Jump to ContentJump to Main Navigation
Cross-Domain DeterrenceStrategy in an Era of Complexity$
Users without a subscription are not able to see the full content.

Eric Gartzke and Jon R. Lindsay

Print publication date: 2019

Print ISBN-13: 9780190908645

Published to Oxford Scholarship Online: July 2019

DOI: 10.1093/oso/9780190908645.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 03 December 2021



The Analytic Potential of Cross-Domain Deterrence

(p.335) 15 Conclusion
Cross-Domain Deterrence

Jon R. Lindsay

Erik Gartzke

Oxford University Press

This concluding chapter provides an analytical summary of insights that emerge across the chapters, highlighting the ways in which the characteristics of different instruments of coercion examined in this book—nuclear weapons, operations on land, at sea, in the air, in space, and in cyberspace, and engineered migrations—can improve or undermine deterrence. By and large, the contributors to this book find that the notion of cross-domain deterrence is useful and can reveal novel insights that traditional deterrence theory obscures. Deterrence in history has often occurred across domains, combining land and naval power as well as force, diplomacy, and economic statecraft, but the logic of strategic choice has not been articulated. Deterrence theory as we know it may actually be a subset of cross-domain deterrence, an account of coercive bargaining that takes means as seriously as ends. Means matter because different tools and combinations of tools have different consequences for the costs, credibility, and consequences of deterrence. These insights opens up new research frontiers for international relations.

Keywords:   cross-domain deterrence, military technology, credible communication, complexity, literature review, national security policy

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .