textRichard A. Clarke and Robert K. Knake’s book, Cyber war, claims to identify a new threat and vulnerability in the United States. By examining the points they make and evaluating them in the context of the first cyber attack, STUXNET, we shall conclude that the technical argument is correct; however the overall argument is incomplete. What they fail to emphasize is the amount of human intelligence involved in committing a successful cyber attack, and the extent to which having intelligence operations greatly enhances a state's cyber capabilities.Governmen
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ ha...
As new technologies develop, terrorist groups are developing new methods of attack by using the Inte...
This paper examines the argument that espionage is a distinct framework for evaluating conflict in c...
textRichard A. Clarke and Robert K. Knake’s book, Cyber war, claims to identify a new threat and vul...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
Just War Theory has not followed with the most recent evolution of warfare. The last iteration of Ju...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Cyberwarfare raises issues of growing national interest and concern. Cyberwarfare can be used to des...
Much used, although often little understood, the terms ‘cyber warfare’ and ‘cyber conflict’ litter t...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
In recent years, scholars, commentators and politicians have discussed the prospect of a ‘cyber secu...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Determining the impact of cyberterrorism – a relatively recent construct – on individuals’ trust in ...
This paper argues that there is an urgent need for an international doctrine for cyberspace skirmish...
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ ha...
As new technologies develop, terrorist groups are developing new methods of attack by using the Inte...
This paper examines the argument that espionage is a distinct framework for evaluating conflict in c...
textRichard A. Clarke and Robert K. Knake’s book, Cyber war, claims to identify a new threat and vul...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
Just War Theory has not followed with the most recent evolution of warfare. The last iteration of Ju...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
Cyberwarfare raises issues of growing national interest and concern. Cyberwarfare can be used to des...
Much used, although often little understood, the terms ‘cyber warfare’ and ‘cyber conflict’ litter t...
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
In recent years, scholars, commentators and politicians have discussed the prospect of a ‘cyber secu...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Determining the impact of cyberterrorism – a relatively recent construct – on individuals’ trust in ...
This paper argues that there is an urgent need for an international doctrine for cyberspace skirmish...
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ ha...
As new technologies develop, terrorist groups are developing new methods of attack by using the Inte...
This paper examines the argument that espionage is a distinct framework for evaluating conflict in c...