Abstract
Modern life is permeated by software which provides a large attack surface, ranging from generic, low impact malware attacks, to sophistically created and targeted code touted as a next generation of weapons. Although some research on this broad area of cyber weapons exists, the solicitation of public opinion through surveys is lacking. A questionnaire was conducted on the attitudes towards Software as a Weapon (SaaW), with this article presenting further results, linking traditional aspects of weapons to the understanding of, and differences between, software and malware in context of international security. The results suggest that there is a statistically significant difference between respondents in the Military, Academia, or Other professions concerning questions of capabilities, and the demise of the state-centric model. Furthermore, factor analyses identified eight dimensions in our questionnaire. Comparison of these across the three groups revealed significant differences in how peoples’ background influenced their perception concerning the nature, intent, and potential of software and malware to be used as a weapon. Finally, using text-mining, we present the words frequently used to describe malware, software, and weapons, and provide an interpretation for overlap between constructs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agrafiotis, I., Nurse, J.R.C., Buckley, O., Legg, P.A., Creese, S., Goldsmith, M.: Identifying attack patterns for insider threat detection. Comput. Fraud Secur. 2015(7), 9–17 (2015)
Alperovitch, D.: Towards establishment of cyberspace deterrence strategy. In: 2011 3rd International Conference on Cyber Conflict, pp. 1–8 (2011)
BBC Technology: Ransomware cyber-attack threat escalating - Europol - BBC News (2017). http://www.bbc.co.uk/news/technology-39913630
Betts, R.K.: The lost logic of deterrence. Foreign Aff. 1(87), 87–99 (2013)
Bhatt, P., Yano, E.T., Gustavsson, P.: Towards a framework to detect multi-stage advanced persistent threats attacks. In: Proceedings of IEEE 8th International Symposium on Service Oriented System Engineering, SOSE 2014, pp. 390–395 (2014)
Blake, D., Imburgia, J.S.: Bloodless weapons? Air Force Law Rev. 66, 157–204 (2010)
Brown, G., Metcalf, A.: Easier said than done: legal reviews of cyber weapons. J. Natl. Secur. Law Policy 7, 115–138 (2014)
Choi, B.C.K., Pak, A.W.P.: A catalog of biases in questionnaires. Prev. Chronic Dis. 2(1), 1–13 (2005)
Cimbala, S.J.: On nuclear war: deterrence, escalation, and control. Mil. Strateg. Aff. 4(3), 25–43 (2012)
Cirenza, P.: An evaluation of the analogy between nuclear and cyber deterrence. Ph.D. thesis, Stanford University (2015)
Fowler Jr., F.J.: Survey Research Methods. Sage Publications Limited, London (2013)
Hakkarainen, P.: Cyber Weapon Target Analysis. BoD (2014)
Harvard Nuclear Study Group: Living With Nuclear Weapons. Bantam Books, New York (1983)
Herr, T.: Malware counter-proliferation and the Wassenaar arrangement (2016)
Herr, T., Armbrust, E.: Milware: the implications of state authored malicious software. Soc. Sci. Res. Netw. (2015)
Herr, T., Dc, W.: PrEP: a framework for malware & cyber weapons. J. Inf. Warf. 13(1) (2014)
Herr, T., Rosenzweig, P.: Cyber weapons and export control: incorporating dual use with the PrEP model. J. Natl. Secur. Law Policy 8(2), 1–16 (2015)
International Group of Experts, Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)
Kello, L.: The meaning of the cyber revolution. Int. Secur. 38(2), 7–40 (2013)
Kello, L.: The Virtual Weapon and International Order. Yale University Press, New Haven (2017)
Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutor. 16(2), 898–924 (2014)
Kramer, B.M., Kalick, S.M., Milburn, M.A.: Attitudes toward nuclear weapons and nuclear war: 1945–1982. J. Soc. Issues 39(I), 7–24 (1983)
Lindsay, J.R., Kello, L.: Correspondence: a cyber disagreement. Int. Secur. 39(2), 181–192 (2014)
Liu, S.-T., Chen, Y.-M., Lin, S.-J.: A novel search engine to uncover potential victims for APT investigations. In: Hsu, C.-H., Li, X., Shi, X., Zheng, R. (eds.) NPC 2013. LNCS, vol. 8147, pp. 405–416. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40820-5_34
Mele, S.: Cyber-weapons: legal and strategic aspects (Version 2.0). Italian Institute of Strategic Studies “Niccolò Machiavelli”, 22 June 2013
Peterson, D.: Offensive cyber weapons: construction, development, and employment. J. Strateg. Stud. 36(1), 120–124 (2013)
Rid, T., McBurney, P.: Cyber-weapons. RUSI J. 157(1), 6–13 (2012)
Roth, F.: APT groups and operations (2016). goo.gl/MYkxhT
Silomon, J.A.M., Roscoe, A.W.: Attitudes towards software as a weapon. In: IADIS International Conference ICT, Society and Human Beings, Lisbon, pp. 119–126 (2017)
Silomon, J.A.M., Roscoe, A.W.: Software and malware capabilities: opinions on (inter)national security. In: International Conference on Cyberworlds, pp. 96–102 (2017)
Tabansky, L.: Critical infrastructure protection against cyber threats, vol. 3 (2011)
Wilson, C.: Cyber weapons: 4 defining characteristics (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer-Verlag GmbH Germany, part of Springer Nature
About this chapter
Cite this chapter
Silomon, J.A.M., Roeling, M.P. (2018). Assessing Opinions on Software as a Weapon in the Context of (Inter)national Security. In: Gavrilova, M., Tan, C., Sourin, A. (eds) Transactions on Computational Science XXXII. Lecture Notes in Computer Science(), vol 10830. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-56672-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-662-56672-5_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-56671-8
Online ISBN: 978-3-662-56672-5
eBook Packages: Computer ScienceComputer Science (R0)