<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="brief-report" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Polit. Sci.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Political Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Polit. Sci.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2673-3145</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpos.2026.1770003</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Perspective</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Gray zone conflicts in cyberspace: challenges for security and defense governance</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Rocha</surname>
<given-names>Henrique Ribeiro Da</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3277772"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Goldoni</surname>
<given-names>Luiz Rog&#x00E9;rio Franco</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/3052690"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
</contrib>
</contrib-group>
<aff id="aff1"><institution>Brazilian Army Command and General Staff College, Escola de Comando e Estado-Maior do Ex&#x00E9;rcito</institution>, <city>Rio de Janeiro</city>, <country country="br">Brazil</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Henrique Ribeiro Da Rocha, <email xlink:href="mailto:riques.ribeiro@gmail.com">riques.ribeiro@gmail.com</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-03-04">
<day>04</day>
<month>03</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>8</volume>
<elocation-id>1770003</elocation-id>
<history>
<date date-type="received">
<day>17</day>
<month>12</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>08</day>
<month>02</month>
<year>2026</year>
</date>
<date date-type="accepted">
<day>10</day>
<month>02</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 Rocha and Goldoni.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Rocha and Goldoni</copyright-holder>
<license>
<ali:license_ref start_date="2026-03-04">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>This paper examines the complexities of cyberspace security governance. By using illustrative examples from the United States, the article explores how uncertainty, challenges in attribution, and the multiplicity of actors in cyberspace, when interacting with overlapping responsibilities among security and defense agencies, may create conditions associated with gray security governance, in which institutional and operational boundaries become less clearly defined. It is also argued that the current ambiguous form of cyber governance has allowed states to pursue strategic objectives in cyberspace without crossing the threshold of traditional conflict, which might enhance the difficulty in identifying and responding to cyber threats. Examples throughout the analysis will elucidate these challenges, highlighting that such governance dilemmas are globally present. The paper concludes with potential recommendations for a research and policy agenda to address the complexity of gray governance in cyberspace and how to overcome it.</p>
</abstract>
<kwd-group>
<kwd>cyber defense</kwd>
<kwd>cyber security</kwd>
<kwd>gray zone</kwd>
<kwd>defense governance</kwd>
<kwd>security governance</kwd>
<kwd>gray governance</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was not received for this work and/or its publication.</funding-statement>
</funding-group>
<counts>
<fig-count count="0"/>
<table-count count="1"/>
<equation-count count="0"/>
<ref-count count="40"/>
<page-count count="6"/>
<word-count count="4712"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Politics of Technology</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>The term gray zone, in the context of cyberspace, refers to a state of ambiguity and uncertainty in which cyber operations and malicious activities occur in ways that blur the line between normal behavior and acts of aggression or conflict, thereby fostering conditions conducive to maintaining plausible deniability (<xref ref-type="bibr" rid="ref25">Schmitt, 2017</xref>; <xref ref-type="bibr" rid="ref40">Wirtz, 2017</xref>). These conflicts are marked by ambiguity, attribution difficulties, and multiple actors. Although not amounting to armed conflict, gray zone actions may generate significant political, economic, and strategic consequences, blurring boundaries between cybersecurity and cyber defense.</p>
<p>The challenges posed by the gray zone on security governance have a direct impact on countries&#x2019; cyber statecraft. This issue becomes particularly relevant as states such as Brazil, Chile, and Costa Rica are currently debating their national policies and strategies on cybersecurity and cyber defense (see, for instance, <xref ref-type="bibr" rid="ref3">Brazil, 2023</xref>; <xref ref-type="bibr" rid="ref8">Costa Rica, 2023</xref>; <xref ref-type="bibr" rid="ref12">Goldoni et al., 2023</xref>; <xref ref-type="bibr" rid="ref11">Goldoni et al., 2024</xref>; <xref ref-type="bibr" rid="ref5">Chile, 2025</xref>). Examining the case of the United States, widely regarded as one of the most advanced nations in these areas, may thus provide valuable insights into potential challenges and pathways available to other states.</p>
<p>The objective of this article is to examine how the fogginess of security governance of cyberspace, coupled with the expansion of security and defense actors beyond their formal mandates, may shape the perception of conflict in this domain. The research question guiding the paper is: How can states address the challenges posed by the security governance of cyberspace? To achieve the objective and to answer the question, the article will explore how the United States navigates governance challenges.</p>
<p>While the literature on gray zone conflicts in cyberspace has largely focused on ambiguity, attribution problems, and the diffusion of actors, this article suggests the existence of a gray security governance in cyberspace; that is the presence of a multiplicity of actors involved in the securitization of cyberspace who, at times, operate beyond their formal institutional responsibilities and, at other times, act in an uncoordinated manner. More specifically, gray security governance captures how institutional overlaps, fragmented mandates, and blurred conceptual as well as legal and normative frameworks of cybersecurity and cyber defense contribute to the perception of an environment characterized by uncertainty and persistent attribution challenges.</p>
<p>Given the scope of the article, it does not aim to theorize gray security governance. Instead, the term is employed as an analytical lens to account for gray zone phenomena in cyberspace. Gray security governance is treated primarily as an intervening analytical condition that shapes how gray zone conflicts may emerge, rather than as a direct causal driver or a purely dependent outcome.</p>
<p>Uncertainty in cyberspace is often presented as an intrinsic characteristic of the domain. However, this article argues that such uncertainty is also shaped by legal, institutional, and governance arrangements that evolve unevenly across states. In this sense, ambiguity in cyberspace should not be understood solely as a technological or ontological feature, but also as a product of how states design, interpret, and implement governance structures in this domain.</p>
<p>The article advances the existing gray zone literature in two ways: (i) It shifts the focus from gray zone activities as isolated strategic practices to the governance structures that condition and shape such practices in cyberspace. Beyond that, (ii) it highlights how security governance arrangements themselves may become gray not only because of deliberate strategic choices, but also due to the interaction between the fluid nature of cyberspace and the multiplicity of actors involved in its regulation, protection, and defense.</p>
<p>The use of the United States as an illustrative case does not aim at generalization in a strict empirical sense. Instead, it serves to demonstrate how a highly developed cyber governance structure can still exhibit governance ambiguity when multiple organisms with partially overlapping mandates operate within the same domain. The broader insight, therefore, is not tied to the specific institutional design of the United States, but to structural features of cyberspace that may similarly affect other states, although in different configurations.</p>
</sec>
<sec id="sec2">
<label>2</label>
<title>Gray zone and gray zone conflicts in cyberspace</title>
<p>Cyberspace is composed of three layers: the physical layer, which encompasses cables, satellites, and hardware; the syntactic layer, referring to software and communication between networks; and the human layer, which represents decision-makers and the cognitive dimension that shapes this domain (<xref ref-type="bibr" rid="ref22">Rattray, 2009</xref>; <xref ref-type="bibr" rid="ref7">Cornish, 2015</xref>). These layers help explain core peculiarities of cyberspace explored in this section: attribution difficulties, uncertainty, and the multiplicity of actors. Attribution remains one of the most challenging tasks in cyberspace, as aggressive acts can be carried out under the belief that anonymity will be preserved. Episodes such as the 2007 Estonian cyberattacks and Stuxnet in 2010 are still formally unattributed, despite the existence of indications regarding potential responsible actors (<xref ref-type="bibr" rid="ref13">Guitton, 2012</xref>; <xref ref-type="bibr" rid="ref18">McKenzie, 2017</xref>).</p>
<p>Uncertainty is equally central to understanding state action in the cyber domain (<xref ref-type="bibr" rid="ref15">Kaminska, 2021</xref>). States are often cautious before responding to cyberattacks, aware of the risks associated with misattribution. According to Kaminska, uncertainty derives from the nature of cyberspace itself and the relative ease with which cyber capabilities can proliferate among diverse actors. This proliferation contributes to the diffusion of power in cyberspace, including to non-state actors, and increases the potential impact of cyber capabilities when deployed by a wide range of actors operating under different motivations and levels of accountability.</p>
<p>When considering the multiplicity of actors in cyberspace, this dynamic may also extend into national governance structures. In the United States, there is a considerable number of government agencies, such as the United States&#x2019; Cyber Command (USCYBERCOM), the National Security Agency (NSA), the Department of Homeland Security (DHS); the Cybersecurity and Infrastructure Security Agency (CISA); the Federal Bureau of Investigation (FBI); the National Cyber Investigative Joint Task Force (NCIJTF); the U.S. Secret Service; the Department of Justice&#x2019;s Cybersecurity Unit; the Department of Defense&#x2019;s Cyber Command; and the Department of Defense&#x2019;s Cyber Crime Center, involved with cybersecurity and cyber defense related issues. On the one hand, the number of agencies involved in the country&#x2019;s cyber governance structure reflects the strategic importance attributed to cyberspace. On the other hand, if not well-coordinated, such governance arrangements may generate duplicated efforts and overlapping operational spaces, which can blur institutional boundaries and operational responsibilities.</p>
<p>The ambiguity associated with these characteristics connects directly to the broader discussion of gray zone dynamics. While discussing this concept, <xref ref-type="bibr" rid="ref6">Cormac and Aldrich (2018)</xref> highlight the role of plausible deniability, where actors may deny responsibility due to the absence of conclusive evidence. However, for the authors, covert actions in the gray zone are &#x201C;less about plausible deniability and more about non-acknowledged intervention as performance&#x201D; (<xref ref-type="bibr" rid="ref6">Cormac and Aldrich, 2018</xref>, 493). Covert action may therefore be designed to signal capability, even without formal recognition. In the context of U.S. cyber governance, the overlap among CISA, USCYBERCOM, the NSA, and the FBI illustrates how the multiplicity of actors can complicate attribution processes and expand the range of operational responses available to state institutions operating within ambiguous institutional and normative environments.</p>
<p>Due to the intrinsic characteristics of cyberspace, the domain may provide particularly permissive conditions for gray zone activities. The ambiguity often associated with gray zone conflicts can create opportunities for state actors to pursue strategic objectives, avoid escalation into traditional armed conflict, operate under reduced expectations of immediate accountability, and signal capabilities through operational performance (<xref ref-type="bibr" rid="ref17">Lindsay, 2013</xref>; <xref ref-type="bibr" rid="ref23">Rid and Buchanan, 2015</xref>; <xref ref-type="bibr" rid="ref26">Segal, 2016</xref>; <xref ref-type="bibr" rid="ref6">Cormac and Aldrich, 2018</xref>).</p>
<p>Even states with traditional deterrence capabilities may operate in the gray zone to pursue strategic goals while attempting to avoid the political and strategic consequences typically associated with open conflict (<xref ref-type="bibr" rid="ref14">Hoffman, 2016</xref>). <xref ref-type="bibr" rid="ref24">Schadlow (2014)</xref> notes that the space between war and peace contains diverse competitions requiring state attention, while <xref ref-type="bibr" rid="ref2">Brands (2016</xref>, 1) characterizes gray zone conflicts as coercive but engineered to remain &#x201C;below the threshold of conventional military conflict and open interstate war.&#x201D;</p>
<p>In the United States, the USCYBERCOM holds the responsibility to plan, coordinate, and execute large-scale cyber operations in response to cyber threats (<xref ref-type="bibr" rid="ref27">United States, 2018</xref>). This institutional flexibility allows the Cyber Command to engage in defensive cyber operations, as well as in activities that may be interpreted as offensive or pre-emptive within gray zone dynamics, enabling the state to pursue strategic objectives without crossing the threshold of armed conflict. Acting below the threshold of war or armed conflict may involve activities or strategies that fall short of open military confrontation but still aim to shape strategic outcomes.</p>
<p>According to <xref ref-type="bibr" rid="ref2">Brands (2016)</xref>, although gray zone conflicts are not limited to a specific domain, cyberspace may offer particularly favorable conditions for this type of action. Among the factors that contribute to this dynamic are the difficulty in determining clear operational boundaries, challenges associated with accountability, and the persistent lack of clarity in international norms and regulatory frameworks governing cyber activities (<xref ref-type="bibr" rid="ref4">Brown and Poellet, 2012</xref>; <xref ref-type="bibr" rid="ref39">von Heintschel Heinegg, 2013</xref>).</p>
</sec>
<sec id="sec3">
<label>3</label>
<title>Gray security governance in cyberspace</title>
<p>The gray zone represents a state of ambiguity in which cyber operations and malicious activity occur without crossing the threshold of armed conflict. Security governance refers to the structures, processes, policies, and practices used by actors to coordinate and address national security and defense issues. Gray security governance can be understood as a form of governance marked by institutional and normative ambiguity, which may create permissive conditions in which actors operate beyond strictly defined traditional roles. This may occur when agencies operate within ambiguous boundaries between concepts such as cybersecurity and cyber defense.</p>
<p>It is acknowledged that there are many uses to the concept of Governance, such as bureaucratic control (<xref ref-type="bibr" rid="ref10">Furtado Rodrigues and Pacheco Filho, 2025</xref>), public integrity (<xref ref-type="bibr" rid="ref20">Oliveira et al., 2024</xref>); collaboration (<xref ref-type="bibr" rid="ref1">Ansell and Gash, 2008</xref>), domestic concertation of actors, processes and decision-making in a domestic set (<xref ref-type="bibr" rid="ref12">Goldoni et al., 2023</xref>) and so forth. According to <xref ref-type="bibr" rid="ref21">Peters and Pierre (1998)</xref>, governance increases governmental capacity through strategic inter-organizational coalitions with actors beyond the state. It is therefore necessary to observe how governance develops and to assess the influence of actors within a given structure. <xref ref-type="bibr" rid="ref41">Yong and Wenhao (2012)</xref> add that governance reflects the various ways individuals and institutions manage common affairs. Thus, governance can be defined as a joint approach to addressing specific issues, involving public and private actors and civil society organizations.</p>
<p>For <xref ref-type="bibr" rid="ref16">Krahmann (2003)</xref>, security governance refers to the structures and processes that allow actors to coordinate mutual needs and interests via decision-making and implementation in the security area in the absence of a central authority. The concept of security governance was introduced in the field of International Relations at the end of the Cold War (<xref ref-type="bibr" rid="ref9">Flemes and Radseck, 2009</xref>). The term reflects the fragmentation of the security agenda during a transitional period in which there was no longer a unified military threat, but an expansion of threats and risks arising from both state and non-state actors.</p>
<p>Similar to constructivist interpretations of anarchy, ambiguity in cyberspace governance can be understood as socially and institutionally produced rather than purely technologically determined. In this sense, governance arrangements in cyberspace may reflect not only technical constraints but also institutional design choices, organizational interactions, and evolving policy interpretations.</p>
<p>When considering the United States, it is possible to identify an established security governance structure operating in cyberspace. However, when comparing the definitions provided in U.S. documents for the concepts of &#x201C;cybersecurity&#x201D; and &#x201C;cyberdefense&#x201D; (see <xref ref-type="table" rid="tab1">Table 1</xref>) with the observed activities of actors involved in these areas, governance may appear blurred in practice. The United States case is therefore used not as a universal model of cyber governance, but as an empirical illustration of how advanced institutional architectures can still operate within ambiguous legal and operational boundaries in cyberspace. In this context, gray zone dynamics may emerge not only from the intrinsic characteristics of cyberspace, but also from legal gaps, overlapping institutional mandates, and fragmented governance arrangements.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>U.S. definitions of cybersecurity and cyberdefense.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Term</th>
<th align="left" valign="top">Definition</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Cybersecurity</td>
<td align="left" valign="top">The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.</td>
</tr>
<tr>
<td align="left" valign="top">Cyberdefense</td>
<td align="left" valign="top">Actions taken within protected cyberspace to defeat specific threats that have breached or are threatening to breach cyberspace security measures and include actions to detect, characterize, counter, and mitigate threats, including malware or the unauthorized activities of users, and to restore the system to a secure configuration.</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>Source: Own elaboration based on <xref ref-type="bibr" rid="ref29">United States (2021a)</xref>, <xref ref-type="bibr" rid="ref30">United States (2021b)</xref>, <xref ref-type="bibr" rid="ref31">United States (2021c)</xref>, <xref ref-type="bibr" rid="ref32">United States (2021d)</xref>, <xref ref-type="bibr" rid="ref33">United States (2021e)</xref>, <xref ref-type="bibr" rid="ref34">United States (2022a)</xref>, <xref ref-type="bibr" rid="ref35">United States (2022b)</xref>, <xref ref-type="bibr" rid="ref36">United States (2022c)</xref>, and <xref ref-type="bibr" rid="ref37">United States (2022d)</xref>.</p>
</table-wrap-foot>
</table-wrap>
<p>From the definitions of cybersecurity and cyberdefense (see <xref ref-type="table" rid="tab1">Table 1</xref>), one can infer that, while the former is primarily defensive or preventive in nature, the latter entails a more active and assertive posture, since it emphasizes the proactive and, at times, offensive dimension of its capabilities.</p>
<p>One example of cyberspace&#x2019;s security governance structures in the United States is the NCIJTF, led by the FBI. This task force coordinates, integrates, and shares information on cyber threat investigations (<xref ref-type="bibr" rid="ref29">United States, 2021a</xref>; <xref ref-type="bibr" rid="ref30">United States, 2021b</xref>; <xref ref-type="bibr" rid="ref31">United States, 2021c</xref>; <xref ref-type="bibr" rid="ref32">United States, 2021d</xref>; <xref ref-type="bibr" rid="ref33">United States, 2021e</xref>). The FBI&#x2019;s responsibilities in cyberspace include defending networks and information systems, holding malicious actors accountable, suggesting sanctions, and considering retaliation. The FBI&#x2019;s <xref ref-type="bibr" rid="ref36">United States (2022c)</xref> aims to impose risk and consequences on adversaries, asserting the agency&#x2019;s ability to influence the behavior of criminals and nation-states targeting US networks. This offensive posture contrasts with <xref ref-type="bibr" rid="ref19">Morgenthau&#x2019;s (2003)</xref> concept of power. Although primarily an investigative and domestic intelligence agency, the FBI has expanded operational practices into areas traditionally associated with cyber defense, such as responding to cyberattacks. In doing so, its actions may extend beyond the country&#x2019;s formal definition of cybersecurity and into activities that could be interpreted as cyber offense, which are traditionally associated with USCYBERCOM.</p>
<p>As its name indicates, the Cybersecurity and Infrastructure Security Agency (CISA) represents a security agency. Nonetheless, its activities may, in practice, extend beyond the US&#x2019;s definition of Security (<xref ref-type="table" rid="tab1">Table 1</xref>). CISA takes on responsibilities for promoting assistance, analyzing the impact, and identifying those responsible for cyberattacks, as well as coordinating responses to attacks that may have been carried out by external actors and/or other states (<xref ref-type="bibr" rid="ref38">United States, 2023</xref>). Carrying out offensive measures against external actors has traditionally been associated with cyber defense organizations, such as USCYBERCOM.</p>
<p>But why is it that cybersecurity agencies in the United States continue to act beyond their traditional attributions? This, however, is not a simple question, and there are several possible explanations. One possibility is that, up until this moment, US agencies may have operated within ambiguous institutional and legal environments that reduce clear mechanisms of accountability. Another possible explanation could be the non-existence of internationally standardized and widely accepted terms for cybersecurity and defense, which may allow states to coordinate cyber operations with greater interpretive flexibility. A further explanation may lie in bureaucratic competition over authority, resources, and budgetary allocations among agencies.</p>
<p>The reason why we argue that there is gray security governance occurring in cyberspace is that, even though states have cyber-specific organizations to deal with cybersecurity and cyber defense &#x2013; as illustrated by the U.S. examples &#x2013; and although these structures may appear highly organized from an external perspective, it is still possible to observe that these organizations may not always be fully aligned or coordinated to respond according to their formally defined attributions. However, it is important to highlight that this dynamic may reflect both bureaucratic adaptation to a complex domain and, in some cases, the strategic advantages created by operating within ambiguous governance environments, rather than necessarily representing deliberate institutional design.</p>
</sec>
<sec id="sec4">
<label>4</label>
<title>Is this a gray world?</title>
<p>The lack of clarity in international norms, regulations, and legislation in cyberspace (<xref ref-type="bibr" rid="ref4">Brown and Poellet, 2012</xref>; <xref ref-type="bibr" rid="ref39">von Heintschel Heinegg, 2013</xref>) may create permissive conditions that make cyberspace an appealing environment for gray zone activities, which could lead to significant security and governance challenges. Rather than assuming a deterministic relationship, this article suggests that structural ambiguity in cyberspace and institutional ambiguity in governance arrangements interact in mutually reinforcing ways, creating permissive environments in which gray zone practices can develop without necessarily being predetermined.</p>
<p>Furthermore, the existing legal gap in cyberspace may contribute to sustaining conditions associated with gray security governance among the securitizing actors in this domain. In the U.S. examples, for instance, it is possible to observe that both security and defense agencies operate within spaces that may overlap with gray zone dynamics, a pattern that may also be observed in different forms in other countries. Due to the lack of legal clarity and international agreement regarding the roles of security and defense actors in cyberspace, and because of the persistent ambiguity surrounding this domain, mechanisms of accountability may be more difficult to operationalize, potentially reducing the likelihood of sanctions when agencies operate beyond their formal assignments.</p>
<p>Consequently, the very meaning of Security and Defense in cyberspace might become more fluid and context-dependent. Unlike traditional domains, where there are territorial and operational limitations, as well as clearer legislation defining the expected roles of security and defense agencies, these limits are still not fully consolidated in cyberspace, even though countries such as the U.S. have opted to recognize cyberspace as a domain of conflict alongside air, land, sea, and outer space. This legal gap, therefore, could create conditions in which state actors operate with greater interpretive flexibility, sometimes extending beyond their formally defined assignments. Thus, gray security governance in cyberspace conditions and shapes gray zone dynamics, rather than determines them.</p>
<p>These issues point to broader reflections surrounding the drivers of gray security governance in cyberspace. Such governance may reflect a lack of institutional adaptation to cyber-specific security challenges, but it may also stem from strategic convenience, bureaucratic inertia, or the fluid and evolving nature of cyberspace itself. Organizations originally conceived within an &#x201C;analog&#x201D; security environment may therefore struggle to respond effectively to a domain that transcends territorial boundaries and challenges traditional expressions of state power. In this sense, and echoing Wendt&#x2019;s constructivist argument that anarchy is what states make of it, cybersecurity, cyber defense, and gray zone dynamics may likewise be shaped by how states define, interpret, and operationalize these concepts over time.</p>
<p>These insights highlight that gray security governance is not merely an analytical concern, but also a practical policy challenge. The following policy considerations are derived directly from the governance dynamics discussed throughout this article.</p>
<p>Firstly, clarifying the roles of security and defense organizations in cyberspace could strengthen accountability mechanisms and improve governance coordination. Beyond operational efficiency, clearer role definition may help reduce ambiguity generated by overlapping mandates and fragmented institutional authority, which, as illustrated in the U.S. case, can create conditions in which different actors interpret their responsibilities in partially conflicting ways. In this sense, role clarification should also be understood as a mechanism for reducing structurally produced governance ambiguity, thereby reducing the conditions under which gray security governance may persist.</p>
<p>Secondly, promoting interagency coordination mechanisms, both domestically and internationally, might improve information-sharing and operational coherence. Beyond improving response efficiency, stronger coordination may help reduce situations in which multiple organizations develop parallel or partially conflicting interpretations of authority, responsibility, and operational scope. In governance environments characterized by institutional overlap, coordination mechanisms may therefore function as stabilizing tools that help limit the emergence of operational ambiguity and reduce the likelihood of fragmented responses that contribute to gray security governance dynamics.</p>
<p>Finally, advancing international discussions on norms of responsible state behavior in cyberspace could contribute to cooperation among states facing shared threats and might help reduce opportunities for actors to operate within ambiguous governance environments. In this sense, norm development should not be understood only as a regulatory or diplomatic process, but also as a mechanism through which shared expectations of behavior can reduce interpretive uncertainty across jurisdictions. Over time, clearer normative environments may contribute to reducing structurally produced ambiguity in cyberspace governance, particularly in areas where legal frameworks and institutional mandates remain unevenly developed across states.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec5">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec sec-type="author-contributions" id="sec6">
<title>Author contributions</title>
<p>HR: Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft. LG: Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft.</p>
</sec>
<ack>
<title>Acknowledgments</title>
<p>The corresponding author would like to thank the Pro-Defense IV initiative, Science, Technology and Innovation in Defense: National Defense and Cyber, and the Research Support Foundation of the State of Rio de Janeiro (FAPERJ) for their support through scholarships during the author&#x2019;s studies.</p>
</ack>
<sec sec-type="COI-statement" id="sec7">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec8">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec9">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ansell</surname><given-names>C.</given-names></name> <name><surname>Gash</surname><given-names>A.</given-names></name></person-group> (<year>2008</year>). <article-title>Collaborative governance in theory and practice</article-title>. <source>J. Public Adm. Res. Theory</source> <volume>18</volume>, <fpage>543</fpage>&#x2013;<lpage>571</lpage>. doi: <pub-id pub-id-type="doi">10.1093/jopart/mum032</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brands</surname><given-names>H.</given-names></name></person-group> (<year>2016</year>). <article-title>Paradoxes of the gray zone</article-title>. <source>SSRN</source>, <fpage>1</fpage>&#x2013;<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.2139/ssrn.2737593</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll1">Brazil</collab></person-group>. (<year>2023</year>). Decreto n.&#x00B0; 11.856, de 26 de dezembro de 2023. Available online at: <ext-link xlink:href="https://www.in.gov.br/en/web/dou/-/decreto-n-11.856-de-26-de-dezembro-de-2023-533845289" ext-link-type="uri">https://www.in.gov.br/en/web/dou/-/decreto-n-11.856-de-26-de-dezembro-de-2023-533845289</ext-link> (Accessed November 10, 2025)</mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brown</surname><given-names>G.</given-names></name> <name><surname>Poellet</surname><given-names>K.</given-names></name></person-group> (<year>2012</year>). <article-title>The customary international law of cyberspace</article-title>. <source>Strateg. Stud. Q.</source> <volume>6</volume>, <fpage>126</fpage>&#x2013;<lpage>145</lpage>.</mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll2">Chile</collab></person-group>. (<year>2025</year>). Ley N.&#x00B0; 12.155. Available online at: <ext-link xlink:href="https://www.bcn.cl/leychile/navegar?idNorma=1215589&#x0026;idVersion=2025-08-06" ext-link-type="uri">https://www.bcn.cl/leychile/navegar?idNorma=1215589&#x0026;idVersion=2025-08-06</ext-link> (Accessed November 10, 2025)</mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cormac</surname><given-names>R.</given-names></name> <name><surname>Aldrich</surname><given-names>R.</given-names></name></person-group> (<year>2018</year>). <article-title>Grey is the new black: covert action and implausible deniability</article-title>. <source>Int. Aff.</source> <volume>94</volume>, <fpage>477</fpage>&#x2013;<lpage>494</lpage>. doi: <pub-id pub-id-type="doi">10.1093/ia/iiy067</pub-id></mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cornish</surname><given-names>P.</given-names></name></person-group> (<year>2015</year>). <article-title>Governing cyberspace through constructive ambiguity</article-title>. <source>Survival</source> <volume>57</volume>, <fpage>153</fpage>&#x2013;<lpage>176</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00396338.2015.1046230</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll3">Costa Rica</collab></person-group>. (<year>2023</year>). Estrategia Nacional de Ciberseguridad de Costa Rica 2023&#x2013;2027. Avaialble online at: <ext-link xlink:href="https://www.micitt.go.cr/sites/default/files/2023-11/NCS%20Costa%20Rica%20-%2010Nov2023%20SPA.pdf" ext-link-type="uri">https://www.micitt.go.cr/sites/default/files/2023-11/NCS%20Costa%20Rica%20-%2010Nov2023%20SPA.pdf</ext-link> (Accessed November 10, 2025)</mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Flemes</surname><given-names>D.</given-names></name> <name><surname>Radseck</surname><given-names>M.</given-names></name></person-group> (<year>2009</year>). <article-title>Creating multilevel security governance in South America</article-title>. <source>GIGA</source> <volume>117</volume>, <fpage>5</fpage>&#x2013;<lpage>35</lpage>. doi: <pub-id pub-id-type="doi">10.4324/9780203126127-14</pub-id></mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Furtado Rodrigues</surname><given-names>K.</given-names></name> <name><surname>Pacheco Filho</surname><given-names>C. E. R.</given-names></name></person-group> (<year>2025</year>). <article-title>New development: assessing the influence of Brazil's public governance narrowness on the Brazilian Army</article-title>. <source>Public Money Manag.</source> <volume>45</volume>, <fpage>87</fpage>&#x2013;<lpage>91</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09540962.2024.2365355</pub-id></mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Goldoni</surname><given-names>L. R. F.</given-names></name> <name><surname>Rodrigues</surname><given-names>K. F.</given-names></name> <name><surname>Medeiros</surname><given-names>B. P.</given-names></name></person-group> (<year>2024</year>). <article-title>What is the future of Brazil&#x2019;s cybersecurity governance?</article-title> <source>Cad. Gest&#x00E3;o P&#x00FA;blica Cidad.</source> <volume>29</volume>, <fpage>1</fpage>&#x2013;<lpage>14</lpage>. doi: <pub-id pub-id-type="doi">10.12660/cgpc.v29.90972.85588</pub-id></mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Goldoni</surname><given-names>L.R.F.</given-names></name> <name><surname>Rodrigues</surname><given-names>K.F.</given-names></name> <name><surname>Oliveira J&#x00FA;nior</surname><given-names>T.M.</given-names></name></person-group> (<year>2023</year>). &#x2018;O urgente debate sobre a proposta de Pol&#x00ED;tica Nacional de Ciberseguran&#x00E7;a&#x2019;, Estad&#x00E3;o, [online]. Available online at: <ext-link xlink:href="https://www.estadao.com.br/politica/gestao-politica-e-sociedade/o-urgente-debate-sobre-a-proposta-de-politica-nacional-de-ciberseguranca/?srsltid=AfmBOoqsG3abivz-wEHdV4QMwwPmD1lPCxfj2zXsWVVG4POq44B5UHwF" ext-link-type="uri">https://www.estadao.com.br/politica/gestao-politica-e-sociedade/o-urgente-debate-sobre-a-proposta-de-politica-nacional-de-ciberseguranca/?srsltid=AfmBOoqsG3abivz-wEHdV4QMwwPmD1lPCxfj2zXsWVVG4POq44B5UHwF</ext-link> (Accessed November 10, 2025)</mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Guitton</surname><given-names>C.</given-names></name></person-group> (<year>2012</year>). <article-title>Criminals and cyber attacks: the missing link between attribution and deterrence</article-title>. <source>Int. J. Cyber Criminol.</source> <volume>6</volume>, <fpage>1030</fpage>&#x2013;<lpage>1043</lpage>.</mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hoffman</surname><given-names>F.</given-names></name></person-group> (<year>2016</year>). The Contemporary Spectrum of Conflict: protracted, gray zone, ambiguous, and hybrid modes of war. The Heritage Foundation. Available online at: <ext-link xlink:href="https://www.heritage.org/military-strength-topical-essays/2016-essays/the-contemporary-spectrum-conflict-protracted-gray" ext-link-type="uri">https://www.heritage.org/military-strength-topical-essays/2016-essays/the-contemporary-spectrum-conflict-protracted-gray</ext-link> (Accessed November 23, 2024).</mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kaminska</surname><given-names>M.</given-names></name></person-group> (<year>2021</year>). <article-title>Restraint under conditions of uncertainty: why the United States tolerates cyberattacks</article-title>. <source>J. Cybersecur.</source> <volume>7</volume>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.1093/cybsec/tyab008</pub-id></mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Krahmann</surname><given-names>E.</given-names></name></person-group> (<year>2003</year>). <article-title>Conceptualizing security governance</article-title>. <source>Coop. Conflict</source> <volume>38</volume>, <fpage>5</fpage>&#x2013;<lpage>26</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0010836703038001001</pub-id></mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lindsay</surname><given-names>J.</given-names></name></person-group> (<year>2013</year>). <article-title>Stuxnet and the limits of cyber warfare</article-title>. <source>Secur. Stud.</source> <volume>22</volume>, <fpage>365</fpage>&#x2013;<lpage>404</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09636412.2013.816122</pub-id></mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>McKenzie</surname><given-names>T.</given-names></name></person-group> (<year>2017</year>). <source>Is cyber deterrence possible?</source> <publisher-name>Montgomery, Alabama: Air University Press, Air Force Research Institute</publisher-name>.</mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Morgenthau</surname><given-names>H.</given-names></name></person-group> (<year>2003</year>). <source>Politics among nations: The struggle for power and peace</source>. <publisher-loc>Bras&#x00ED;lia</publisher-loc>: <publisher-name>University of Bras&#x00ED;lia</publisher-name>.</mixed-citation></ref>
<ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Oliveira</surname><given-names>T. M. D.</given-names></name> <name><surname>Rodrigues</surname><given-names>K. F.</given-names></name> <name><surname>Silva</surname><given-names>S. D. A. M. E.</given-names></name> <name><surname>Bergue</surname><given-names>S. T.</given-names></name></person-group> (<year>2024</year>). <article-title>Integridade, &#x00E9;tica e combate &#x00E0; corrup&#x00E7;&#x00E3;o no campo da administra&#x00E7;&#x00E3;o p&#x00FA;blica brasileira: desafios conceituais e horizontes poss&#x00ED;veis</article-title>. <source>Cad. Gest&#x00E3;o P&#x00FA;blica Cidadania</source> <volume>29</volume>:<fpage>e92312</fpage>. doi: <pub-id pub-id-type="doi">10.12660/cgpc.v29.92312</pub-id></mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Peters</surname><given-names>G.</given-names></name> <name><surname>Pierre</surname><given-names>J.</given-names></name></person-group> (<year>1998</year>). <article-title>Governance without government? Rethinking public administration</article-title>. <source>J. Public Adm. Res. Theory</source> <volume>8</volume>, <fpage>223</fpage>&#x2013;<lpage>243</lpage>. doi: <pub-id pub-id-type="doi">10.1093/oxfordjournals.jpart.a024379</pub-id></mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Rattray</surname><given-names>G.</given-names></name></person-group> (<year>2009</year>). &#x201C;<chapter-title>An environmental approach to understanding Cyberpower</chapter-title>&#x201D; in <source>Cyberpower and national security</source>. eds. <person-group person-group-type="editor"><name><surname>Kramer</surname><given-names>F. D.</given-names></name> <name><surname>Starr</surname><given-names>S. H.</given-names></name> <name><surname>Wentz</surname><given-names>L. K.</given-names></name></person-group> (<publisher-name>Abingdon, England: Potomac Books, Inc.</publisher-name>), <fpage>253</fpage>&#x2013;<lpage>274</lpage>.</mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rid</surname><given-names>T.</given-names></name> <name><surname>Buchanan</surname><given-names>B.</given-names></name></person-group> (<year>2015</year>). <article-title>Attributing cyberattacks</article-title>. <source>J. Strateg. Stud.</source> <volume>38</volume>, <fpage>4</fpage>&#x2013;<lpage>37</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01402390.2014.977382</pub-id></mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Schadlow</surname><given-names>N.</given-names></name></person-group> (<year>2014</year>). Peace and War: the space between. War on the Rocks 18. Available online at: <ext-link xlink:href="https://warontherocks.com/2014/08/peace-and-war-the-space-between/" ext-link-type="uri">https://warontherocks.com/2014/08/peace-and-war-the-space-between/</ext-link> (Accessed November 23, 2024).</mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Schmitt</surname><given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>Grey zones in the international law of cyberspace</article-title>. <source>Yale J. Int. Law Online</source> <volume>42</volume>, <fpage>1</fpage>&#x2013;<lpage>21</lpage>.</mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Segal</surname><given-names>A.</given-names></name></person-group> (<year>2016</year>). <source>The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age</source>. <publisher-name>New York, NY: Hachette UK</publisher-name>.</mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll4">United States</collab></person-group>. (<year>2018</year>). Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command. Avaialble online at: <ext-link xlink:href="https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf" ext-link-type="uri">https://www.cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf</ext-link> (Accessed January 23, 2023)</mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll6">United States</collab></person-group>. (<year>2021a</year>). DOD Dictionary of Military and Associated Terms. Avaialble online at: <ext-link xlink:href="https://www.supremecourt.gov/opinions/URLs_Cited/OT2021/21A477/21A477-1.pdf" ext-link-type="uri">https://www.supremecourt.gov/opinions/URLs_Cited/OT2021/21A477/21A477-1.pdf</ext-link> (Accessed November 23, 2024)</mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll7">United States</collab></person-group>. (<year>2021b</year>). National Cyber Investigative Joint Task Force. Available online at: <ext-link xlink:href="https://www.fbi.gov/investigate/cyber/national-cyber-investigative-joint-task-force" ext-link-type="uri">https://www.fbi.gov/investigate/cyber/national-cyber-investigative-joint-task-force</ext-link> (Accessed November 23, 2024)</mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll8">United States</collab></person-group>. (<year>2021c</year>). The Cyber Threat. Available online at: <ext-link xlink:href="https://www.fbi.gov/investigate/cyber" ext-link-type="uri">https://www.fbi.gov/investigate/cyber</ext-link> (Accessed November 23, 2024)</mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll9">United States</collab></person-group>. (<year>2021d</year>). The United States Department of Justice: cybersecurity unit. Available online at: <ext-link xlink:href="https://www.justice.gov/criminal-ccips/cybersecurity-unit" ext-link-type="uri">https://www.justice.gov/criminal-ccips/cybersecurity-unit</ext-link> (Accessed November 23, 2024)</mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll10">United States</collab></person-group>. (<year>2021e</year>). United States Secret Service: cyber investigations. Available online at: <ext-link xlink:href="https://www.secretservice.gov/investigation/cyber" ext-link-type="uri">https://www.secretservice.gov/investigation/cyber</ext-link> (Accessed November 23, 2024)</mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll11">United States</collab></person-group>. (<year>2022a</year>). Cybersecurity and Infrastructure Security Agency: securing federal networks. Available online at: <ext-link xlink:href="https://www.cisa.gov/securing-federal-networks" ext-link-type="uri">https://www.cisa.gov/securing-federal-networks</ext-link> (Accessed November 23, 2024)</mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll12">United States</collab></person-group>. (<year>2022b</year>). Cybersecurity Glossary. Available online at: <ext-link xlink:href="https://niccs.cisa.gov/cybersecurity-career-resources/glossary" ext-link-type="uri">https://niccs.cisa.gov/cybersecurity-career-resources/glossary</ext-link> (Accessed 23 November 2024)</mixed-citation></ref>
<ref id="ref36"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll13">United States</collab></person-group>. (<year>2022c</year>). Department of Homeland Security: Secure Cyberspace and Critical Infrastructure. Available online at: <ext-link xlink:href="https://www.dhs.gov/secure-cyberspace-and-critical-infrastructure" ext-link-type="uri">https://www.dhs.gov/secure-cyberspace-and-critical-infrastructure</ext-link> (Accessed November 23, 2024)</mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll14">United States</collab></person-group>. (<year>2022d</year>). The DoD Cyber Crime Center. Available online at: <ext-link xlink:href="https://www.dc3.mil" ext-link-type="uri">https://www.dc3.mil</ext-link> (Accessed 23 November 2024)</mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll15">United States</collab></person-group>. (<year>2023</year>). FY2024-2026 Cybersecurity Strategic Plan. Available online at: <ext-link xlink:href="https://www.cisa.gov/sites/default/files/2025-01/FY2024-2026_Cybersecurity_Strategic_Plan508.pdf" ext-link-type="uri">https://www.cisa.gov/sites/default/files/2025-01/FY2024-2026_Cybersecurity_Strategic_Plan508.pdf</ext-link> (Accessed February 5, 2026)</mixed-citation></ref>
<ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>von Heintschel Heinegg</surname><given-names>W.</given-names></name></person-group> (<year>2013</year>). <article-title>Territorial sovereignty and neutrality in cyberspace</article-title>. <source>Int. Law Stud.</source> <volume>89</volume>, <fpage>123</fpage>&#x2013;<lpage>156</lpage>. <ext-link xlink:href="https://digital-commons.usnwc.edu/ils/vol89/iss1/17" ext-link-type="uri">https://digital-commons.usnwc.edu/ils/vol89/iss1/17</ext-link></mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wirtz</surname><given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>Life in the gray zone: observations for contemporary strategists</article-title>. <source>Def. Secur. Anal.</source> <volume>33</volume>, <fpage>106</fpage>&#x2013;<lpage>114</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14751798.2017.1310702</pub-id></mixed-citation></ref>
<ref id="ref41"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yong</surname><given-names>G.</given-names></name> <name><surname>Wenhao</surname><given-names>C.</given-names></name></person-group> (<year>2012</year>). <article-title>Developing a city governance index: based on surveys in five major Chinese cities</article-title>. <source>Soc. Indic. Res.</source> <volume>109</volume>, <fpage>305</fpage>&#x2013;<lpage>316</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11205-011-9904-8</pub-id></mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3295647/overview">Ma&#x0142;gorzata Krystyna Kamola-Cie&#x015B;lik</ext-link>, University of Szczecin, Poland</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3143449/overview">Ada Peter</ext-link>, Covenant University, Nigeria</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3349028/overview">Cosimo Melella</ext-link>, Tallinn University of Technology, Estonia</p>
</fn>
</fn-group>
</back>
</article>