Results 1 to 10 of about 4,917 (184)

Ending nuclear weapons, before they end us [PDF]

open access: yesOrapuh Journal
A worldwide nuclear arms race is underway. Deployed nuclear weapons are increasing again, and China, India, North Korea, Pakistan, Russia, and the United Kingdom are all enlarging their arsenals.
Kamran Abbasi   +22 more
doaj   +57 more sources

Cyberwarfare between the United States and China 2014 -2022: in Retrospect

open access: diamondJurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity, 2023
The development of security in the context of international politics and international relations has developed from time to time. Nowadays, the practice of security done by a country's government can be imbued with the advancement of technological ...
Nadia Dian Ardita   +4 more
doaj   +3 more sources

CYBERWARFARE AND RESPONSIBILITY OF STATES

open access: diamondTorun International Studies, 2017
The aim of this paper is to provide a general insight into the questionable nascence of the international custom in the context of cybersecurity and the most relevant attempt to draft a document regarding the subject matter from the Western perspective ...
Konrad Węgliński
doaj   +3 more sources

Cyberwarfare [PDF]

open access: hybridInternational conference KNOWLEDGE-BASED ORGANIZATION, 2017
Abstract The internet has to be considered a very dangerous battlefield. Nobody is secure. It is a paradox that those countries which do not feel vulnerable may be the most threatened by cyber war. This applies primarily to western powers and fast developing countries. Cyberattack may easily be ordered through the internet.
Petr Hrůza, Jiri Cerny
  +4 more sources

Not Just Cyberwarfare [PDF]

open access: yesPhilosophy & Technology, 2015
© Springer Science+Business Media Dordrecht 2015Bringsjord and Licato provide a general meta-argument that cyberwarfare is so different from traditional kinetic warfare that no argument from analogy can allow the just war theory of Augustine and Aquinas (
E Moody, J Jaynes
core   +5 more sources

Cyberwarfare and the challenges it poses to the international governance of armed conflict with particular reference to attribution, distinction, and self-defence.

open access: diamondContemporary Challenges
Cyberwarfare is an emerging form of conflict in the 21st Century. Whether it is considered a domain, a field of weaponry, or capable of being a completely new and separate type of conflict, the international governing community must find a way to protect
Hannah Gray
doaj   +3 more sources

Proportionality in CyberWarfare

open access: greenSSRN Electronic Journal, 2014
In June 2010, a computer worm called Stuxnet was discovered. Soon it was revealed that Stuxnet was specifically designed to attack nuclear facilities in Iran. It is claimed that this cyber attack caused mass damage in nuclear facilities of Iran namely Natanz facility.
Nima Abdollahzade
openalex   +2 more sources

NATIONAL SECURITY IN THE ERA OF DIGITAL THREATS: A CASE STUDY OF THE NIGERIAN ARMY CYBERWARFARE COMMAND

open access: diamondInternational Studies Journal
Research Problem: Nigeria faces escalating cyber threats with direct implications for national security, yet its cyber defence architecture remains underdeveloped.
IFEANYI ANAENUGWU JUSTIN
doaj   +3 more sources

Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon [PDF]

open access: yesPerspectives on Terrorism, 2014
This article reports on findings from a survey on the concept of cyberterrorism from researchers working in twenty-four countries across six continents. Our aim is to contribute to the definitional debate in this area by exploring the boundaries between ...
Lee Jarvis, Stuart Macdonald
doaj   +1 more source

Home - About - Disclaimer - Privacy