Introduction
As you were reading the latest Research Handbook on Cyberwarfare (edited by Tim Stevens and Joe Devanny) you probably felt, like I did, that the same authors were being cited over and over again. Then, like me, you probably did a bunch of work loading the paper citations into a graph database to see if those intuitions were right.
Methodology
Centrality Measures
- In-Degree Centrality: Measures the number of citations an author receives, identifying the most influential authors within the network.
- Out-Degree Centrality (Original Network): Measures the total number of citations an author makes, which can indicate comprehensive engagement with the literature but may also reflect a tendency to cite broadly, including many sources that are peripheral to the core discussions.
- Out-Degree Centrality (Refined Network): Measures citations made to other non-unique nodes, focusing on an author’s engagement with widely recognized research, thereby filtering out the noise from peripheral citations.
- Betweenness Centrality: Measures the extent to which an author serves as a bridge between different parts of the network, identifying those with the widest spread of influence.
Community Detection and Analysis
Inter-Community Edge Analysis
Results
General Network Overview
After excluding unique citations, the refined network consisted of 257 nodes and 784 edges, representing a focused and well-connected citation network. This refinement resulted in a more accurate depiction of the core contributors and the primary thematic areas within the field of cyber warfare.
Key Contributors
Top Authors by In-Degree (Most Cited):
- Stevens, T. (16 citations) (The editor of the Handbook)
- Smeets, M. (14 citations)
- Rid, T. (13 citations)
- Greenberg, A. (11 citations) (A journalist!)
- Borghard, E. D. (10 citations) (actually slightly higher since a couple citations went to slightly different name)
These authors are recognized as central figures within the network, frequently cited by others. Their work forms the foundation of the academic discourse in cyber warfare, indicating their significant influence on the field.
Comparison of Out-Degree Across Networks:
Top Authors by Out-Degree (Original Network):
- J.D. Work: 170 citations made
- Paper: "Offensive cyber capabilities" - Gil Baram and Noya Peer: 145 citations made
- Paper:"Cyberwarfare norms and the attribution imperative: shaping responsible state behaviour in cyberspace" - Jamie MacColl and Tim Stevens: 139 citations made
- Paper: "Countering non-state actors in cyberspace" - Simon Henderson: 138 citations made
- Paper: "Deception in cyberwarfare" - Nadiya Kostyuk and Jen Sidorova: 135 citations made
- Paper: "Military cybercapacity: measures, drivers and effects"
In the original network, authors like J.D. Work and Gil Baram and Noya Peer stood out for their extensive citations, indicating a broad engagement with the literature. However, this high out-degree might reflect a strategy of citing a wide array of sources, some of which could be peripheral or less central to the field's main discussions.
Top Authors by Out-Degree (Refined Network):
- Gil Baram and Noya Peer: 62 citations made
- Paper: "Cyberwarfare norms and the attribution imperative: shaping responsible state behaviour in cyberspace" - Stéphane Taillat: 61 citations made
- Paper: "Conceptualizing cyberwarfare" - Jamie MacColl and Tim Stevens: 55 citations made
- Paper: "Countering non-state actors in cyberspace" - Miguel Alberto Gomez, Grace B. Mueller, Ryan Shandler: 49 citations made
- Paper: "Cyberwarfare research methods" - Nadiya Kostyuk and Jen Sidorova: 49 citations made
- Paper: "Military cybercapacity: measures, drivers and effects"
In the refined network, which excludes unique citations, Gil Baram and Noya Peer, along with Stéphane Taillat, still emerge as central figures. This suggests that their work not only engages broadly but also cites sources that are recognized and referenced by others within the field, indicating a more integrated approach to scholarship.
Community Structure
The community detection analysis revealed several key research clusters on the refined network, each named after the most central author and their key paper:
- Miguel Alberto Gomez, Grace B. Mueller, Ryan Shandler: Cyberwarfare research methods (47 members)
- Stéphane Taillat: Conceptualizing cyberwarfare (45 members)
- Jamie MacColl and Tim Stevens: Countering non-state actors in cyberspace (41 members)
- J.D. Work: Offensive cyber capabilities (39 members)
- Sean Lawson: War by any other name: a short history of the idea of cyberwarfare in the United States (35 members)
These communities represent the major thematic areas within the field, each with a substantial citation field. The community sizes are relatively balanced, indicating that there are multiple active research areas within the network (as represented by the Handbook as a survey document).
Modularity of the Partitioning:
Modularity Score: 0.3206
The moderate modularity score suggests that while there are distinct communities within the network, there is also significant overlap and interaction between these communities. This reflects a field that is both specialized and interdisciplinary, with research areas that are interconnected (at least, as viewed in the snapshot that is the Handbook).
Average Degree Centrality per Community:
The communities with the highest average degree centrality were led by Miguel Alberto Gomez, Grace B. Mueller, Ryan Shandler (Cyberwarfare research methods), Gil Baram and Noya Peer (Cyberwarfare norms), and Jamie MacColl and Tim Stevens (Countering non-state actors). These communities are characterized by dense internal connections, indicating strong intra-community collaboration and citation practices. Or, in visual terms, these papers are highly connected to the central community of citations (as you can see from the subgraphs below).
Inter-Community Relationships
I like to sometimes wonder which academics are friends with which other academics - or in more graph analysis terms - who is citing the same set of people as determined by their inter-community relationships. This can be driven both by people doing good literature review in their field, and writing papers in related fields, or by people simply all citing their friends.
The inter-community edge analysis revealed significant connections between the largest communities:
- Stéphane Taillat: Conceptualizing cyberwarfare and Miguel Alberto Gomez, Grace B. Mueller, Ryan Shandler: Cyberwarfare research methods (21 edges)
- Jamie MacColl and Tim Stevens: Countering non-state actors in cyberspace and Miguel Alberto Gomez, Grace B. Mueller, Ryan Shandler: Cyberwarfare research methods (21 edges)
- Gil Baram and Noya Peer: Cyberwarfare norms and Jamie MacColl and Tim Stevens: Countering non-state actors in cyberspace (18 edges)
It makes sense that Conceptualizing cyberwarfare and looking at research methods in general are highly congruent. It makes less sense that looking at non-state actors in cyberspace is so highly connected in the citation network to two other unrelated papers.
Discussion and Conclusion
This study provides a comprehensive analysis of the citation network within the field of cyber warfare, highlighting the most influential authors, key research clusters, and the interconnectedness of different research areas, as measured by the snapshot the Research Handbook on Cyberware provides. The exclusion of unique citations allowed for a more focused and accurate representation of the core contributors and their relationships. The initial thesis (that papers were citing all the same people) was incorrect, although it will be interesting to see how these networks compare to next year's Handbook.
The findings indicate that while the field of cyber warfare is composed of distinct research areas, there is also considerable overlap and collaboration between these areas. The moderate modularity score suggests that the field is not rigidly divided but rather interconnected, with various subfields contributing to a cohesive body of knowledge. It's telling that there are no large communities in the refined network that encompass multiple sets of papers. In other words, the subjective feeling that there are "camps" of cyber policy academics does not play out in the data. That said, the mere existence of a citation does not mean it is taking into account in the argument of a paper. It may be mentioned for performative reasons, and then dismissed textually (something we don't look at here).
The centrality measures identified key figures who play a crucial role in shaping the academic discourse, both by contributing foundational research and by integrating diverse perspectives across the field. The community structure analysis further emphasized the importance of these contributors, showing how their work forms the backbone of several major research areas.
Overall, this analysis provides some fun insights into the structure and dynamics of current cyber warfare research, offering a foundation for future studies to build upon. Understanding these patterns can help guide researchers and practitioners as they navigate the complex and evolving landscape of cyber warfare academic research, for fun and profit.