Detailed Information

Cited 3 time in webofscience Cited 3 time in scopus
Metadata Downloads

On cyberwarfare

Authors
Kim, Won
Issue Date
2012
Publisher
INDERSCIENCE ENTERPRISES LTD
Keywords
cyberwar; cyberwarfare; cyberweapon; law of warfare; rules of engagement
Citation
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, v.8, no.4, pp.321 - 334
Journal Title
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES
Volume
8
Number
4
Start Page
321
End Page
334
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/17588
DOI
10.1504/IJWGS.2012.051522
ISSN
1741-1106
Abstract
Today the computer networks of numerous organisations in critical digital infrastructure industries, as well as those of the militaries and governments around the world, are under constant cyberattacks. Many nation states are now preparing for cyberwarfare. However, it is not even clear what cyberwarfare is, as the term is used in the news media. In this paper, we first try to define the term. Then we examine the status of cyberwarfare; in particular, the weapons, the US preparations, the fog and the law of cyberwarfare.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE