Research Article
BibTex RIS Cite

The New Face of the War: Cyber Warfare

Year 2017, Volume: 2 Issue: 4, 57 - 74, 30.01.2018

Abstract

Bilişim teknolojilerinin gelişmesiyle birlikte, bilgisayarlar ve İnternet geçtiğimiz on yıllarda hayatımızda önemli rol oynamıştır. Devletler, hükümetler, STK'lar, işletmeler ve diğer kuruluşlar, bu gelişmelerin avantajlarını ticaret, ekonomi, eğitim vb. gibi alanlar açısından kullandılar. Teknolojik gelişmeler, örgütlerin kabiliyetlerini etkin ve uygun maliyetli bir şekilde yürütme yeteneğini arttırmasına rağmen, aynı zamanda bu gelişmeler uluslararası topluluk için bazı dezavantajlara da sahiptir. Son on yılda, bu teknolojik gelişmeler, bazı insanlar, devletler veya terör örgütleri tarafından hedef ülkelere zarar vererek kazançlarını arttırmak veya fikirlerini dayatmak veya elektrik enerjisini kesmek için kullanılmıştır. Ayrıca, Bilgisayar ve İnternet, 2015 yılında Rusya'nın Ukrayna’daki savaşının bir parçası olarak da kullanıldı. Bu çalışmada, siber savaş kavramı analiz edilerek, önemi vurgulanacaktır ve devletlerin bu durumla niçin mücadele etmesi gerektiği açıklanacaktır.

References

  • Arimatsu, L. (2012). A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations. 4th International Conference on Cyber Conflict, Available at: https://ccdcoe.org/publications/2012proceedings/2_3_Arimatsu_ATreatyForGoverningCyber-Weapons.pdf (Accessed at: 18/12/2017).
  • ASELSAN.(2017). Strategic Plan Summary. Availabe at: http://www.aselsan.com.tr/enus/InvestorRelations/financialdata/Documents/Investor%20Presentations/ASELSANStrategicPlanSummary2017-2021.pdf (Accessed at: 18/12/2017).
  • Ball, Y. D. (2017). Protecting Falsehoods with a Bodyguard of Lies: Putin’s Use of Information Warfare. Research Paper NATO Defense College, Available at:http://www.ndc.nato.int/news/news.php?icode=1017 (Accessed at: 18/12/2017).
  • Ganuza, N., Hernandez, A. and Benavente, D. (2011). An Introductory Study to Cyber Securıty in NEC. CCDCOE.
  • Geers, K. (2017).Cyberspace and the Changing Nature of Warfare. Keynote Speech, Available at: http://www.csl.army.mil/SLET/mccd/CyberSpacePubs/Cyberspace%20and%20the%20Changing%20Nature%20of%20Warfare.pdf (Accessed at: 18/12/2017).
  • Ottis, R. and Lorents, P. (2010). Cyberspace: Definition and Implications. CCDCOE.
  • Schmitt, M. N. (1999).Computer Network Attack And The Use Of Force In Internatıonal Law: Thoughts On A Normatıve Framework. Columbia Journal of Transnational Law, Vol. 37.
  • Sofaer, A. D., Goodman, S. E., Cuellar, M.F., Drozdova,E.A., Elliott, D.D., Grove, G.D., Lukasik, J.S.,Putnam, T.L., Wilson,G.D. (2000). A Proposal for An International Convention on Cyber Crime and Terrorism. Stanford University, Available at: http://cisac.fsi.stanford.edu/sites/default/files/sofaergoodman.pdf (Accessed at: 18/12/2017).

THE NEW FACE OF THE WAR: CYBER WARFARE

Year 2017, Volume: 2 Issue: 4, 57 - 74, 30.01.2018

Abstract

With the development of the information technologies, computers and internet have played a crucial role in our life in the last decades. States, governments, NGO’s, businesses, and other organizations take the advantages of these developments in terms of trade, economy, educationand so on. Although technological developments enhance the ability of organizations to conduct activities in terms of cost-effective and efficient manner, it also has some disadvantages for the international community. Over the past decade, these technological developments have been used by some people, states or terrorist organizations to damage target states to improve their gains or impose their ideas or cut off the electrical power. Also, the Computer and internet was used a part of the war in Ukraine by Russia in 2015. In this study, the concept of cyber warfare will be analysed and its importance points and why states need to tackle with this situation will be explained.

References

  • Arimatsu, L. (2012). A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations. 4th International Conference on Cyber Conflict, Available at: https://ccdcoe.org/publications/2012proceedings/2_3_Arimatsu_ATreatyForGoverningCyber-Weapons.pdf (Accessed at: 18/12/2017).
  • ASELSAN.(2017). Strategic Plan Summary. Availabe at: http://www.aselsan.com.tr/enus/InvestorRelations/financialdata/Documents/Investor%20Presentations/ASELSANStrategicPlanSummary2017-2021.pdf (Accessed at: 18/12/2017).
  • Ball, Y. D. (2017). Protecting Falsehoods with a Bodyguard of Lies: Putin’s Use of Information Warfare. Research Paper NATO Defense College, Available at:http://www.ndc.nato.int/news/news.php?icode=1017 (Accessed at: 18/12/2017).
  • Ganuza, N., Hernandez, A. and Benavente, D. (2011). An Introductory Study to Cyber Securıty in NEC. CCDCOE.
  • Geers, K. (2017).Cyberspace and the Changing Nature of Warfare. Keynote Speech, Available at: http://www.csl.army.mil/SLET/mccd/CyberSpacePubs/Cyberspace%20and%20the%20Changing%20Nature%20of%20Warfare.pdf (Accessed at: 18/12/2017).
  • Ottis, R. and Lorents, P. (2010). Cyberspace: Definition and Implications. CCDCOE.
  • Schmitt, M. N. (1999).Computer Network Attack And The Use Of Force In Internatıonal Law: Thoughts On A Normatıve Framework. Columbia Journal of Transnational Law, Vol. 37.
  • Sofaer, A. D., Goodman, S. E., Cuellar, M.F., Drozdova,E.A., Elliott, D.D., Grove, G.D., Lukasik, J.S.,Putnam, T.L., Wilson,G.D. (2000). A Proposal for An International Convention on Cyber Crime and Terrorism. Stanford University, Available at: http://cisac.fsi.stanford.edu/sites/default/files/sofaergoodman.pdf (Accessed at: 18/12/2017).
There are 8 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Mehmet Emin Erendor

Gürkan Tamer This is me

Publication Date January 30, 2018
Published in Issue Year 2017 Volume: 2 Issue: 4

Cite

APA Erendor, M. E., & Tamer, G. (2018). THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal, 2(4), 57-74.
AMA Erendor ME, Tamer G. THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal. January 2018;2(4):57-74.
Chicago Erendor, Mehmet Emin, and Gürkan Tamer. “THE NEW FACE OF THE WAR: CYBER WARFARE”. Cyberpolitik Journal 2, no. 4 (January 2018): 57-74.
EndNote Erendor ME, Tamer G (January 1, 2018) THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal 2 4 57–74.
IEEE M. E. Erendor and G. Tamer, “THE NEW FACE OF THE WAR: CYBER WARFARE”, Cyberpolitik Journal, vol. 2, no. 4, pp. 57–74, 2018.
ISNAD Erendor, Mehmet Emin - Tamer, Gürkan. “THE NEW FACE OF THE WAR: CYBER WARFARE”. Cyberpolitik Journal 2/4 (January 2018), 57-74.
JAMA Erendor ME, Tamer G. THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal. 2018;2:57–74.
MLA Erendor, Mehmet Emin and Gürkan Tamer. “THE NEW FACE OF THE WAR: CYBER WARFARE”. Cyberpolitik Journal, vol. 2, no. 4, 2018, pp. 57-74.
Vancouver Erendor ME, Tamer G. THE NEW FACE OF THE WAR: CYBER WARFARE. Cyberpolitik Journal. 2018;2(4):57-74.