Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topic. Many countries now place defense against cyber attacks at the highest level of priority in their national security strategies. The normative view of the threat is that, for those countries with a high level of dependence on information technology and networked infrastructure, a major cyber attack has the potential to level the playing field of military capability to devastating effect, whether it emanates from a hostile state or a non-state actor such as a terrorist group. Events such as the cyber attacks against Estonian networks in 2007 have been seized upon by many as early salvoes in the new global cyber war. Critical perspectives, how...
In the given article author studies the theoretical basis of the ‘cyber warfare’ phenomenon and anal...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
This research paper, based on the methodology of political realism, will be discussed the transforma...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
Earlier this month the EastWest Institute held its second worldwide summit on cyber security. Hundre...
The ongoing debate over cybernetic warfare and the threat it poses to modern society has been overly...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
In the given article author studies the theoretical basis of the ‘cyber warfare’ phenomenon and anal...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
This research paper, based on the methodology of political realism, will be discussed the transforma...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
Earlier this month the EastWest Institute held its second worldwide summit on cyber security. Hundre...
The ongoing debate over cybernetic warfare and the threat it poses to modern society has been overly...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
In 2011, the United States government declared a cyber attack as equal to an act of war, punishable ...
The paper explores the notion of cyber attack as a concept for understanding modern conflicts. It st...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
In this paper, the authors undertake a study of cyber warfare reviewing theories, law, policies, act...
Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the m...
In the given article author studies the theoretical basis of the ‘cyber warfare’ phenomenon and anal...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
This research paper, based on the methodology of political realism, will be discussed the transforma...