Results 1 to 10 of about 5,286 (162)
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon [PDF]
This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between ...
Lee Jarvis, Stuart Macdonald
doaj +1 more source
The Influence of Cyberwars on Socioeconomic Activity of Residents of Central and Eastern Europe [PDF]
Objectives: The purpose of this article is to investigate and present the issue of cyberwar and its impact on the socio-economic activity of inhabitants of Central and Eastern Europe.
Jolanta Połeć, Wojciech Trzaskowski
doaj +1 more source
The geographical proximity between Indonesia and Australia leads to harmonious relations between these two countries, especially in security. The development of information technology is one of the areas becoming the focus of Indonesia and Australia in ...
Elva Azzahra Puji Lestari
doaj +1 more source
Towards the Legal Protection of Critical Infrastructure in Africa Against Cyberwar and Cyberterrorism [PDF]
This article reviews the legal framework governing the protection of critical infrastructure in Africa with an emphasis on threats like cyberwar and cyberterrorism. As African governments and businesses increasingly depend on the internet and information
Bernard Ngalim
doaj +1 more source
Cyber Pearl Harbor is Not Coming: US Politics Between War and Peace
In 2012, the US Defense Secretary Leon E. Panetta warned against an inevitable ‘cyber-Pearl Harbor’, an attack that would cause physical destruction and loss of life.
Dominika Dziwisz
doaj +1 more source
“I Need Ammunition, Not a Ride”: The Ukrainian Cyber War
The Russian invasion of Ukraine in February 2022 has shown that cyberwarfare is integral to modern military strategies. Although the Russian army has developed cyber capabilities and capacities over the years, Ukraine has quickly created a new and ...
Tine Munk, Juan Ahmad
doaj +1 more source
The text aims to demonstrate that establishing cybersecurity is not only a technical challenge, but that legal, economic, or organizational aspects also play at least an important role.
Karsten WEBER
doaj +1 more source
The article introduces a new meaning of the acronym M.A.D. (Mutually Assured Destruction) in the field of security. From the original connection with nuclear issues, its use is moving to the area of cyberspace.
Aleš Tesař +2 more
doaj +1 more source
The text aims at providing an ethical framework for cyber warfare. The latter is changing our understanding of war (and peace) as well as the relationship between the human being and the machine.
Klaus-Gerd Giesen
doaj +1 more source
The objective of this article is to analyze the concept of “cyber warfare” by contrasting it with the concept of warfare to identify the problems that international law faces to regulate, punish, and prevent cyberattacks committed by States against other
Evelyn Téllez Carvajal +1 more
doaj +1 more source

