Abstract
With the advent of militaries declaring cyberspace as the fifth domain of military warfare, those modern societies that are heavily dependent on its reliable operation need to have a clear understanding of the actors and future activities brought about by this new doctrine. Knowing what is meant by the terms ‘cyber war’ and ‘cyber warfare’ is critical to navigating a path forward in preparing for and mitigating the effects caused by such activities. In this paper, the authors identified and analysed 159 documents containing the definitions for these terms in order to discern definitional origins, patterns of usage and the relative trends that emerge as a result. From this analysis, we construct a discourse hierarchy of cyber war and cyber warfare definitions, both as a representation of the findings as well as a basis for incorporating future works into the larger context of the domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Department of Defense. DoD Cyber Strategy (2015). http://www.defense.gov/Portals/1/features/2015/0415_cyberstrategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf. Accessed
Jørgensen, M.W., Phillips, L.J.: Discourse Analysis as Theory and Method. Sage, London (2002)
Fairclough, N.: Critical Discourse Analysis: The Critical Study of Language (1995)
Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)
Lewis, J.: Cyberwar thresholds and effects. IEEE Secur. Priv. 9(5), 23–29 (2011)
Raboin, B.: Corresponding evolution: international law and the emergence of cyber warfare. J. Nat. Assoc. Adm. Law Judiciary 31, 602 (2011)
Liff, A.P.: Cyberwar: a new ‘absolute weapon’? The proliferation of cyberwarfare capabilities and interstate war. J. Strateg. Stud. 35(3), 401–428 (2012)
Nguyen, R.: Navigating jus ad bellum in the age of cyber warfare. Cal. Law Rev. 101, 1079 (2013)
Ottis, R., Lorents, P.: Cyberspace: definition and implications. In: International Conference on Information Warfare and Security, p. 267. Academic Conferences International Limited, April 2010
Arquilla, J., Ronfeldt, D.: Cyberwar is coming! Comp. Strategy 12(2), 141–165 (1993)
Parks, R.C., Duggan, D.P.: Principles of cyberwarfare. IEEE Secur. Priv. Mag. 9(5), 30–35 (2011)
Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)
Catuogno, L., De Santis, A.: An internet role-game for the laboratory of network security course. In: ACM SIGCSE Bulletin, vol. 40, No. 3, pp. 240–244. ACM, June 2008
Rid, T.: Cyber war will not take place. J. Strateg. Stud. 35(1), 5–32 (2012)
Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of Cyber-Warfare. Comput. Secur. 31(4), 418–436 (2012)
Schaap, A.J.: Cyber warfare operations: development and use under international law. AFL Rev. 64, 121 (2009)
Nye Jr., J.S.: Nuclear Lessons for Cyber Security. Air Univ. Press Maxwell, AFB, AL (2011)
Cimbala, S.J.: Nuclear crisis management and “Cyberwar” phishing for trouble. Strateg. Stud. Q. 5(1), 117–131 (2011)
Liles, S., Dietz, J.E., Rogers, M., Larson, D.: Applying traditional military principles to cyber warfare. In: 2012 4th International Conference on Cyber Conflict (CYCON 2012), June 2012
Reich, P.C., Weinstein, S., Wild, C., Cabanlong, A.S.: Cyber warfare: a review of theories, law, policies, actual incidents–and the dilemma of anonymity. Eur. J. Law Technol. 1(2), 1–58 (2010)
Arquilla, J.: Computer Mouse That Roared: Cyberwar in the Twenty-First Century. Brown J. World Aff. 18, 39 (2011)
Alford, L.D.: Cyber warfare: Protecting military systems. AIR FORCE MATERIEL COMMAND WRIGHT-PATTERSON AFB OH (2000)
Cahill, T.P., Rozinov, K., Mule, C.: Cyber warfare peacekeeping. In: Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 100–106. IEEE, June 2003
Taddeo, M.: An analysis for a just cyber warfare. In: 2012 4th International Conference on Cyber Conflict (CYCON 2012), pp. 1–10. IEEE, June 2012
Ganji, M., Dehghantanha, A., IzuraUdzir, N., Damshenas, M.: Cyber warfare trends and future. Adv. Inform. Sci. Serv. Sci. 5(13), 1 (2013)
Leblanc, S.P., Partington, A., Chapman, I., Bernier, M.: An overview of cyber attack and computer network operations simulation. In: Proceedings of the 2011 Military Modeling & Simulation Symposium, pp. 92–100. Society for Computer Simulation International, April 2011
Chappelle, W., McDonald, K., Christensen, J., Prince, L., Goodman, T., Thompson, W., Hayes, W.: Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among US Air Force Cyber Warfare Operators (No. AFRL-SA-WP-TR-2013-0006). SCHOOL OF AEROSPACE MEDICINE WRIGHT PATTERSON AFB OH (2013)
Kirsch, C.M.: Science fiction no more: cyber Warfare and the United States. Denver J. Int. Law Policy 40, 620 (2011)
Turns, D.: Cyber warfare and the notion of direct participation in hostilities. J. Conflict Secur. Law 17(2), 279–297 (2012)
DoD, U. S. JP1-02: Department of Defense Dictionary of Military and Associated Terms. Washington: DoD (2010)
Uma, M., Padmavathi, G.: A survey on various cyber attacks and their classification. Int. J. Netw. Secur. 15(5), 390–396 (2013)
Saad, S., Bazan, S., Varin, C.: Asymmetric Cyber-warfare between Israel and Hezbollah: the Web as a new strategic battlefield. In: Proceedings of the ACM WebSci 2011, Koblenz, Germany, 14–17 June 2011 (2011)
Caplan, N.: Cyber war: the challenge to national security. Glob. Secur. Stud. 4(1), 93–115 (2013)
Feil, J.A.: Cyberwar and unmanned aerial vehicles: using new technologies, from espionage to action. Case West. Reserve J. Int. Law 45, 513 (2012)
Jolley, J.D.: Article 2 (4) and Cyber Warfare: How do Old Rules Control the Brave New World?. Available at SSRN 2128301 (2012)
Clarke, R.A., Knake, R.K.: Cyber war. HarperCollins (2011)
Gervais, M.: Cyber Attacks and the Laws of War. Berkeley J. Int. Law 30(2) (2011)
McGraw, G.: Cyber war is inevitable (unless we build security in). J. Strateg. Stud. 36(1), 109–119 (2013)
Robinson, M., Jones, K., Janicke, H.: Cyber warfare: Issues and challenges. Comput. Secur. 49, 70–94 (2015)
Lindsay, J.R.: Stuxnet and the limits of cyber warfare. Secur. Stud. 22(3), 365–404 (2013)
Junio, T.J.: How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. J. Strateg. Stud. 36(1), 125–133 (2013)
Liff, A.P.: The proliferation of cyberwarfare capabilities and interstate war, redux: liff responds to junio. J. Strateg. Stud. 36(1), 134–138 (2013)
Erbacher, R.F.: Extending command and control infrastructures to cyber warfare assets. In: 2005 IEEE International Conference on Systems, Man and Cybernetics, vol. 4, pp. 3331–3337. IEEE, October 2005
Birdwell, M.B., Mills, R.: War fighting in cyberspace: evolving force presentation and command and control. AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST (2011)
Libicki, M.C.: Cyberwar as a confidence game. Strateg. Stud. Q. 5 (2011)
Brenner, S.W., Clarke, L.L.: Civilians in cyberwarfare: conscripts. Vand. J. Trans. Law 43, 1011 (2010)
Swanson, L.: Era of cyber warfare: applying international humanitarian law to the 2008 Russian-Georgian Cyber Conflict. Loyola Los Angeles Int. Comp. Law Rev. 32, 303 (2010)
Scott, A., Hardy, T.J., Martin, R.K., Thomas, R.W.: What are the roles of electronic and cyber warfare in cognitive radio security? In: 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1–4. IEEE, August 2011
Roberts, S.: Cyber wars: applying conventional laws to war to cyber warfare and non-state actors. Northern Ky Law Rev. 41, 535 (2014)
Dipert, R.R.: Other-than-Internet (OTI) cyberwarfare: challenges for ethics, law, and policy. J. Mil. Ethics 12(1), 34–53 (2013)
Golling, M., Stelte, B.: Requirements for a future EWS-Cyber Defence in the internet of the future. In: 2011 3rd International Conference on Cyber Conflict, pp. 1–16. IEEE, June 2011
Bachmann, S.D.O.V.: Hybrid threats, cyber warfare and NATO’s comprehensive approach for countering 21st century threats–mapping the new frontier of global risk and security management. Amicus Curiae, 88 (2012)
Danks, D., Danks, J.H.: The moral permissibility of automated responses during cyberwarfare. J. Mil. Ethics 12(1), 18–33 (2013)
Friesen, T.L.: Resolving tomorrow’s conflicts today: how new developments within the UN security council can be used to combat cyberwarfare. Naval Law Rev. 58, 89 (2009)
Hunker, J.: Cyber war and cyber power. Issues for NATO doctrine (2010)
Hughes, R.: A treaty for cyberspace. Int. Aff. 86(2), 523–541 (2010)
Solis, G.D.: Cyber warfare. Mil. Law Rev. 219, 1 (2014)
Eom, J.H., Kim, N.U., Kim, S.H., Chung, T.M.: Cyber military strategy for cyberspace superiority in cyber warfare. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 295–299. IEEE, June 2012
Dycus, S.: Congress’s role in cyber warfare. J. Nat. Secur. Law Policy 4, 153 (2010)
Clemmons, B.Q., Brown, G.D.: Cyberwarfare: ways, warriors and weapons of mass destruction. Mil. Rev. 79(5), 35 (1999)
Lupovici, A.: Cyber warfare and deterrence: trends and challenges in research. Mil. Strateg. Aff. 3(3), 49–62 (2011)
Stytz, M.R., Banks, S.B.: Addressing Simulation Issues Posed by Cyber Warfare Technologies. SCS M&S Magazine. n (3) (2010)
Libicki, M.C.: Why cyber war will not and should not have its grand strategist. AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST (2014)
Huntley, T.C.: Controlling the use of force in cyber space: the application of the law of armed conflict during a time of fundamental change in the nature of warfare. Naval Law Rev. 60, 1 (2010)
Droege, C.: Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. Int. Rev. Red Cross 94(886), 533–578 (2012)
Von Clausewitz, C.: On war, vol. 1. N. Trübner & Company, London (1873)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Hughes, D., Colarik, A. (2017). The Hierarchy of Cyber War Definitions. In: Wang, G., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2017. Lecture Notes in Computer Science(), vol 10241. Springer, Cham. https://doi.org/10.1007/978-3-319-57463-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-57463-9_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57462-2
Online ISBN: 978-3-319-57463-9
eBook Packages: Computer ScienceComputer Science (R0)