Skip to main content

Assessing Opinions on Software as a Weapon in the Context of (Inter)national Security

  • Chapter
  • First Online:
Transactions on Computational Science XXXII

Part of the book series: Lecture Notes in Computer Science ((TCOMPUTATSCIE,volume 10830))

Abstract

Modern life is permeated by software which provides a large attack surface, ranging from generic, low impact malware attacks, to sophistically created and targeted code touted as a next generation of weapons. Although some research on this broad area of cyber weapons exists, the solicitation of public opinion through surveys is lacking. A questionnaire was conducted on the attitudes towards Software as a Weapon (SaaW), with this article presenting further results, linking traditional aspects of weapons to the understanding of, and differences between, software and malware in context of international security. The results suggest that there is a statistically significant difference between respondents in the Military, Academia, or Other professions concerning questions of capabilities, and the demise of the state-centric model. Furthermore, factor analyses identified eight dimensions in our questionnaire. Comparison of these across the three groups revealed significant differences in how peoples’ background influenced their perception concerning the nature, intent, and potential of software and malware to be used as a weapon. Finally, using text-mining, we present the words frequently used to describe malware, software, and weapons, and provide an interpretation for overlap between constructs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agrafiotis, I., Nurse, J.R.C., Buckley, O., Legg, P.A., Creese, S., Goldsmith, M.: Identifying attack patterns for insider threat detection. Comput. Fraud Secur. 2015(7), 9–17 (2015)

    Article  Google Scholar 

  2. Alperovitch, D.: Towards establishment of cyberspace deterrence strategy. In: 2011 3rd International Conference on Cyber Conflict, pp. 1–8 (2011)

    Google Scholar 

  3. BBC Technology: Ransomware cyber-attack threat escalating - Europol - BBC News (2017). http://www.bbc.co.uk/news/technology-39913630

  4. Betts, R.K.: The lost logic of deterrence. Foreign Aff. 1(87), 87–99 (2013)

    Google Scholar 

  5. Bhatt, P., Yano, E.T., Gustavsson, P.: Towards a framework to detect multi-stage advanced persistent threats attacks. In: Proceedings of IEEE 8th International Symposium on Service Oriented System Engineering, SOSE 2014, pp. 390–395 (2014)

    Google Scholar 

  6. Blake, D., Imburgia, J.S.: Bloodless weapons? Air Force Law Rev. 66, 157–204 (2010)

    Google Scholar 

  7. Brown, G., Metcalf, A.: Easier said than done: legal reviews of cyber weapons. J. Natl. Secur. Law Policy 7, 115–138 (2014)

    Google Scholar 

  8. Choi, B.C.K., Pak, A.W.P.: A catalog of biases in questionnaires. Prev. Chronic Dis. 2(1), 1–13 (2005)

    Google Scholar 

  9. Cimbala, S.J.: On nuclear war: deterrence, escalation, and control. Mil. Strateg. Aff. 4(3), 25–43 (2012)

    Google Scholar 

  10. Cirenza, P.: An evaluation of the analogy between nuclear and cyber deterrence. Ph.D. thesis, Stanford University (2015)

    Google Scholar 

  11. Fowler Jr., F.J.: Survey Research Methods. Sage Publications Limited, London (2013)

    Google Scholar 

  12. Hakkarainen, P.: Cyber Weapon Target Analysis. BoD (2014)

    Google Scholar 

  13. Harvard Nuclear Study Group: Living With Nuclear Weapons. Bantam Books, New York (1983)

    Google Scholar 

  14. Herr, T.: Malware counter-proliferation and the Wassenaar arrangement (2016)

    Google Scholar 

  15. Herr, T., Armbrust, E.: Milware: the implications of state authored malicious software. Soc. Sci. Res. Netw. (2015)

    Google Scholar 

  16. Herr, T., Dc, W.: PrEP: a framework for malware & cyber weapons. J. Inf. Warf. 13(1) (2014)

    Google Scholar 

  17. Herr, T., Rosenzweig, P.: Cyber weapons and export control: incorporating dual use with the PrEP model. J. Natl. Secur. Law Policy 8(2), 1–16 (2015)

    Google Scholar 

  18. International Group of Experts, Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)

    Google Scholar 

  19. Kello, L.: The meaning of the cyber revolution. Int. Secur. 38(2), 7–40 (2013)

    Article  Google Scholar 

  20. Kello, L.: The Virtual Weapon and International Order. Yale University Press, New Haven (2017)

    Book  Google Scholar 

  21. Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutor. 16(2), 898–924 (2014)

    Article  Google Scholar 

  22. Kramer, B.M., Kalick, S.M., Milburn, M.A.: Attitudes toward nuclear weapons and nuclear war: 1945–1982. J. Soc. Issues 39(I), 7–24 (1983)

    Article  Google Scholar 

  23. Lindsay, J.R., Kello, L.: Correspondence: a cyber disagreement. Int. Secur. 39(2), 181–192 (2014)

    Article  Google Scholar 

  24. Liu, S.-T., Chen, Y.-M., Lin, S.-J.: A novel search engine to uncover potential victims for APT investigations. In: Hsu, C.-H., Li, X., Shi, X., Zheng, R. (eds.) NPC 2013. LNCS, vol. 8147, pp. 405–416. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40820-5_34

    Chapter  Google Scholar 

  25. Mele, S.: Cyber-weapons: legal and strategic aspects (Version 2.0). Italian Institute of Strategic Studies “Niccolò Machiavelli”, 22 June 2013

    Google Scholar 

  26. Peterson, D.: Offensive cyber weapons: construction, development, and employment. J. Strateg. Stud. 36(1), 120–124 (2013)

    Article  Google Scholar 

  27. Rid, T., McBurney, P.: Cyber-weapons. RUSI J. 157(1), 6–13 (2012)

    Article  Google Scholar 

  28. Roth, F.: APT groups and operations (2016). goo.gl/MYkxhT

  29. Silomon, J.A.M., Roscoe, A.W.: Attitudes towards software as a weapon. In: IADIS International Conference ICT, Society and Human Beings, Lisbon, pp. 119–126 (2017)

    Google Scholar 

  30. Silomon, J.A.M., Roscoe, A.W.: Software and malware capabilities: opinions on (inter)national security. In: International Conference on Cyberworlds, pp. 96–102 (2017)

    Google Scholar 

  31. Tabansky, L.: Critical infrastructure protection against cyber threats, vol. 3 (2011)

    Google Scholar 

  32. Wilson, C.: Cyber weapons: 4 defining characteristics (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jantje A. M. Silomon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer-Verlag GmbH Germany, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Silomon, J.A.M., Roeling, M.P. (2018). Assessing Opinions on Software as a Weapon in the Context of (Inter)national Security. In: Gavrilova, M., Tan, C., Sourin, A. (eds) Transactions on Computational Science XXXII. Lecture Notes in Computer Science(), vol 10830. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-56672-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-56672-5_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-56671-8

  • Online ISBN: 978-3-662-56672-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics