cyber warfare
Recently Published Documents


TOTAL DOCUMENTS

470
(FIVE YEARS 142)

H-INDEX

14
(FIVE YEARS 2)

2022 ◽  
pp. 11-23
Author(s):  
Justin Bronk ◽  
Jack Watling
Keyword(s):  

2021 ◽  
Vol 23 (3) ◽  
pp. 477-490
Author(s):  
Maskun Maskun ◽  
Azhar Risaldy Rum

The purpose of this research is to identify cyber warfare as a model of War, its position in the perspective of international law, and the steps taken by the state in minimizing losses arising from cyber warfare. This research is normative research using conceptual and statute approaches to answer the problems in this research. The analysis used is content analysis. The study results indicate a need for a common understanding of cyber warfare as a new model of war agreed upon by countries in practice. Normative cyber warfare in international law has to be applied universally. The periodic simulations of cyber defense and artificial intelligence are needed in minimizing the losses caused by cyber warfare. The recommendation is to formulate a definition of cyber warfare universally agreed upon and the state's agreement on the meaning of cyber warfare in international law perspectives.


2021 ◽  
Vol 8 (4) ◽  
pp. 303-328
Author(s):  
Bakhan Ako Najmaddin

Modern technologies and communication systems are tools to make human life easier, and they have started a revolution in the fields of international securities and international relations. However, modern technologies and cyberspace have to be considered as causes of serious damages, dangers, and represent a serious risk in international security. Cyberspace is accounted as the fifth sphere for the conduct of combat besides land, water, air and space. Cyberspace has occurred in a very new and unique type of war, which is called cyber war. Nowadays, protecting cyberspace becomes a vital part of the national level strategies because cyber war under the shadow of cyberspace is a real phenomenon in international relations, and the United States and Iran's cyber war is the obvious example. Both countries attempt to attack the infrastructure of the other side's information technology and network communication systems in order to cause serious damage financially, economically, politically and militarily. Consequently, cyber war is likely to become the most characterized in the twenty-first century and future military operations.


Author(s):  
A. D. Korobkov

The automation of human activity has been growing every year for the past ten years thanks to AI algorithms, increasing the amount of big data and computing power. Today, artificial intelligence technologies are used in everyday life, automating processes previously performed by humans. Moreover, it is believed that these technologies can reach human cognitive abilities and even surpass them at some point. In this regard, questions arise what the future of humanity will look like in conjunction with AI technologies. If earlier, most of the research was more technical, then in the last three to four years, there has been much scientific research in terms of disciplines in which the influence of artificial intelligence is possible. International relations are no exception. The purpose of the article is to review publications on how artificial intelligence technologies affect international relations? Within the framework of the article, six books and eight articles were considered. The author concludes that AI technologies seriously impact international relations in socio-economic and political terms. The socio-economic aspect includes the consequences of automated capitalism on world politics, the rise in unemployment, the emergence of a "hopeless" class, the polarization of society, and more. AI technologies influences strategic stability, nuclear deterrence, and cyber warfare.


2021 ◽  
pp. 251-259
Author(s):  
edit Bregu

The security challenges for Communication and Information Systems in Albania include all levels of the structures of the Ministry of Defense and the Armed Forces, starting from the individual equipment used in official working environments, to the provision of basic systems, which are critical to job performance. Some of the challenges that characterize this situation and their orientation for the future include: Th increasing threats in cyberspace, internet and mobile devices, social networks and portals, communication and transmission of information, creating a cybercrime market, espionage and sabotage, privacy and identity, anonymity and attributes, financial constraints, asymmetry of cyber warfare, etc. These will be some of the issues that this paper will try to address with reference to domestic and foreign literature, national and international legislation on cybercrime.


Author(s):  
Sumanta Bhattacharya ◽  
Jayanta Kumar Ray ◽  
Shakti Sinha ◽  
Bhavneet Kaur Sachdev

China and Pakistan diplomatic relation started from 1951 which has grown over the years. China is providing humongous weapons, aircrafts and submarines to Pakistan in spite Pakistan being in debt and now Turkey has also started to provide military weapons to Pakistan, the ultimate aim to is attack India .The string of pearls is a geopolitical strategic to surround Indian peninsular from all sides by creating naval base in its neighbor countries .The economic corridor of China and Pakistan is also a weapon to keep a check on India and amplify Pakistan influence in the Indian Ocean region by providing them powerful submarines. However due to China’s belt and road initiative project which is one of the most financial risk projects has made china lost its appetite to provide money for large infrastructure projects especially in Pakistan, the disagreement between Pakistan and China on CPEC has stopped the work ahead. China is also supporting the Maoist, North- East insurgency and terrorist groups in India by providing those arms and has also attacked India through Cyber warfare. China through the string of pears, CPEC, Belt and Road initiative is trying to encircle India. Keyword: China, Pakistan, India, CPEC, String of pears, military, diplomatic relations, Indian Peninsula, Indian Ocean


2021 ◽  
Vol 8 (2) ◽  
pp. 219
Author(s):  
Muhsin Nor Paizin

The purpose of using the new media in the context of dakwah is an essential feature since it is the trigger for dakwah activities and the execution of dakwah is done to its target. As information and communication technology advances, zakat institutions, must capitalise on it for the benefit of Islam. In the face of the Covid-19 outbreak, zakat institutions such as the Federal Territory Zakat Collection Center (PPZ-MAIWP) are heavily using new media to teach zakat to all Malaysians. There are five potentials of using the new media towards inviting the community to pay zakat namely; further expand dakwah delivery activities, facilitate the delivery of zakat dakwah, diversify the methods of dakwah of zakat, dakwah of zakat while studying and entertaining, and defence against zakat cyber warfare. Thus, digital media has enormous potential in terms of facilitating the implementation of zakat dakwah activities in a more structured, appealing, and beautiful manner.


2021 ◽  
Author(s):  
◽  
Miranda Grange

<p>This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace creates a unique battlefield with many challenges. This paper tackles four of these challenges: distinguishing warfare acts from criminal activities; what amounts to an armed attack in cyberspace that justifies a State’s right to selfdefence; target distinction; and direct participation in cyber hostilities. It is the author’s determination that the law of armed conflict does apply in cyberspace however two additional changes are needed for the traditional laws to have any practical effect. These two variations include the extension of the traditional criteria of armed attack to include severe data loss as tangible property damage; and reexamining the framework of direct participation.</p>


2021 ◽  
Author(s):  
◽  
Miranda Grange

<p>This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace creates a unique battlefield with many challenges. This paper tackles four of these challenges: distinguishing warfare acts from criminal activities; what amounts to an armed attack in cyberspace that justifies a State’s right to selfdefence; target distinction; and direct participation in cyber hostilities. It is the author’s determination that the law of armed conflict does apply in cyberspace however two additional changes are needed for the traditional laws to have any practical effect. These two variations include the extension of the traditional criteria of armed attack to include severe data loss as tangible property damage; and reexamining the framework of direct participation.</p>


Sign in / Sign up

Export Citation Format

Share Document