, Exploit, Manipulate: Why the Subversive Nature of Cyber Conflict Explains Both Its Strategic Promise and Its Limitations, Lawfare (blog), 12 July 2022. &#8220;There is no &#8216;Cyber Shock and Awe&#8217; &#8211; Plausible Threats in the Ukrainian Conflict&#8221;. War on the Rocks. Feb 2022 &#8220;Digital Disinformation &#8211; Evidence From Ukraine&#8221;, CSS Analyses in Security Policy, No. 278, February 2021. https:\/\/css.ethz.ch\/content\/dam\/ethz\/special-interest\/gess\/cis\/center-for-securities-studies\/pdfs\/CSSAnalyse278-EN.pdf \u201cShaping Not Signaling: Understanding Cyber Operations as a Means of Espionage, Attack, and Destabilization.\u201d International Studies Review, no. viaa086 (November 3, 2020). (with Florian Egloff) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-5650131","page","type-page","status-publish","hentry"],"acf":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P62wb0-nHR9","_links":{"self":[{"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/pages\/5650131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/comments?post=5650131"}],"version-history":[{"count":29,"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/pages\/5650131\/revisions"}],"predecessor-version":[{"id":5650344,"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/pages\/5650131\/revisions\/5650344"}],"wp:attachment":[{"href":"https:\/\/lennartmaschmeyer.com\/index.php\/wp-json\/wp\/v2\/media?parent=5650131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}