Results 291 to 300 of about 96,539 (341)
Some of the next articles are maybe not open access.
Journal of Strategic Studies, 2012
The author adresses the question if there is something called cyber war? He challenges the commonly accepted conclusion that cyber war is inevitably. While acknowledging the reality of cyber threats, he argues that most threats and incidents are actually better qualified as sabotage, espionage and subversion.
Thomas Rid
openaire +4 more sources
The author adresses the question if there is something called cyber war? He challenges the commonly accepted conclusion that cyber war is inevitably. While acknowledging the reality of cyber threats, he argues that most threats and incidents are actually better qualified as sabotage, espionage and subversion.
Thomas Rid
openaire +4 more sources
Index on Censorship, 2010
Citizens, states and corporations are battling for online space. What happened to the dream of global communication? Ron Deibert and Rafal Rohozinski report
Ron Deibert, Rafal Rohozinski
openaire +1 more source
Citizens, states and corporations are battling for online space. What happened to the dream of global communication? Ron Deibert and Rafal Rohozinski report
Ron Deibert, Rafal Rohozinski
openaire +1 more source
2015
PART I: FOUNDATIONAL QUESTIONS OF CYBERWAR 7. RE-THINKING THE BOUNDARIES OF LAW IN CYBERSPACE: A DUTY TO HACK? 10.
openaire +1 more source
PART I: FOUNDATIONAL QUESTIONS OF CYBERWAR 7. RE-THINKING THE BOUNDARIES OF LAW IN CYBERSPACE: A DUTY TO HACK? 10.
openaire +1 more source
Engineering & Technology, 2010
Online security experts have downplayed speculation around the possibility of a 'cyber war' breaking out between sovereign states as a result of offensive action, amid calls for new laws enabling greater governmental control over the US national interconnection infrastructure.
openaire +1 more source
Online security experts have downplayed speculation around the possibility of a 'cyber war' breaking out between sovereign states as a result of offensive action, amid calls for new laws enabling greater governmental control over the US national interconnection infrastructure.
openaire +1 more source
Critical Review, 2009
ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences.
openaire +1 more source
ABSTRACT Cybernetic attacks have been wrongly perceived as weapons of physical destruction rather than of disruption. Because modern, post‐industrial societies have become critically dependent on computer networks to function on a day‐to‐day basis, disruption of those networks could have serious social and economic consequences.
openaire +1 more source
2019
The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are establishing offensive military capabilities for this domain.
Thomas Reinhold, Christian Reuter
openaire +1 more source
The encompassing trend of digitalisation and widespread dependencies on IT systems triggers adjustments also in the military forces. Besides necessary enhancements of IT security and defensive measures for cyberspace, a growing number of states are establishing offensive military capabilities for this domain.
Thomas Reinhold, Christian Reuter
openaire +1 more source
Cyber Wars and Cyber Threats Against Mobile Devices
2023In recent years, the electronic device that has been used and bought the most by the consumers is mobile devices. Recently, there has been a significant increase in cyber crimes committed using mobile devices. It has been seen that this situation has become more critical with the widespread use of mobile devices in society, and it is of great ...
Hamza Kayabaş, Gurkan Tuna
openaire +1 more source
War by other means [cyber war]
Engineering & Technology, 2018A DECADE AGO, Russian tanks rolled into South Ossetia, a northern province of Georgia. Even before they started moving, a 'third force' had already embarked on an exercise of hacking into government computer networks and local news agencies. Although the latest edition of the 'Tallinn Manual' on cyber warfare tackles the question of legal retaliation ...
openaire +1 more source
2015
Contemporary discussion surrounding the role of the Internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources.
Shawn M. Powers, Michael Jablonski
openaire +1 more source
Contemporary discussion surrounding the role of the Internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources.
Shawn M. Powers, Michael Jablonski
openaire +1 more source
2007
Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, but fortunately, they are attacking systems in much the same way hackers attack systems. This is good for system security designers as the security controls installed to protect against hacking will work to protect against cyber terrorists and warriors ...
openaire +1 more source
Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, but fortunately, they are attacking systems in much the same way hackers attack systems. This is good for system security designers as the security controls installed to protect against hacking will work to protect against cyber terrorists and warriors ...
openaire +1 more source

