Conflict and Cyber-espionage: Ridding the World of Cyber War?
This paper examines the argument that espionage is a distinct framework for evaluating conflict in cyberspace and that it should displace discussions of cyber war in most cases. I start by outlining Thomas Rid’s recent argument that most discussions of “cyberwar” are exaggerated because there is no...
| Main Author: | Ford, Shannon |
|---|---|
| Format: | Conference Paper |
| Published: |
2014
|
| Online Access: | http://hdl.handle.net/20.500.11937/89636 |
Similar Items
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape
by: Abd. Jalil, Juriah
Published: (2019)
by: Abd. Jalil, Juriah
Published: (2019)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Conference on Librarians for the Cyber World 2015
by: PPM, Persatuan Pustakawan Malaysia
Published: (2015)
by: PPM, Persatuan Pustakawan Malaysia
Published: (2015)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
Getting rid of ants
by: Teh, Christopher Boon Sung
Published: (2023)
by: Teh, Christopher Boon Sung
Published: (2023)
Cyber Safety in Malaysia
by: Soon , Seng Thah
Published: (2017)
by: Soon , Seng Thah
Published: (2017)
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)
by: Ibrahim, Azmuddin
Published: (2009)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Get rid of ‘dis’ syndrome
by: Abd Razak, Dzulkifli
Published: (2006)
by: Abd Razak, Dzulkifli
Published: (2006)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber essentials for Nigerian business
by: Orunta, Nathaniel
Published: (2015)
by: Orunta, Nathaniel
Published: (2015)
Cyber laws and it-rich society
by: P.S. Sangal,
Published: (2001)
by: P.S. Sangal,
Published: (2001)
Semantics of Cyber-Physical Systems
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Cyber counselling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber- counseling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
The announcement of Dar al-Harb in cyber media in context of the theological policy of jihad: reading the cyber-jihad and ISIS based on the pharmakon characteristic of the cyber media
by: Erdem, Burcu Kaya, et al.
Published: (2017)
by: Erdem, Burcu Kaya, et al.
Published: (2017)
Down the cyber rabbit hole: whistleblowing as a means to fulfilling moral obligations in cyber space
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Defamation in the cyber age: the emerging trends
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
Jurisdictional and definitional issues of cyber-stalking
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Cyber Safety Instrumentation Systems, CSIS
by: Eren, Halit
Published: (2011)
by: Eren, Halit
Published: (2011)
Cyber-physical systems for smart grid
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
CyberReach Project Research Report
by: Hyde, Zoe, et al.
Published: (2006)
by: Hyde, Zoe, et al.
Published: (2006)
Linguistic deception of Chinese cyber fraudsters
by: Tan, Kim Hua, et al.
Published: (2017)
by: Tan, Kim Hua, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
A Dynamic Cyber Terrorism Framework
by: Rabiah, Ahmad, et al.
Published: (2012)
by: Rabiah, Ahmad, et al.
Published: (2012)
The Just War Tradition and the Moral Reality of War: A Principled Approach to Moral Exceptionalism
by: Ford, Shannon
Published: (2019)
by: Ford, Shannon
Published: (2019)
Get rid of yourself: toward an aesthetics of anonymity
by: Eckersley, David
Published: (2019)
by: Eckersley, David
Published: (2019)
Get rid of 'em before it's too late
by: Param, S.
by: Param, S.
Cyber warfare: a new type of combat
by: Hossain, Ishtiaq
Published: (2014)
by: Hossain, Ishtiaq
Published: (2014)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
171 UPSR candidates became ‘undergraduates’ for a day in UMP and learned about the cyber world
by: UMP, PNC
Published: (2019)
by: UMP, PNC
Published: (2019)
Similar Items
-
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023) -
Addressing the threats of online theft of trade secret and cyber espionage in Malaysia: the legal landscape
by: Abd. Jalil, Juriah
Published: (2019) -
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014) -
Conference on Librarians for the Cyber World 2015
by: PPM, Persatuan Pustakawan Malaysia
Published: (2015) -
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)