Cyber-warfare is rising astronomically. With the advancement in technology comes increased scope of victimization. Individuals, organizations, and countries are not left out in the ever-expanding list of victims. State and non-state cyber-warriors are not sparing any entity that makes itself vulnerable. This article examines the historical and definitional dimensions of cyberwarfare as well as the factors responsible for the victimization of both states and non-state victims. It also proffers solutions for “taming the shrew” of the ever-expanding menace of cyber warfare.
Cite this paper
Obi, F. C. and Oludare, A. M. (2022). Taming the Shrew of Rising Cyber-Warfare. Open Access Library Journal, 9, e9003. doi: http://dx.doi.org/10.4236/oalib.1109003.
Hjortdal, M. (2011) China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence. Journal of Strategic Security, 4, 1-24.
https://doi.org/10.5038/1944-0472.4.2.1
Hathaway, O.A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W. and Spiegel, J. (2012) The Law of Cyber-Attack. California Law Review, 100, 817-885.
Hoisington, M. (2009) Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense. Boston College International and Comparative Law Review, 32, 439-454. https://doi.org/10.2139/ssrn.1542223
Billo, C. and Chang, W. (2004) Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation-States. Institute for Security Technology Studies at Dartmouth College, Hanover.
Joyner, C.C. and Lorionte, C. (2001) Information Warfare as International Coercion: Elements of a Legal Framework. European Journal of International, 12, 825-865. https://doi.org/10.1093/ejil/12.5.825
Shackelford, S.J. (2009) From Nuclear War to Netwar: Analogizing Cyber-Attacks in International Law. Berkeley Journal of International Law, 27, 192-251.
Knapp, K.J. and Boulton, W.R. (2006) Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments. Information System Management, 23, 76-87. https://doi.org/10.1201/1078.10580530/45925.23.2.20060301/92675.8
Libicki, M.C. (1995) What Is Information Warfare? National Defense University Institute for National Strategic Studies, Washington DC.
https://doi.org/10.21236/ADA385640
Trautman, L.J. and Ormerod, P.C. (2017) Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things. University of Miami Law Review, 72, 761.
https://doi.org/10.2139/ssrn.2982629
Robinson, M., Jones, K. and Janicke, H. (2015) Cyber Warfare: Issues and Challenges. Computers & Security, 49, 70-94. https://doi.org/10.1016/j.cose.2014.11.007
Tucker, T.E. (2004) Leveraging Protection Mechanisms to Provide Defense in Depth. In: Whitman, M.E. and Mattord, H.J., Eds., Management of Information Security, Course Technology, Boston, p 408.
Dogrul, M., Aslan, A. and Celik, E. (2011) Developing International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism. 2011 IEEE 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, 1-15.
Robinson, M., Jones, K., Janicke, H. and Maglaras, L. (2018) An Introduction to Cyber Peacekeeping. Journal of Network and Computer Applications, 114, 70-87.
https://doi.org/10.1016/j.jnca.2018.04.010