Skip to main content

The Hierarchy of Cyber War Definitions

  • Conference paper
  • First Online:
Intelligence and Security Informatics (PAISI 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10241))

Included in the following conference series:

Abstract

With the advent of militaries declaring cyberspace as the fifth domain of military warfare, those modern societies that are heavily dependent on its reliable operation need to have a clear understanding of the actors and future activities brought about by this new doctrine. Knowing what is meant by the terms ‘cyber war’ and ‘cyber warfare’ is critical to navigating a path forward in preparing for and mitigating the effects caused by such activities. In this paper, the authors identified and analysed 159 documents containing the definitions for these terms in order to discern definitional origins, patterns of usage and the relative trends that emerge as a result. From this analysis, we construct a discourse hierarchy of cyber war and cyber warfare definitions, both as a representation of the findings as well as a basis for incorporating future works into the larger context of the domain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Department of Defense. DoD Cyber Strategy (2015). http://www.defense.gov/Portals/1/features/2015/0415_cyberstrategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf. Accessed

  2. Jørgensen, M.W., Phillips, L.J.: Discourse Analysis as Theory and Method. Sage, London (2002)

    Book  Google Scholar 

  3. Fairclough, N.: Critical Discourse Analysis: The Critical Study of Language (1995)

    Google Scholar 

  4. Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)

    Book  Google Scholar 

  5. Lewis, J.: Cyberwar thresholds and effects. IEEE Secur. Priv. 9(5), 23–29 (2011)

    Article  Google Scholar 

  6. Raboin, B.: Corresponding evolution: international law and the emergence of cyber warfare. J. Nat. Assoc. Adm. Law Judiciary 31, 602 (2011)

    Google Scholar 

  7. Liff, A.P.: Cyberwar: a new ‘absolute weapon’? The proliferation of cyberwarfare capabilities and interstate war. J. Strateg. Stud. 35(3), 401–428 (2012)

    Article  Google Scholar 

  8. Nguyen, R.: Navigating jus ad bellum in the age of cyber warfare. Cal. Law Rev. 101, 1079 (2013)

    Google Scholar 

  9. Ottis, R., Lorents, P.: Cyberspace: definition and implications. In: International Conference on Information Warfare and Security, p. 267. Academic Conferences International Limited, April 2010

    Google Scholar 

  10. Arquilla, J., Ronfeldt, D.: Cyberwar is coming! Comp. Strategy 12(2), 141–165 (1993)

    Article  Google Scholar 

  11. Parks, R.C., Duggan, D.P.: Principles of cyberwarfare. IEEE Secur. Priv. Mag. 9(5), 30–35 (2011)

    Article  Google Scholar 

  12. Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10), 76–82 (2004)

    Article  Google Scholar 

  13. Catuogno, L., De Santis, A.: An internet role-game for the laboratory of network security course. In: ACM SIGCSE Bulletin, vol. 40, No. 3, pp. 240–244. ACM, June 2008

    Google Scholar 

  14. Rid, T.: Cyber war will not take place. J. Strateg. Stud. 35(1), 5–32 (2012)

    Article  Google Scholar 

  15. Nicholson, A., Webber, S., Dyer, S., Patel, T., Janicke, H.: SCADA security in the light of Cyber-Warfare. Comput. Secur. 31(4), 418–436 (2012)

    Article  Google Scholar 

  16. Schaap, A.J.: Cyber warfare operations: development and use under international law. AFL Rev. 64, 121 (2009)

    Google Scholar 

  17. Nye Jr., J.S.: Nuclear Lessons for Cyber Security. Air Univ. Press Maxwell, AFB, AL (2011)

    Google Scholar 

  18. Cimbala, S.J.: Nuclear crisis management and “Cyberwar” phishing for trouble. Strateg. Stud. Q. 5(1), 117–131 (2011)

    Google Scholar 

  19. Liles, S., Dietz, J.E., Rogers, M., Larson, D.: Applying traditional military principles to cyber warfare. In: 2012 4th International Conference on Cyber Conflict (CYCON 2012), June 2012

    Google Scholar 

  20. Reich, P.C., Weinstein, S., Wild, C., Cabanlong, A.S.: Cyber warfare: a review of theories, law, policies, actual incidents–and the dilemma of anonymity. Eur. J. Law Technol. 1(2), 1–58 (2010)

    Google Scholar 

  21. Arquilla, J.: Computer Mouse That Roared: Cyberwar in the Twenty-First Century. Brown J. World Aff. 18, 39 (2011)

    Google Scholar 

  22. Alford, L.D.: Cyber warfare: Protecting military systems. AIR FORCE MATERIEL COMMAND WRIGHT-PATTERSON AFB OH (2000)

    Google Scholar 

  23. Cahill, T.P., Rozinov, K., Mule, C.: Cyber warfare peacekeeping. In: Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 100–106. IEEE, June 2003

    Google Scholar 

  24. Taddeo, M.: An analysis for a just cyber warfare. In: 2012 4th International Conference on Cyber Conflict (CYCON 2012), pp. 1–10. IEEE, June 2012

    Google Scholar 

  25. Ganji, M., Dehghantanha, A., IzuraUdzir, N., Damshenas, M.: Cyber warfare trends and future. Adv. Inform. Sci. Serv. Sci. 5(13), 1 (2013)

    Google Scholar 

  26. Leblanc, S.P., Partington, A., Chapman, I., Bernier, M.: An overview of cyber attack and computer network operations simulation. In: Proceedings of the 2011 Military Modeling & Simulation Symposium, pp. 92–100. Society for Computer Simulation International, April 2011

    Google Scholar 

  27. Chappelle, W., McDonald, K., Christensen, J., Prince, L., Goodman, T., Thompson, W., Hayes, W.: Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among US Air Force Cyber Warfare Operators (No. AFRL-SA-WP-TR-2013-0006). SCHOOL OF AEROSPACE MEDICINE WRIGHT PATTERSON AFB OH (2013)

    Google Scholar 

  28. Kirsch, C.M.: Science fiction no more: cyber Warfare and the United States. Denver J. Int. Law Policy 40, 620 (2011)

    Google Scholar 

  29. Turns, D.: Cyber warfare and the notion of direct participation in hostilities. J. Conflict Secur. Law 17(2), 279–297 (2012)

    Article  Google Scholar 

  30. DoD, U. S. JP1-02: Department of Defense Dictionary of Military and Associated Terms. Washington: DoD (2010)

    Google Scholar 

  31. Uma, M., Padmavathi, G.: A survey on various cyber attacks and their classification. Int. J. Netw. Secur. 15(5), 390–396 (2013)

    Google Scholar 

  32. Saad, S., Bazan, S., Varin, C.: Asymmetric Cyber-warfare between Israel and Hezbollah: the Web as a new strategic battlefield. In: Proceedings of the ACM WebSci 2011, Koblenz, Germany, 14–17 June 2011 (2011)

    Google Scholar 

  33. Caplan, N.: Cyber war: the challenge to national security. Glob. Secur. Stud. 4(1), 93–115 (2013)

    MathSciNet  Google Scholar 

  34. Feil, J.A.: Cyberwar and unmanned aerial vehicles: using new technologies, from espionage to action. Case West. Reserve J. Int. Law 45, 513 (2012)

    Google Scholar 

  35. Jolley, J.D.: Article 2 (4) and Cyber Warfare: How do Old Rules Control the Brave New World?. Available at SSRN 2128301 (2012)

    Google Scholar 

  36. Clarke, R.A., Knake, R.K.: Cyber war. HarperCollins (2011)

    Google Scholar 

  37. Gervais, M.: Cyber Attacks and the Laws of War. Berkeley J. Int. Law 30(2) (2011)

    Google Scholar 

  38. McGraw, G.: Cyber war is inevitable (unless we build security in). J. Strateg. Stud. 36(1), 109–119 (2013)

    Article  Google Scholar 

  39. Robinson, M., Jones, K., Janicke, H.: Cyber warfare: Issues and challenges. Comput. Secur. 49, 70–94 (2015)

    Article  Google Scholar 

  40. Lindsay, J.R.: Stuxnet and the limits of cyber warfare. Secur. Stud. 22(3), 365–404 (2013)

    Article  Google Scholar 

  41. Junio, T.J.: How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. J. Strateg. Stud. 36(1), 125–133 (2013)

    Article  Google Scholar 

  42. Liff, A.P.: The proliferation of cyberwarfare capabilities and interstate war, redux: liff responds to junio. J. Strateg. Stud. 36(1), 134–138 (2013)

    Article  Google Scholar 

  43. Erbacher, R.F.: Extending command and control infrastructures to cyber warfare assets. In: 2005 IEEE International Conference on Systems, Man and Cybernetics, vol. 4, pp. 3331–3337. IEEE, October 2005

    Google Scholar 

  44. Birdwell, M.B., Mills, R.: War fighting in cyberspace: evolving force presentation and command and control. AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST (2011)

    Google Scholar 

  45. Libicki, M.C.: Cyberwar as a confidence game. Strateg. Stud. Q. 5 (2011)

    Google Scholar 

  46. Brenner, S.W., Clarke, L.L.: Civilians in cyberwarfare: conscripts. Vand. J. Trans. Law 43, 1011 (2010)

    Google Scholar 

  47. Swanson, L.: Era of cyber warfare: applying international humanitarian law to the 2008 Russian-Georgian Cyber Conflict. Loyola Los Angeles Int. Comp. Law Rev. 32, 303 (2010)

    Google Scholar 

  48. Scott, A., Hardy, T.J., Martin, R.K., Thomas, R.W.: What are the roles of electronic and cyber warfare in cognitive radio security? In: 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1–4. IEEE, August 2011

    Google Scholar 

  49. Roberts, S.: Cyber wars: applying conventional laws to war to cyber warfare and non-state actors. Northern Ky Law Rev. 41, 535 (2014)

    Google Scholar 

  50. Dipert, R.R.: Other-than-Internet (OTI) cyberwarfare: challenges for ethics, law, and policy. J. Mil. Ethics 12(1), 34–53 (2013)

    Article  Google Scholar 

  51. Golling, M., Stelte, B.: Requirements for a future EWS-Cyber Defence in the internet of the future. In: 2011 3rd International Conference on Cyber Conflict, pp. 1–16. IEEE, June 2011

    Google Scholar 

  52. Bachmann, S.D.O.V.: Hybrid threats, cyber warfare and NATO’s comprehensive approach for countering 21st century threats–mapping the new frontier of global risk and security management. Amicus Curiae, 88 (2012)

    Google Scholar 

  53. Danks, D., Danks, J.H.: The moral permissibility of automated responses during cyberwarfare. J. Mil. Ethics 12(1), 18–33 (2013)

    Article  Google Scholar 

  54. Friesen, T.L.: Resolving tomorrow’s conflicts today: how new developments within the UN security council can be used to combat cyberwarfare. Naval Law Rev. 58, 89 (2009)

    Google Scholar 

  55. Hunker, J.: Cyber war and cyber power. Issues for NATO doctrine (2010)

    Google Scholar 

  56. Hughes, R.: A treaty for cyberspace. Int. Aff. 86(2), 523–541 (2010)

    Article  Google Scholar 

  57. Solis, G.D.: Cyber warfare. Mil. Law Rev. 219, 1 (2014)

    Google Scholar 

  58. Eom, J.H., Kim, N.U., Kim, S.H., Chung, T.M.: Cyber military strategy for cyberspace superiority in cyber warfare. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 295–299. IEEE, June 2012

    Google Scholar 

  59. Dycus, S.: Congress’s role in cyber warfare. J. Nat. Secur. Law Policy 4, 153 (2010)

    Google Scholar 

  60. Clemmons, B.Q., Brown, G.D.: Cyberwarfare: ways, warriors and weapons of mass destruction. Mil. Rev. 79(5), 35 (1999)

    Google Scholar 

  61. Lupovici, A.: Cyber warfare and deterrence: trends and challenges in research. Mil. Strateg. Aff. 3(3), 49–62 (2011)

    Google Scholar 

  62. Stytz, M.R., Banks, S.B.: Addressing Simulation Issues Posed by Cyber Warfare Technologies. SCS M&S Magazine. n (3) (2010)

    Google Scholar 

  63. Libicki, M.C.: Why cyber war will not and should not have its grand strategist. AIR UNIV MAXWELL AFB AL AIR FORCE RESEARCH INST (2014)

    Google Scholar 

  64. Huntley, T.C.: Controlling the use of force in cyber space: the application of the law of armed conflict during a time of fundamental change in the nature of warfare. Naval Law Rev. 60, 1 (2010)

    Google Scholar 

  65. Droege, C.: Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. Int. Rev. Red Cross 94(886), 533–578 (2012)

    Article  Google Scholar 

  66. Von Clausewitz, C.: On war, vol. 1. N. Trübner & Company, London (1873)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Hughes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hughes, D., Colarik, A. (2017). The Hierarchy of Cyber War Definitions. In: Wang, G., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2017. Lecture Notes in Computer Science(), vol 10241. Springer, Cham. https://doi.org/10.1007/978-3-319-57463-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57463-9_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57462-2

  • Online ISBN: 978-3-319-57463-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics