Araştırma Makalesi
BibTex RIS Kaynak Göster

The New Face of the War: Cyber Warfare

Yıl 2017, Cilt: 2 Sayı: 4, 57 - 74, 30.01.2018

Öz

Bilişim teknolojilerinin gelişmesiyle birlikte, bilgisayarlar ve İnternet geçtiğimiz on yıllarda hayatımızda önemli rol oynamıştır. Devletler, hükümetler, STK'lar, işletmeler ve diğer kuruluşlar, bu gelişmelerin avantajlarını ticaret, ekonomi, eğitim vb. gibi alanlar açısından kullandılar. Teknolojik gelişmeler, örgütlerin kabiliyetlerini etkin ve uygun maliyetli bir şekilde yürütme yeteneğini arttırmasına rağmen, aynı zamanda bu gelişmeler uluslararası topluluk için bazı dezavantajlara da sahiptir. Son on yılda, bu teknolojik gelişmeler, bazı insanlar, devletler veya terör örgütleri tarafından hedef ülkelere zarar vererek kazançlarını arttırmak veya fikirlerini dayatmak veya elektrik enerjisini kesmek için kullanılmıştır. Ayrıca, Bilgisayar ve İnternet, 2015 yılında Rusya'nın Ukrayna’daki savaşının bir parçası olarak da kullanıldı. Bu çalışmada, siber savaş kavramı analiz edilerek, önemi vurgulanacaktır ve devletlerin bu durumla niçin mücadele etmesi gerektiği açıklanacaktır.

Kaynakça

  • Arimatsu, L. (2012). A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations. 4th International Conference on Cyber Conflict, Available at: https://ccdcoe.org/publications/2012proceedings/2_3_Arimatsu_ATreatyForGoverningCyber-Weapons.pdf (Accessed at: 18/12/2017).
  • ASELSAN.(2017). Strategic Plan Summary. Availabe at: http://www.aselsan.com.tr/enus/InvestorRelations/financialdata/Documents/Investor%20Presentations/ASELSANStrategicPlanSummary2017-2021.pdf (Accessed at: 18/12/2017).
  • Ball, Y. D. (2017). Protecting Falsehoods with a Bodyguard of Lies: Putin’s Use of Information Warfare. Research Paper NATO Defense College, Available at:http://www.ndc.nato.int/news/news.php?icode=1017 (Accessed at: 18/12/2017).
  • Ganuza, N., Hernandez, A. and Benavente, D. (2011). An Introductory Study to Cyber Securıty in NEC. CCDCOE.
  • Geers, K. (2017).Cyberspace and the Changing Nature of Warfare. Keynote Speech, Available at: http://www.csl.army.mil/SLET/mccd/CyberSpacePubs/Cyberspace%20and%20the%20Changing%20Nature%20of%20Warfare.pdf (Accessed at: 18/12/2017).
  • Ottis, R. and Lorents, P. (2010). Cyberspace: Definition and Implications. CCDCOE.
  • Schmitt, M. N. (1999).Computer Network Attack And The Use Of Force In Internatıonal Law: Thoughts On A Normatıve Framework. Columbia Journal of Transnational Law, Vol. 37.
  • Sofaer, A. D., Goodman, S. E., Cuellar, M.F., Drozdova,E.A., Elliott, D.D., Grove, G.D., Lukasik, J.S.,Putnam, T.L., Wilson,G.D. (2000). A Proposal for An International Convention on Cyber Crime and Terrorism. Stanford University, Available at: http://cisac.fsi.stanford.edu/sites/default/files/sofaergoodman.pdf (Accessed at: 18/12/2017).

THE NEW FACE OF THE WAR: CYBER WARFARE

Yıl 2017, Cilt: 2 Sayı: 4, 57 - 74, 30.01.2018

Öz

With the development of the information technologies, computers and internet have played a crucial role in our life in the last decades. States, governments, NGO’s, businesses, and other organizations take the advantages of these developments in terms of trade, economy, educationand so on. Although technological developments enhance the ability of organizations to conduct activities in terms of cost-effective and efficient manner, it also has some disadvantages for the international community. Over the past decade, these technological developments have been used by some people, states or terrorist organizations to damage target states to improve their gains or impose their ideas or cut off the electrical power. Also, the Computer and internet was used a part of the war in Ukraine by Russia in 2015. In this study, the concept of cyber warfare will be analysed and its importance points and why states need to tackle with this situation will be explained.

Kaynakça

  • Arimatsu, L. (2012). A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations. 4th International Conference on Cyber Conflict, Available at: https://ccdcoe.org/publications/2012proceedings/2_3_Arimatsu_ATreatyForGoverningCyber-Weapons.pdf (Accessed at: 18/12/2017).
  • ASELSAN.(2017). Strategic Plan Summary. Availabe at: http://www.aselsan.com.tr/enus/InvestorRelations/financialdata/Documents/Investor%20Presentations/ASELSANStrategicPlanSummary2017-2021.pdf (Accessed at: 18/12/2017).
  • Ball, Y. D. (2017). Protecting Falsehoods with a Bodyguard of Lies: Putin’s Use of Information Warfare. Research Paper NATO Defense College, Available at:http://www.ndc.nato.int/news/news.php?icode=1017 (Accessed at: 18/12/2017).
  • Ganuza, N., Hernandez, A. and Benavente, D. (2011). An Introductory Study to Cyber Securıty in NEC. CCDCOE.
  • Geers, K. (2017).Cyberspace and the Changing Nature of Warfare. Keynote Speech, Available at: http://www.csl.army.mil/SLET/mccd/CyberSpacePubs/Cyberspace%20and%20the%20Changing%20Nature%20of%20Warfare.pdf (Accessed at: 18/12/2017).
  • Ottis, R. and Lorents, P. (2010). Cyberspace: Definition and Implications. CCDCOE.
  • Schmitt, M. N. (1999).Computer Network Attack And The Use Of Force In Internatıonal Law: Thoughts On A Normatıve Framework. Columbia Journal of Transnational Law, Vol. 37.
  • Sofaer, A. D., Goodman, S. E., Cuellar, M.F., Drozdova,E.A., Elliott, D.D., Grove, G.D., Lukasik, J.S.,Putnam, T.L., Wilson,G.D. (2000). A Proposal for An International Convention on Cyber Crime and Terrorism. Stanford University, Available at: http://cisac.fsi.stanford.edu/sites/default/files/sofaergoodman.pdf (Accessed at: 18/12/2017).
Toplam 8 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Araştırma Makalesi
Yazarlar

Mehmet Emin Erendor

Gürkan Tamer Bu kişi benim

Yayımlanma Tarihi 30 Ocak 2018
Yayımlandığı Sayı Yıl 2017 Cilt: 2 Sayı: 4

Kaynak Göster

APA Erendor, M. E., & Tamer, G. (2018). THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal, 2(4), 57-74.
AMA Erendor ME, Tamer G. THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal. Ocak 2018;2(4):57-74.
Chicago Erendor, Mehmet Emin, ve Gürkan Tamer. “THE NEW FACE OF THE WAR: CYBER WARFARE”. Cyberpolitik Journal 2, sy. 4 (Ocak 2018): 57-74.
EndNote Erendor ME, Tamer G (01 Ocak 2018) THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal 2 4 57–74.
IEEE M. E. Erendor ve G. Tamer, “THE NEW FACE OF THE WAR: CYBER WARFARE”, Cyberpolitik Journal, c. 2, sy. 4, ss. 57–74, 2018.
ISNAD Erendor, Mehmet Emin - Tamer, Gürkan. “THE NEW FACE OF THE WAR: CYBER WARFARE”. Cyberpolitik Journal 2/4 (Ocak 2018), 57-74.
JAMA Erendor ME, Tamer G. THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal. 2018;2:57–74.
MLA Erendor, Mehmet Emin ve Gürkan Tamer. “THE NEW FACE OF THE WAR: CYBER WARFARE”. Cyberpolitik Journal, c. 2, sy. 4, 2018, ss. 57-74.
Vancouver Erendor ME, Tamer G. THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal. 2018;2(4):57-74.