Cyber Warfare: African Research Must Address Emerging Reality
DOI:
https://doi.org/10.23962/10539/21789Keywords:
cyberspace, cyber attacks, cyber conflict, cyber warfare, AfricaAbstract
This thematic report sets out the case for why studies in cyber security and cyber conflict need to be prominent in the African digital transformation research agenda.
References
Ackerman, R. K. (2016, April 1). DISA takes proactive approach to cyberthreats. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-disa-takes-proactive-approach-cyberthreats
Ackerman, R. K. (2016, June 1). The CIA accelerates innovations. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-cia-accelerates-innovation
Applegate, S. D. (2011). Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Security C Privacy, 9(5), 16-22. https://doi.org/10.1109/MSP.2011.46
Bamford, J. (2013, 12 13). God of war (The secret war). Wired Magazine USA. Retrieved from https://www.wired.com/2013/06/general-keith-alexander-cyberwar/all/
BBC. (2007). The cyber raiders hitting Estonia. Retrieved from http://news.bbc.co.uk/2/hi/europe/6665195.stm
Berson, T. A., & Denning, D.E. (2011). Cyberwarfare. IEEE Security C Privacy, 9(5), 13-15. https://doi.org/10.1109/MSP.2011.132
Betz, D. J., & Stevens, T. (2011). Cyberspace and the state: Toward a strategy for cyber-power. London: The International Institute for Strategic Studies.
Bhatnagar, S., & Goel, A. (2014). Evolution of nanotechnology. BioEvolution, 1(3), 76-79. Retrieved from http://www.giapjournals.org/uploads/2/6/6/2/26621256/evolu-tion_of_nanotechnology.pdf
Bowlsbey, B. W. (2016, July 1). Chinese hackers, businesses and government coordinated cyber efforts. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-chi-nese-hackers-businesses-and-government-coordinate-cyber-efforts
Capaccio, A. (2012). China most threatening cyberspace force, US panel says. Retrieved from https://www.bloomberg.com/news/articles/2012-11-05/china-most-threatening-cyberspace-force-u-s-panel-says
Collin, B. C. (n.d.). The future of cyberterrorism: Where the physical and virtual worlds converge. 11th Annual International Symposium on Criminal Justice Issues. Retrieved from http://www.crime-research.org/library/Cyberter.htm
Epstein, D., Nisbet, E. C., & Gillespie, T. (2011). Who's responsible for the digital divide? Public perceptions and policy implications. The Information Society, 27(2), 92-104. https://doi.org/10.1080/01972243.2011.548695
Eubanks, V. E. (2007). Trapped in the digital divide: The distributive paradigm in community informatics. The Journal of Community Informatics, 3(2). https://doi.org/10.15353/joci.v3i2.2373
Heickerö, R. (2016). Cyber espionage and illegitimate information retrieval. International Journal of Cyber Warfare and Terrorism, 6(1), 13-23. https://doi.org/10.4018/IJCWT.2016010102
INFOSEC Institute. (2013). China vs US, cyber superpowers compared. Retrieved from http://resources.infosecinstitute.com/china-vs-us-cyber-superpowers-com-pared/#gref
Kwark, J. S. (2015, March 17). North Korea blamed for nuclear-power plant hack. The Wall Street Journal. Available at http://www.wsj.com/articles/north-korea-blamed-for-nuclear-power-plant-hack-1426589324
Langner, R. (2013). The Stuxnet's Secret Twin. Retrieved from http://foreignpolicy.com/2013/11/19/stuxnets-secret-twin/
Lewis, J. A. (2011, March). Cyberwar thresholds and effects. IEEE Security C Privacy, 9(5), 23-29. https://doi.org/10.1109/MSP.2011.25
Liehr, M., Coolbaugh, D., Bowers, J. E., Alferness, R., Watts, M., Kimerling, L., & Koch, T.L. (2016). AIM photonics: What merging photonics with nano-electronics will do. https://doi.org/10.1109/OIC.2016.7482991
IEEE Optical Interconnects Conference. doi: 10.1109/OIC.2016.7482991
Mbanaso, U., & Dandaura, E. S. (2015). The cyberspace: Redefining a new world. IOSR Journal of Computer Engineering, 17(3), 17-24. doi: 10.9790/0661-17361724
Miller, J. A. (2016, April 1). Disruptive by design: Breaking down the federal cyber budget. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-disruptive-de-sign-breaking-down-federal-cyber-budget
O'Connell, M. E. (2012). Cyber security without cyber war. Conflict C Security Law, 17(2), 187-209. https://doi.org/10.1093/jcsl/krs017
Parks, R. C., & Duggan, P. (2011, October). Principles of cyberwarfare. IEEE Security C Privacy, 9(5), 30-35. https://doi.org/10.1109/MSP.2011.138
Paul, B., & Chakrabarty, K. (2009). Advances in nanoelectronics circuits and systems {Editorial]. IET Computers C Digital Techniques, 3(6), 551-552. https://doi.org/10.1049/iet-cdt.2009.9040
Perlrothoct, N. (2012). In cyberattack on Saudi firm, U.S. sees Iran firing back. The New York Times. Retrieved from http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?pagewanted=1&_r=2&
Ranger, S. (2015). Inside the secret digital arms race: Facing the threat of a global cyberwar. Re- trieved from http://www.techrepublic.com/article/inside-the-secret-digital-arms-race
Reuters. (2016, June 13). North Korea mounts long-running hack of South Korea computers. Retrieved from http://www.reuters.com/article/us-northkorea-southkorea-cy-ber-idUSKCN0YZ0BE
Rid, T. (2011, October 10). Cyber war might never happen. Retrieved from http://www.kcl.ac.uk/newsevents/news/newsrecords/2011/10October/Cyber-war-might-never-happen.aspx
Rid, T. (2012). Cyber war will not take place. The Journal of Strategic Studies, 35(1), 5-32. https://doi.org/10.1080/01402390.2011.608939
Riggins, F. J., & Dewan, S. (2005). The digital divide: Current and future research direc- tions. Journal of the Association for Information Systems, 6(12). https://doi.org/10.17705/1jais.00074
Sang-hun, C. (2013, March 20). Computer networks in South Korea are paralyzed in cyberattacks. The New York Times. Retrieved from http://www.nytimes.com/2013/03/21/world/asia/south-korea-computer-network-crashes.html
Shen, F., & Nettis, M. (2016, April 1). Military, government focus on statewide cyber ed- ucation. SIGNAL. Retrieved from http://www.afcea.org/content/?q=Article-mili-tary-government-focus-statewide-cyber-education
Targowski A. (1996). The evolution of cyberspace. Information Technology Management and Organizational Innovations, Proceedings of the 7th Information Resources Management Association International Conference. IDEA Group Publishing (pp. 333-338).
The Economist. (2010). War in the fifth domain: Are the mouse and keyboard the new weap- ons of conflict? Retrieved from http://www.economist.com/node/16478792
HM Government.(2013, June). Information economy strategy. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/206944/13-901-in-formation-economy-strategy.pdf
Downloads
Published
Issue
Section
License
Copyright (c) 2016 https://creativecommons.org/licenses/by/4.0

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
- Abstract 296
- pdf 225
.png)