Araştırma Makalesi
BibTex RIS Kaynak Göster

Stratejik Kültür ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi

Yıl 2025, Cilt: 80 Sayı: 2, 327 - 358, 17.06.2025
https://doi.org/10.33630/ausbf.1628859

Öz

Zorlayıcı diplomasinin bir aracı olan caydırıcılık stratejisi, Soğuk Savaş dönemi güç ilişkilerinde belirleyici etkiye sahip olmuştur. Dolayısıyla alana ilişkin çalışmalar, bu döneme dair nükleer silah ve güç dengesi gibi yapısal faktörlerinden önemli ölçüde etkilenmiştir. Bununla birlikte yakın dönemde karşılaşılan siber tehditlere karşı yürütülen caydırıcılık stratejilerini anlamak için güç dengesi ilişkilerine ilaveten devlete ait iç değişkenlerin analize dahil edilmesi gerekmektedir. Bu çalışmada; siber tehditlere karşı yürütülen caydırıcılık stratejisinde stratejik kültür ve kurum etkisi araştırılmıştır. Neoklasik Realizm kuramsal çerçevesine başvurulan çalışmada, vaka analizi ve süreç takibi yöntemleri uygulanmıştır. Örnek vaka olarak ABD siber caydırıcılık politikaları ele alınmış ve Barack Obama ve Donald Trump dönemleri karşılaştırılmıştır. Analiz sonucunda; güç dağılımı ve tehdit algılaması gibi yapısal faktörlerin güvenlik politikalarına belirli bir yön verdiği ancak stratejik kültür ve kurum değişkenlerinin aynı bağlamsal koşullar altında farklı caydırıcılık uygulamalarını doğurduğu bulgusuna varılmıştır. Elde edilen bulgular, dış politika analizinde yapısal faktörler ile birlikte iç değişkenlerin kullanımına örnek teşkil eden kuramsal bir katkı sunmaktadır

Kaynakça

  • Achen, C., & Snidal, D. (1989). Rational deterrence theory and comparative case studies. World Politics, 41(2), 143–169.
  • BBC. (2019, March 7). Trump revokes Obama rule on reporting drone strike deaths. BBC News. https://www.bbc.com/news/world-us-canada-47480207
  • Beyaz Saray. (2011). Siber uzay için uluslararası strateji. https://nsarchive.gwu.edu/document/20843-04
  • Beyaz Saray. (2013). Remarks by the President at the National Defense University. https://obamawhitehouse.archives.gov/the-press-office/2013/05/23/remarks-president-national-defense-university
  • Beyaz Saray. (2018). Ulusal siber strateji. https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
  • Birleşmiş Milletler. (2013). Bilgi ve telekomünikasyon alanındaki gelişmeler bağlamında uluslararası güvenlik raporu (A/68/98). https://digitallibrary.un.org/record/3964709?ln=en&v=pdf
  • Birleşmiş Milletler. (2015). Bilgi ve telekomünikasyon alanındaki gelişmeler bağlamında uluslararası güvenlik raporu (A/70/174). https://digitallibrary.un.org/search?ln=en&p=A%2F70%2F174
  • Blagden, D. (2020). Deterring cyber coercion: The exaggerated problem of attribution. Survival, 62(1), 131–148.
  • Chesney, R. (2020). The NDAA’s National Cyber Director: Justifications, authorities and lingering questions. Lawfare. https://www.lawfaremedia.org/article/ndaas-national-cyber-director-justifications-authorities-and-lingering-questions
  • Clarke, M., & Ricketts, A. (2017a). Donald Trump and American foreign policy: The return of the Jacksonian tradition. Comparative Strategy, 36(4), 366–379.
  • Clarke, M., & Ricketts, A. (2017b). Shielding the republic: Barack Obama and the Jeffersonian tradition of American foreign policy. Diplomacy & Statecraft, 28(3), 494–517.
  • Collier, D. (2011). Understanding process tracing. Political Science & Politics, 44(4), 823–830.
  • Congress. (2018). John S. McCain National Defense Authorization Act for Fiscal Year 2019. https://www.congress.gov/bill/115th-congress/senate-bill/2987
  • Da Vinha, L. (2021). A tale of two red lines: Managing foreign policy crises in the Obama and Trump administrations. Comparative Strategy, 40(1), 63–85.
  • Department of Defense. (2020). DOD General Counsel remarks at U.S. Cyber Command Legal Conference. U.S. Department of Defense. https://www.defense.gov/News/Speeches/Speech/Article/2099378/dod-general-counsel-remarks-at-us-cyber-command-legal-conference/
  • Dilanian, K. (2019). Under Trump, U.S. military ramps up cyber offensive against other countries. NBC News. https://www.nbcnews.com/politics/national-security/under-trump-u-s-military-ramps-cyber-offensive-against-other-n1019281
  • Dimitrova, A. (2018). Trump’s “America First” foreign policy: The resurgence of the Jacksonian tradition? L’Europe en Formation, 382(1), 33–46.
  • Dueck, C. (2006). Reluctant crusaders: Power, culture and change in American grand strategy. Princeton University Press.
  • Eurepoc. (2024). Global dataset of cyber incidents. https://eurepoc.eu/database/ Federal News Network. (2014). Collateral damage of Snowden leaks being felt in cyber, public trust. https://federalnewsnetwork.com/defense/2014/07/collateral-damage-of-snowden-leaks-being-felt-in-cyber-public-trust/
  • Federal Register. (2019). EO 13862, revocation of reporting requirement. https://www.federalregister.gov/presidential-documents/executive-orders/donald-trump/2019
  • Geller, E. (2017). Trump administration blames North Korea for global WannaCry cyberattack. Politico. https://www.politico.eu/article/trump-administration-blames-north-korea-for-global-wannacry-cyberattack/
  • George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. MIT Press.
  • George, A., & Smoke, R. (1974). Deterrence in American foreign policy: Theory and practice. Columbia University Press.
  • Gibbons-Neff, T., & Nakashima, E. (2017). President Trump announces move to elevate Cyber Command. The Washington Post. https://www.washingtonpost.com/news/checkpoint/wp/2017/08/18/president-trump-announces-move-to-elevate-cyber-command/
  • Haffa, R. P. (2018). The future of conventional deterrence: Strategies for great power competition. Strategic Studies Quarterly, 12(4), 94–115.
  • Hamilton, A., Madison, J., Jay, J., & Pole, J. R. (2005). The Federalist. Hackett Publishing Company.
  • Healey, J. (2019). The implications of persistent (and permanent) engagement in cyberspace. Journal of Cybersecurity, 5(1), 1–15.
  • Holland, J. (2016). Obama as modern Jeffersonian. In M. Bentley & J. Holland (Eds.), The Obama doctrine: A legacy of continuity in US foreign policy? (pp. 40–53). Routledge.
  • Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54–67.
  • Jervis, R. (1979). Deterrence theory revisited. World Politics, 31(2), 289–324.
  • Jervis, R. (1976). Perception and misperception in international politics. Princeton University Press.
  • Johnston, A. (1995). Thinking about strategic culture. International Security, 19(4), 32–64.
  • Kahn, H. (1962). Thinking about the unthinkable. Avon Books.
  • Kaplan, F. (2015). The president in practice. Foreign Affairs. https://www.foreignaffairs.com/united-states/obamas-way
  • Kessler, G. (2013). President Obama and the ‘red line’ on Syria’s chemical weapons. The Washington Post. https://www.washingtonpost.com/news/fact-checker/wp/2013/09/06/president-obama-and-the-red-line-on-syrias-chemical-weapons/
  • Knake, R. (2015). Private sector and government collaboration on cybersecurity: The Home Depot model. Council on Foreign Relations. https://www.cfr.org/blog/private-sector-and-government-collaboration-cybersecurity-home-depot-model
  • Knopf, J. (2010). The fourth wave in deterrence research. Contemporary Security Policy, 31(1), 1–33.
  • Lasconjarias, G. (2017). Deterrence through resilience: NATO, the nations and the challenges of being prepared (Eisenhower Paper No. 7). NATO Defence College Research Division.
  • Lebow, R., & Stein, J. (1989). Rational deterrence theory: I think, therefore I deter. World Politics, 41(2), 208–224.
  • Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265–284.
  • Lilli, E. (2021). Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence. Contemporary Security Policy, 42(2), 163–188.
  • Lindsay, J. R. (2015). Tipping the scales: The attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53–67.
  • Mahoney, J. (2012). The logic of process tracing tests in the social sciences. Sociological Methods & Research, 41(4), 570–597.
  • Maness, R. C., Valeriano, B., Hedgecock, K., Jensen, B. M., & Macias, J. M. (2022). The Dyadic Cyber Incident and Campaign Dataset. https://dataverse.harvard.edu/dataset.xhtml?persistentId=doi:10.7910/DVN/CQOMYV
  • Margulies, P. (2017). Global cybersecurity, surveillance, and privacy: The Obama administration’s conflicted legacy. Indiana Journal of Global Legal Studies, 24(2), 459.
  • Maurer, T. (2018). Cyber mercenaries. Cambridge University Press.
  • Mead, W. R. (1999). Jacksonian tradition and American foreign policy. The National Interest, 58(Winter), 5–25.
  • Mead, W. R. (2001). Special providence: American foreign policy and how it changed the world. Knopf.
  • Mead, W. R. (2017). American populism and the liberal order. Foreign Affairs. https://www.foreignaffairs.com/united-states/jacksonian-revolt-populism-donald-trump
  • Mearsheimer, J. J. (1983). Conventional deterrence. Cornell University Press.
  • National Security Archive. (2012). Barack Obama, Presidential Policy Directive/PPD-20, subject: U.S. cyber operations policy. National Security Archive. https://nsarchive.gwu.edu/document/21533-document-2-9
  • Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266
  • Paul, T. V., Morgan, P., & Wirtz, J. (2009). Complex deterrence: Strategy in the global age. University of Chicago Press.
  • Quinn, A. (2010). US foreign policy in context: National ideology from the founders to the Bush doctrine. Routledge.
  • Rathbun, B. (2008). A rose by any other name: Neoclassical realism as the logical and necessary extension of structural realism. Security Studies, 17(2), 294–321. https://doi.org/10.1080/09636410802098917
  • Ripsman, N. M., Taliaferro, J. W., & Lobell, S. E. (2009). Neoclassical realism, theory and the state. Cambridge University Press.
  • Ripsman, N. M., Taliaferro, J. W., & Lobell, S. E. (2016). Neoclassical realist theory of international politics. Oxford University Press.
  • Rolf, J. N. (2021). Donald Trump’s Jacksonian and Jeffersonian foreign policy. Policy Studies, 42(5–6), 62–81. https://doi.org/10.1080/01442872.2021.1972014
  • Rose, G. (1998). Review: Neoclassical realism and theories of foreign policy. World Politics, 51(1), 144–172. https://doi.org/10.1017/S0043887100007814
  • Sanger, D. E. (2018, June 17). Pentagon puts cyberwarriors on the offensive, increasing the risk of conflict. The New York Times. https://www.nytimes.com/2018/06/17/us/politics/cyber-command-trump.html
  • Savage, C. (2016). U.S. releases rules for airstrike killings of terror suspects. The New York Times. https://www.nytimes.com/2016/08/07/us/politics/us-releases-rules-for-airstrike-killings-of-terror-suspects.html
  • Savage, C. (2021). Trump’s secret rules for drone strikes outside war zones are disclosed. The New York Times. https://www.nytimes.com/2021/05/01/us/politics/trump-drone-strike-rules.html
  • Savage, C., & Schmitt, E. (2017). Trump poised to drop some limits on drone strikes and commando raids. The New York Times. https://www.nytimes.com/2017/09/21/us/politics/trump-drone-strikes-commando-raids-rules.html
  • Savunma Bakanlığı. (2018). Savunma Bakanlığı siber stratejisi. https://sepub-prod-0001-124733793621-us-gov-west-1.s3.us-gov-west-1.amazonaws.com/s3fs-public/documents/DoD%2BCYBER_STRATEGY_SUMMARY_FINAL%2B09-2018.pdf?VersionId=yMYWnmLD86vTpHIqSLIFhzA6B7P.1Vy
  • Schelling, T. C. (1966). Arms and influence. Yale University Press.
  • Schweller, R. L. (2004). Unanswered threats: A neoclassical realist theory of underbalancing. International Security, 29(2), 159–201. https://doi.org/10.1162/0162288042879975
  • Shackleford, S., Proia, A., Martell, B., & Craig, A. (2015). Toward a cybersecurity standard of care? Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices. Legal Studies Research Paper Series, (291).
  • Sheth, S. (2018). Trump blames Russia for NotPetya cyberattack. Business Insider. https://www.businessinsider.com/trump-russia-notpetya-cyberattack-2018-2
  • Singer, D. J. (1972). Capability distribution, uncertainty, and major power war, 1820–1964 (6th version). In D. J. Singer, S. Bremer, & J. Stuckey (Eds.), Peace, war, and numbers (pp. 19–48). SAGE Publications.
  • Smalley, S. (2022). Biden administration is studying whether to scale back Trump-era cyber authorities at DOD. CyberScoop. https://cyberscoop.com/biden-trump-nspm-13-presidential-memo-cyber-command-white-house/
  • Snyder, G. (1959). Deterrence by denial and punishment. Center of International Studies.
  • Snyder, G. (1961). Deterrence and defense: Toward a theory of national security. Princeton University Press.
  • Snyder, J. L. (1977). The Soviet strategic culture: Implications for limited nuclear operations. Rand Corporation Reports.
  • Stevens, T. (2012). A cyberwar of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33(1), 148–170. https://doi.org/10.1080/13523260.2012.659586
  • Taliaferro, J. W. (2006). State building for future wars: Neoclassical realism and the resource-extractive state. Security Studies, 15(3), 464–495. https://doi.org/10.1080/09636410601028206
  • Waltz, K. N. (1979). Theory of international politics. Addison-Wesley.
  • Washington Post. (2018). The Cybersecurity 202: Trump just gave the military a lot more leeway to launch cyber operations. The Washington Post. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/08/17/the-cybersecurity-202-trump-just-gave-the-military-a-lot-more-leeway-to-launch-cyber-operations/5b75a7551b326b7234392972/
  • Waters, R. (2014). US struggles to find response to hack attack on Sony. Financial Times. https://www.ft.com/content/70a160b4-893c-11e4-ad5b-00144feabdc0
  • Wilner, A. (2019). US cyber deterrence: Practice guiding theory. Journal of Strategic Studies, 43(2), 245–280. https://doi.org/10.1080/01402390.2019.1570141
  • Zagare, F. C., & Kilgour, M. (2004). Perfect deterrence. Cambridge University Press.
  • Zakaria, F. (1998). From wealth to power. Princeton University Press.
  • Zenko, M. (2016). Obama’s embrace of drone strikes will be a lasting legacy. The New York Times. https://www.nytimes.com/roomfordebate/2016/01/12/reflecting-on-obamas-presidency/obamas-embrace-of-drone-strikes-will-be-a-lasting-legacy

Strategic Culture and Institution Effects in Deterrence Strategy: Comparison of Barack Obama-Donald Trump Presidencies’ Cyber Security Policies

Yıl 2025, Cilt: 80 Sayı: 2, 327 - 358, 17.06.2025
https://doi.org/10.33630/ausbf.1628859

Öz

Deterrence strategy, as an instrument of coercive diplomacy, played a significant role within the power relations of the Cold War. This led the deterrence studies to be dominated by the defining factors of the era - nuclear weapons and balance of power. However, in order to understand the deterrence strategy against recent cyber threats, it is crucial that internal variables be included in the foreign policy analysis. This study examines the stategic culture and institutions effects in deterrence strategy used against cyber threats. The theoretical framework is neoclassical realism and the methods applied are case analysis and process tracing. US cyber deterrence policies is selected as a case and cyber implementations of Obama and Trump presidencies are compared. The analysis reveals that power distribution and threat perception provide a certain guidance to the security policies of the state, whereas internal variables such as strategic culture and institutions yield to different deterrence applications under similar structural contexts. The findings of the study exemplifies the combined application of internal factors and the structural factors in foreign policy analysis, and makes a theoretical contribution to the field.

Kaynakça

  • Achen, C., & Snidal, D. (1989). Rational deterrence theory and comparative case studies. World Politics, 41(2), 143–169.
  • BBC. (2019, March 7). Trump revokes Obama rule on reporting drone strike deaths. BBC News. https://www.bbc.com/news/world-us-canada-47480207
  • Beyaz Saray. (2011). Siber uzay için uluslararası strateji. https://nsarchive.gwu.edu/document/20843-04
  • Beyaz Saray. (2013). Remarks by the President at the National Defense University. https://obamawhitehouse.archives.gov/the-press-office/2013/05/23/remarks-president-national-defense-university
  • Beyaz Saray. (2018). Ulusal siber strateji. https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
  • Birleşmiş Milletler. (2013). Bilgi ve telekomünikasyon alanındaki gelişmeler bağlamında uluslararası güvenlik raporu (A/68/98). https://digitallibrary.un.org/record/3964709?ln=en&v=pdf
  • Birleşmiş Milletler. (2015). Bilgi ve telekomünikasyon alanındaki gelişmeler bağlamında uluslararası güvenlik raporu (A/70/174). https://digitallibrary.un.org/search?ln=en&p=A%2F70%2F174
  • Blagden, D. (2020). Deterring cyber coercion: The exaggerated problem of attribution. Survival, 62(1), 131–148.
  • Chesney, R. (2020). The NDAA’s National Cyber Director: Justifications, authorities and lingering questions. Lawfare. https://www.lawfaremedia.org/article/ndaas-national-cyber-director-justifications-authorities-and-lingering-questions
  • Clarke, M., & Ricketts, A. (2017a). Donald Trump and American foreign policy: The return of the Jacksonian tradition. Comparative Strategy, 36(4), 366–379.
  • Clarke, M., & Ricketts, A. (2017b). Shielding the republic: Barack Obama and the Jeffersonian tradition of American foreign policy. Diplomacy & Statecraft, 28(3), 494–517.
  • Collier, D. (2011). Understanding process tracing. Political Science & Politics, 44(4), 823–830.
  • Congress. (2018). John S. McCain National Defense Authorization Act for Fiscal Year 2019. https://www.congress.gov/bill/115th-congress/senate-bill/2987
  • Da Vinha, L. (2021). A tale of two red lines: Managing foreign policy crises in the Obama and Trump administrations. Comparative Strategy, 40(1), 63–85.
  • Department of Defense. (2020). DOD General Counsel remarks at U.S. Cyber Command Legal Conference. U.S. Department of Defense. https://www.defense.gov/News/Speeches/Speech/Article/2099378/dod-general-counsel-remarks-at-us-cyber-command-legal-conference/
  • Dilanian, K. (2019). Under Trump, U.S. military ramps up cyber offensive against other countries. NBC News. https://www.nbcnews.com/politics/national-security/under-trump-u-s-military-ramps-cyber-offensive-against-other-n1019281
  • Dimitrova, A. (2018). Trump’s “America First” foreign policy: The resurgence of the Jacksonian tradition? L’Europe en Formation, 382(1), 33–46.
  • Dueck, C. (2006). Reluctant crusaders: Power, culture and change in American grand strategy. Princeton University Press.
  • Eurepoc. (2024). Global dataset of cyber incidents. https://eurepoc.eu/database/ Federal News Network. (2014). Collateral damage of Snowden leaks being felt in cyber, public trust. https://federalnewsnetwork.com/defense/2014/07/collateral-damage-of-snowden-leaks-being-felt-in-cyber-public-trust/
  • Federal Register. (2019). EO 13862, revocation of reporting requirement. https://www.federalregister.gov/presidential-documents/executive-orders/donald-trump/2019
  • Geller, E. (2017). Trump administration blames North Korea for global WannaCry cyberattack. Politico. https://www.politico.eu/article/trump-administration-blames-north-korea-for-global-wannacry-cyberattack/
  • George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. MIT Press.
  • George, A., & Smoke, R. (1974). Deterrence in American foreign policy: Theory and practice. Columbia University Press.
  • Gibbons-Neff, T., & Nakashima, E. (2017). President Trump announces move to elevate Cyber Command. The Washington Post. https://www.washingtonpost.com/news/checkpoint/wp/2017/08/18/president-trump-announces-move-to-elevate-cyber-command/
  • Haffa, R. P. (2018). The future of conventional deterrence: Strategies for great power competition. Strategic Studies Quarterly, 12(4), 94–115.
  • Hamilton, A., Madison, J., Jay, J., & Pole, J. R. (2005). The Federalist. Hackett Publishing Company.
  • Healey, J. (2019). The implications of persistent (and permanent) engagement in cyberspace. Journal of Cybersecurity, 5(1), 1–15.
  • Holland, J. (2016). Obama as modern Jeffersonian. In M. Bentley & J. Holland (Eds.), The Obama doctrine: A legacy of continuity in US foreign policy? (pp. 40–53). Routledge.
  • Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54–67.
  • Jervis, R. (1979). Deterrence theory revisited. World Politics, 31(2), 289–324.
  • Jervis, R. (1976). Perception and misperception in international politics. Princeton University Press.
  • Johnston, A. (1995). Thinking about strategic culture. International Security, 19(4), 32–64.
  • Kahn, H. (1962). Thinking about the unthinkable. Avon Books.
  • Kaplan, F. (2015). The president in practice. Foreign Affairs. https://www.foreignaffairs.com/united-states/obamas-way
  • Kessler, G. (2013). President Obama and the ‘red line’ on Syria’s chemical weapons. The Washington Post. https://www.washingtonpost.com/news/fact-checker/wp/2013/09/06/president-obama-and-the-red-line-on-syrias-chemical-weapons/
  • Knake, R. (2015). Private sector and government collaboration on cybersecurity: The Home Depot model. Council on Foreign Relations. https://www.cfr.org/blog/private-sector-and-government-collaboration-cybersecurity-home-depot-model
  • Knopf, J. (2010). The fourth wave in deterrence research. Contemporary Security Policy, 31(1), 1–33.
  • Lasconjarias, G. (2017). Deterrence through resilience: NATO, the nations and the challenges of being prepared (Eisenhower Paper No. 7). NATO Defence College Research Division.
  • Lebow, R., & Stein, J. (1989). Rational deterrence theory: I think, therefore I deter. World Politics, 41(2), 208–224.
  • Lilli, E. (2020). President Obama and US cyber security policy. Journal of Cyber Policy, 5(2), 265–284.
  • Lilli, E. (2021). Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence. Contemporary Security Policy, 42(2), 163–188.
  • Lindsay, J. R. (2015). Tipping the scales: The attribution problem and the feasibility of deterrence against cyberattack. Journal of Cybersecurity, 1(1), 53–67.
  • Mahoney, J. (2012). The logic of process tracing tests in the social sciences. Sociological Methods & Research, 41(4), 570–597.
  • Maness, R. C., Valeriano, B., Hedgecock, K., Jensen, B. M., & Macias, J. M. (2022). The Dyadic Cyber Incident and Campaign Dataset. https://dataverse.harvard.edu/dataset.xhtml?persistentId=doi:10.7910/DVN/CQOMYV
  • Margulies, P. (2017). Global cybersecurity, surveillance, and privacy: The Obama administration’s conflicted legacy. Indiana Journal of Global Legal Studies, 24(2), 459.
  • Maurer, T. (2018). Cyber mercenaries. Cambridge University Press.
  • Mead, W. R. (1999). Jacksonian tradition and American foreign policy. The National Interest, 58(Winter), 5–25.
  • Mead, W. R. (2001). Special providence: American foreign policy and how it changed the world. Knopf.
  • Mead, W. R. (2017). American populism and the liberal order. Foreign Affairs. https://www.foreignaffairs.com/united-states/jacksonian-revolt-populism-donald-trump
  • Mearsheimer, J. J. (1983). Conventional deterrence. Cornell University Press.
  • National Security Archive. (2012). Barack Obama, Presidential Policy Directive/PPD-20, subject: U.S. cyber operations policy. National Security Archive. https://nsarchive.gwu.edu/document/21533-document-2-9
  • Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44–71. https://doi.org/10.1162/ISEC_a_00266
  • Paul, T. V., Morgan, P., & Wirtz, J. (2009). Complex deterrence: Strategy in the global age. University of Chicago Press.
  • Quinn, A. (2010). US foreign policy in context: National ideology from the founders to the Bush doctrine. Routledge.
  • Rathbun, B. (2008). A rose by any other name: Neoclassical realism as the logical and necessary extension of structural realism. Security Studies, 17(2), 294–321. https://doi.org/10.1080/09636410802098917
  • Ripsman, N. M., Taliaferro, J. W., & Lobell, S. E. (2009). Neoclassical realism, theory and the state. Cambridge University Press.
  • Ripsman, N. M., Taliaferro, J. W., & Lobell, S. E. (2016). Neoclassical realist theory of international politics. Oxford University Press.
  • Rolf, J. N. (2021). Donald Trump’s Jacksonian and Jeffersonian foreign policy. Policy Studies, 42(5–6), 62–81. https://doi.org/10.1080/01442872.2021.1972014
  • Rose, G. (1998). Review: Neoclassical realism and theories of foreign policy. World Politics, 51(1), 144–172. https://doi.org/10.1017/S0043887100007814
  • Sanger, D. E. (2018, June 17). Pentagon puts cyberwarriors on the offensive, increasing the risk of conflict. The New York Times. https://www.nytimes.com/2018/06/17/us/politics/cyber-command-trump.html
  • Savage, C. (2016). U.S. releases rules for airstrike killings of terror suspects. The New York Times. https://www.nytimes.com/2016/08/07/us/politics/us-releases-rules-for-airstrike-killings-of-terror-suspects.html
  • Savage, C. (2021). Trump’s secret rules for drone strikes outside war zones are disclosed. The New York Times. https://www.nytimes.com/2021/05/01/us/politics/trump-drone-strike-rules.html
  • Savage, C., & Schmitt, E. (2017). Trump poised to drop some limits on drone strikes and commando raids. The New York Times. https://www.nytimes.com/2017/09/21/us/politics/trump-drone-strikes-commando-raids-rules.html
  • Savunma Bakanlığı. (2018). Savunma Bakanlığı siber stratejisi. https://sepub-prod-0001-124733793621-us-gov-west-1.s3.us-gov-west-1.amazonaws.com/s3fs-public/documents/DoD%2BCYBER_STRATEGY_SUMMARY_FINAL%2B09-2018.pdf?VersionId=yMYWnmLD86vTpHIqSLIFhzA6B7P.1Vy
  • Schelling, T. C. (1966). Arms and influence. Yale University Press.
  • Schweller, R. L. (2004). Unanswered threats: A neoclassical realist theory of underbalancing. International Security, 29(2), 159–201. https://doi.org/10.1162/0162288042879975
  • Shackleford, S., Proia, A., Martell, B., & Craig, A. (2015). Toward a cybersecurity standard of care? Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices. Legal Studies Research Paper Series, (291).
  • Sheth, S. (2018). Trump blames Russia for NotPetya cyberattack. Business Insider. https://www.businessinsider.com/trump-russia-notpetya-cyberattack-2018-2
  • Singer, D. J. (1972). Capability distribution, uncertainty, and major power war, 1820–1964 (6th version). In D. J. Singer, S. Bremer, & J. Stuckey (Eds.), Peace, war, and numbers (pp. 19–48). SAGE Publications.
  • Smalley, S. (2022). Biden administration is studying whether to scale back Trump-era cyber authorities at DOD. CyberScoop. https://cyberscoop.com/biden-trump-nspm-13-presidential-memo-cyber-command-white-house/
  • Snyder, G. (1959). Deterrence by denial and punishment. Center of International Studies.
  • Snyder, G. (1961). Deterrence and defense: Toward a theory of national security. Princeton University Press.
  • Snyder, J. L. (1977). The Soviet strategic culture: Implications for limited nuclear operations. Rand Corporation Reports.
  • Stevens, T. (2012). A cyberwar of ideas? Deterrence and norms in cyberspace. Contemporary Security Policy, 33(1), 148–170. https://doi.org/10.1080/13523260.2012.659586
  • Taliaferro, J. W. (2006). State building for future wars: Neoclassical realism and the resource-extractive state. Security Studies, 15(3), 464–495. https://doi.org/10.1080/09636410601028206
  • Waltz, K. N. (1979). Theory of international politics. Addison-Wesley.
  • Washington Post. (2018). The Cybersecurity 202: Trump just gave the military a lot more leeway to launch cyber operations. The Washington Post. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/08/17/the-cybersecurity-202-trump-just-gave-the-military-a-lot-more-leeway-to-launch-cyber-operations/5b75a7551b326b7234392972/
  • Waters, R. (2014). US struggles to find response to hack attack on Sony. Financial Times. https://www.ft.com/content/70a160b4-893c-11e4-ad5b-00144feabdc0
  • Wilner, A. (2019). US cyber deterrence: Practice guiding theory. Journal of Strategic Studies, 43(2), 245–280. https://doi.org/10.1080/01402390.2019.1570141
  • Zagare, F. C., & Kilgour, M. (2004). Perfect deterrence. Cambridge University Press.
  • Zakaria, F. (1998). From wealth to power. Princeton University Press.
  • Zenko, M. (2016). Obama’s embrace of drone strikes will be a lasting legacy. The New York Times. https://www.nytimes.com/roomfordebate/2016/01/12/reflecting-on-obamas-presidency/obamas-embrace-of-drone-strikes-will-be-a-lasting-legacy
Toplam 82 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Savunma Çalışmaları
Bölüm Araştırma Makaleleri
Yazarlar

Emre İnan 0000-0001-9804-0382

Erken Görünüm Tarihi 13 Mayıs 2025
Yayımlanma Tarihi 17 Haziran 2025
Gönderilme Tarihi 28 Ocak 2025
Kabul Tarihi 5 Mayıs 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 80 Sayı: 2

Kaynak Göster

APA İnan, E. (2025). Stratejik Kültür ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi. Ankara Üniversitesi SBF Dergisi, 80(2), 327-358. https://doi.org/10.33630/ausbf.1628859
AMA İnan E. Stratejik Kültür ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi. SBF Dergisi. Haziran 2025;80(2):327-358. doi:10.33630/ausbf.1628859
Chicago İnan, Emre. “Stratejik Kültür Ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama Ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi”. Ankara Üniversitesi SBF Dergisi 80, sy. 2 (Haziran 2025): 327-58. https://doi.org/10.33630/ausbf.1628859.
EndNote İnan E (01 Haziran 2025) Stratejik Kültür ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi. Ankara Üniversitesi SBF Dergisi 80 2 327–358.
IEEE E. İnan, “Stratejik Kültür ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi”, SBF Dergisi, c. 80, sy. 2, ss. 327–358, 2025, doi: 10.33630/ausbf.1628859.
ISNAD İnan, Emre. “Stratejik Kültür Ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama Ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi”. Ankara Üniversitesi SBF Dergisi 80/2 (Haziran 2025), 327-358. https://doi.org/10.33630/ausbf.1628859.
JAMA İnan E. Stratejik Kültür ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi. SBF Dergisi. 2025;80:327–358.
MLA İnan, Emre. “Stratejik Kültür Ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama Ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi”. Ankara Üniversitesi SBF Dergisi, c. 80, sy. 2, 2025, ss. 327-58, doi:10.33630/ausbf.1628859.
Vancouver İnan E. Stratejik Kültür ve Kurumların Caydırıcılık Stratejisi Üzerindeki Etkileri: Obama ve Trump Yönetimlerinin Siber Güvenlik Politikalarının Karşılaştırmalı Analizi. SBF Dergisi. 2025;80(2):327-58.