DocumentCode :
1458398
Title :
Cyberwar Thresholds and Effects
Author :
Lewis, Jeffrey A.
Volume :
9
Issue :
5
fYear :
2011
Firstpage :
23
Lastpage :
29
Abstract :
Network technology use and cyberspace exploitation for intelligence and attack have become a normal part of military activity. Questions persist as to the appropriate framework for considering this new mode of conflict, but to a degree, these questions result from weak data, imprecise terminology, and a certain reluctance to abandon the notion that cyberconflict is unique, rather than just another mode of attack. This article reviews cyberattack in armed conflicts, thresholds for considering cyberexploits as the use of force, existing armed conflict laws´ applicability to cyberattack, and the political implications of cyberexploits´ strategic versus tactical applications.
Keywords :
legislation; military computing; security of data; armed conflict laws applicability; cyberspace exploitation; cyberwar effects; cyberwar thresholds; military activity; network technology; Computer crime; Cyberspace; Internet; Network security; Privacy; Cyberconflict; cyberattack; cyberwar; thresholds;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2011.25
Filename :
5719593
Link To Document :
بازگشت