全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Taming the Shrew of Rising Cyber-Warfare

DOI: 10.4236/oalib.1109003, PP. 1-12

Subject Areas: Politics

Keywords: Cyber-Warfare, Cybersecurity, Cyberbullying, Information War, Cyber-Attack

Full-Text   Cite this paper   Add to My Lib

Abstract

Cyber-warfare is rising astronomically. With the advancement in technology comes increased scope of victimization. Individuals, organizations, and countries are not left out in the ever-expanding list of victims. State and non-state cyber-warriors are not sparing any entity that makes itself vulnerable. This article examines the historical and definitional dimensions of cyberwarfare as well as the factors responsible for the victimization of both states and non-state victims. It also proffers solutions for “taming the shrew” of the ever-expanding menace of cyber warfare.

Cite this paper

Obi, F. C. and Oludare, A. M. (2022). Taming the Shrew of Rising Cyber-Warfare. Open Access Library Journal, 9, e9003. doi: http://dx.doi.org/10.4236/oalib.1109003.

References

[1]  Pawar, P. (2022) 50 Alarming Cybersecurity Statistics 2022 Facts and Trends That Users Need. EnterpriseAppsToday. https://www.enterpriseappstoday.com
[2]  Porche III, I.R., Sollinger, J.M. and McKay, S. (2012) An Enemy without Boundaries. Proceedings Magazine, 138, 1-6.
[3]  Hjortdal, M. (2011) China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence. Journal of Strategic Security, 4, 1-24. https://doi.org/10.5038/1944-0472.4.2.1
[4]  Smedinghoff, T.J. (2008) Information Security Law: The Emerging Standard for Corporate Compliance. IT Governance Ltd., Ely.
[5]  Hathaway, O.A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W. and Spiegel, J. (2012) The Law of Cyber-Attack. California Law Review, 100, 817-885.
[6]  Hoisington, M. (2009) Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense. Boston College International and Comparative Law Review, 32, 439-454. https://doi.org/10.2139/ssrn.1542223
[7]  Billo, C. and Chang, W. (2004) Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation-States. Institute for Security Technology Studies at Dartmouth College, Hanover.
[8]  Joyner, C.C. and Lorionte, C. (2001) Information Warfare as International Coercion: Elements of a Legal Framework. European Journal of International, 12, 825-865. https://doi.org/10.1093/ejil/12.5.825
[9]  Shackelford, S.J. (2009) From Nuclear War to Netwar: Analogizing Cyber-Attacks in International Law. Berkeley Journal of International Law, 27, 192-251.
[10]  Knapp, K.J. and Boulton, W.R. (2006) Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments. Information System Management, 23, 76-87. https://doi.org/10.1201/1078.10580530/45925.23.2.20060301/92675.8
[11]  Libicki, M.C. (1995) What Is Information Warfare? National Defense University Institute for National Strategic Studies, Washington DC. https://doi.org/10.21236/ADA385640
[12]  Breen, M. and Geltzer, J.A. (2011) Asymmetric Strategies as Strategies of the Strong. Parameters, 41, 41-55. https://doi.org/10.55540/0031-1723.2565
[13]  Trautman, L.J. and Ormerod, P.C. (2017) Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things. University of Miami Law Review, 72, 761. https://doi.org/10.2139/ssrn.2982629
[14]  O’Connell, M.E. (2012) Cyber Security without Cyber War. Journal of Conflict & Security, 17, 187-209. https://doi.org/10.1093/jcsl/krs017
[15]  Robinson, M., Jones, K. and Janicke, H. (2015) Cyber Warfare: Issues and Challenges. Computers & Security, 49, 70-94. https://doi.org/10.1016/j.cose.2014.11.007
[16]  (2013) Oxford English Dictionary. Oxford University Press, Oxford.
[17]  Parks, R.C. and Duggan, D.P. (2011) Principles of Cyber Warfare. IEEE Security & Privacy, 9, 30-35. https://doi.org/10.1109/MSP.2011.138
[18]  Carr, J. (2012) Inside Cyber Warfare: Mapping the Cyber Underworld. O’Reilly Media, Inc., Sebastopol.
[19]  Cornish, P., Livingstone, D., Clemente, D. and Yorke, C. (2012) On Cyber Warfare.
[20]  Herz, J.H. (1950) Idealist Internationalism and the Security Dilemma. World Politics, 2, 157-180. https://doi.org/10.2307/2009187
[21]  Inkster, N. (2013) Conflict Foretold: America and China. Survival, 55, 7-28. https://doi.org/10.1080/00396338.2013.841802
[22]  Cronin, B. (2002) Information Warfare. Library Journal, 127, 54.
[23]  Cronin, B. (2002) Information Warfare: Peering inside Pandora’s Postmodern Box. Library Journal, 50, 279-294. https://doi.org/10.1108/EUM0000000005600
[24]  Maor, E. (2022) Cyberattacks 2022: Key Observations and Takeaways. Forbes Technology Council Post. https://forbes.com
[25]  Reed, J. (2022) Costa Rica State Emergency Declared after Ransomware Attacks. Security Intelligence. https://securityintelligence.com
[26]  Griffiths, C. (2022) The Latest 2022 Cyber Crime Statistics (Updated December 2022). AAG IT. https://aag-it.com
[27]  National Cyber Security Index (2022) NCSI Development Process. https://ncsi.ega.ee/methodology
[28]  Tucker, T.E. (2004) Leveraging Protection Mechanisms to Provide Defense in Depth. In: Whitman, M.E. and Mattord, H.J., Eds., Management of Information Security, Course Technology, Boston, p 408.
[29]  Dogrul, M., Aslan, A. and Celik, E. (2011) Developing International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism. 2011 IEEE 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, 1-15.
[30]  Robinson, M., Jones, K., Janicke, H. and Maglaras, L. (2018) An Introduction to Cyber Peacekeeping. Journal of Network and Computer Applications, 114, 70-87. https://doi.org/10.1016/j.jnca.2018.04.010

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413