Cyber Warfare: African Research Must Address Emerging Reality

Authors

DOI:

https://doi.org/10.23962/10539/21789

Keywords:

cyberspace, cyber attacks, cyber conflict, cyber warfare, Africa

Abstract

This thematic report sets out the case for why studies in cyber security and cyber conflict need to be prominent in the African digital transformation research agenda.

References

Ackerman, R. K. (2016, April 1). DISA takes proactive approach to cyberthreats. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-disa-takes-proactive-approach-cyberthreats

Ackerman, R. K. (2016, June 1). The CIA accelerates innovations. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-cia-accelerates-innovation

Applegate, S. D. (2011). Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Security C Privacy, 9(5), 16-22. https://doi.org/10.1109/MSP.2011.46

Bamford, J. (2013, 12 13). God of war (The secret war). Wired Magazine USA. Retrieved from https://www.wired.com/2013/06/general-keith-alexander-cyberwar/all/

BBC. (2007). The cyber raiders hitting Estonia. Retrieved from http://news.bbc.co.uk/2/hi/europe/6665195.stm

Berson, T. A., & Denning, D.E. (2011). Cyberwarfare. IEEE Security C Privacy, 9(5), 13-15. https://doi.org/10.1109/MSP.2011.132

Betz, D. J., & Stevens, T. (2011). Cyberspace and the state: Toward a strategy for cyber-power. London: The International Institute for Strategic Studies.

Bhatnagar, S., & Goel, A. (2014). Evolution of nanotechnology. BioEvolution, 1(3), 76-79. Retrieved from http://www.giapjournals.org/uploads/2/6/6/2/26621256/evolu-tion_of_nanotechnology.pdf

Bowlsbey, B. W. (2016, July 1). Chinese hackers, businesses and government coordinated cyber efforts. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-chi-nese-hackers-businesses-and-government-coordinate-cyber-efforts

Capaccio, A. (2012). China most threatening cyberspace force, US panel says. Retrieved from https://www.bloomberg.com/news/articles/2012-11-05/china-most-threatening-cyberspace-force-u-s-panel-says

Collin, B. C. (n.d.). The future of cyberterrorism: Where the physical and virtual worlds converge. 11th Annual International Symposium on Criminal Justice Issues. Retrieved from http://www.crime-research.org/library/Cyberter.htm

Epstein, D., Nisbet, E. C., & Gillespie, T. (2011). Who's responsible for the digital divide? Public perceptions and policy implications. The Information Society, 27(2), 92-104. https://doi.org/10.1080/01972243.2011.548695

Eubanks, V. E. (2007). Trapped in the digital divide: The distributive paradigm in community informatics. The Journal of Community Informatics, 3(2). https://doi.org/10.15353/joci.v3i2.2373

Heickerö, R. (2016). Cyber espionage and illegitimate information retrieval. International Journal of Cyber Warfare and Terrorism, 6(1), 13-23. https://doi.org/10.4018/IJCWT.2016010102

INFOSEC Institute. (2013). China vs US, cyber superpowers compared. Retrieved from http://resources.infosecinstitute.com/china-vs-us-cyber-superpowers-com-pared/#gref

Kwark, J. S. (2015, March 17). North Korea blamed for nuclear-power plant hack. The Wall Street Journal. Available at http://www.wsj.com/articles/north-korea-blamed-for-nuclear-power-plant-hack-1426589324

Langner, R. (2013). The Stuxnet's Secret Twin. Retrieved from http://foreignpolicy.com/2013/11/19/stuxnets-secret-twin/

Lewis, J. A. (2011, March). Cyberwar thresholds and effects. IEEE Security C Privacy, 9(5), 23-29. https://doi.org/10.1109/MSP.2011.25

Liehr, M., Coolbaugh, D., Bowers, J. E., Alferness, R., Watts, M., Kimerling, L., & Koch, T.L. (2016). AIM photonics: What merging photonics with nano-electronics will do. https://doi.org/10.1109/OIC.2016.7482991

IEEE Optical Interconnects Conference. doi: 10.1109/OIC.2016.7482991

Mbanaso, U., & Dandaura, E. S. (2015). The cyberspace: Redefining a new world. IOSR Journal of Computer Engineering, 17(3), 17-24. doi: 10.9790/0661-17361724

Miller, J. A. (2016, April 1). Disruptive by design: Breaking down the federal cyber budget. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-disruptive-de-sign-breaking-down-federal-cyber-budget

O'Connell, M. E. (2012). Cyber security without cyber war. Conflict C Security Law, 17(2), 187-209. https://doi.org/10.1093/jcsl/krs017

Parks, R. C., & Duggan, P. (2011, October). Principles of cyberwarfare. IEEE Security C Privacy, 9(5), 30-35. https://doi.org/10.1109/MSP.2011.138

Paul, B., & Chakrabarty, K. (2009). Advances in nanoelectronics circuits and systems {Editorial]. IET Computers C Digital Techniques, 3(6), 551-552. https://doi.org/10.1049/iet-cdt.2009.9040

Perlrothoct, N. (2012). In cyberattack on Saudi firm, U.S. sees Iran firing back. The New York Times. Retrieved from http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?pagewanted=1&_r=2&

Ranger, S. (2015). Inside the secret digital arms race: Facing the threat of a global cyberwar. Re- trieved from http://www.techrepublic.com/article/inside-the-secret-digital-arms-race

Reuters. (2016, June 13). North Korea mounts long-running hack of South Korea computers. Retrieved from http://www.reuters.com/article/us-northkorea-southkorea-cy-ber-idUSKCN0YZ0BE

Rid, T. (2011, October 10). Cyber war might never happen. Retrieved from http://www.kcl.ac.uk/newsevents/news/newsrecords/2011/10October/Cyber-war-might-never-happen.aspx

Rid, T. (2012). Cyber war will not take place. The Journal of Strategic Studies, 35(1), 5-32. https://doi.org/10.1080/01402390.2011.608939

Riggins, F. J., & Dewan, S. (2005). The digital divide: Current and future research direc- tions. Journal of the Association for Information Systems, 6(12). https://doi.org/10.17705/1jais.00074

Sang-hun, C. (2013, March 20). Computer networks in South Korea are paralyzed in cyberattacks. The New York Times. Retrieved from http://www.nytimes.com/2013/03/21/world/asia/south-korea-computer-network-crashes.html

Shen, F., & Nettis, M. (2016, April 1). Military, government focus on statewide cyber ed- ucation. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-mili-tary-government-focus-statewide-cyber-education

Targowski A. (1996). The evolution of cyberspace. Information Technology Management and Organizational Innovations, Proceedings of the 7th Information Resources Management Association International Conference. IDEA Group Publishing (pp. 333-338).

The Economist. (2010). War in the fifth domain: Are the mouse and keyboard the new weap- ons of conflict? Retrieved from http://www.economist.com/node/16478792

HM Government.(2013, June). Information economy strategy. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/206944/13-901-in-formation-economy-strategy.pdf

Downloads

Published

15-12-2016

Issue

Section

Thematic Reports

How to Cite

Mbanaso, U.M. (2016) “Cyber Warfare: African Research Must Address Emerging Reality”, The African Journal of Information and Communication (AJIC) [Preprint], (18). doi:10.23962/10539/21789.
Views
  • Abstract 296
  • pdf 225