Diğer
BibTex RIS Kaynak Göster
Yıl 2020, Cilt: 2 Sayı: 2, 98 - 111, 31.12.2020

Öz

Kaynakça

  • Xiaoxing, S., 2017. The Theatre Times. [Online] Available at: https://thetheatretimes.com/cyber-theatre-china-performance-action/ [Accessed 27 January 2019].
  • Chatzichristodoulou, M., n.d. Cymposium.net. [Online] Available at: http://www.cyposium.net/wp-content/uploads/2012/09/maria_text.pdf [Accessed 27 January 2019].
  • Osho, O. & Onoja, A. D., 2015. National Cyber Security Policy and Strategy of Nigeria: a Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), pp. 120-443.
  • Luiijf, E., Besseling, K. & Patrick, d. G., 2013. Nineteen National Cyber Security Strategies. International Journal of Critical Infrastructure, 9(1/2), pp. 3-31. Department of Defence, 2018. Department of Defence Cyber Strategy, Washington DC: DoD.
  • Porup, J., 2017. CSO. [Online] Available at: https://www.csoonline.com/article/3242690/data-protection/what-is-cyber-security-how-to-build-a-cyber-security-strategy.html [Accessed 27 January 2019].
  • Mansbach, W. R. & Taylor, L. K., 2012. Introduction to Global Politics. 2nd ed. New York: Routledge.
  • Cambridge University Press, 2020. Cyber. [Online] Available at: https://dictionary.cambridge.org/dictionary/english/cyber [Accessed 23 September 2020].
  • Kaspersky, 2020. What is Cyber Security?. [Online] Available at: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security [Accessed 23 September 2020].
  • Merriam-Webster, 2020. Cyberattack. [Online] Available at: https://www.merriam-webster.com/dictionary/cyberattack [Accessed 23 September 2020].
  • Sheldon, J. B., 2016. Cyberwar. [Online] Available at: https://www.britannica.com/topic/cyberwar [Accessed 23 September 2020].
  • BBC, 2020. US charges Chinese Covid-19 research 'cyber-spies'. [Online] Available at: https://www.bbc.com/news/world-us-canada-53493028 [Accessed 23 September 2020].
  • Lenthang, M., 2020. China, Russia and Iran 'have deployed spies to steal US vaccine research in an intelligence war targeting biotech companies and university research centres'. [Online] Available at: https://www.dailymail.co.uk/news/article-8703843/China-Russia-Iran-deployed-spies-steal-vaccine-research-intelligence-war.html [Accessed 23 September 2020].
  • De Groot, J., 2020. What is Cyber Security? Definition, Best Practices & More. [Online] Available at: https://digitalguardian.com/blog/what-cyber-security [Accessed 23 September 2020].
  • Dennis, M. A., 2020. Cybercrime. [Online] Available at: https://www.britannica.com/topic/cybercrime#ref235699 [Accessed 24 September 2020].
  • enisa, 2019. National Cybersecurity Strategies. [Online] Available at: https://www.enisa.europa.eu/topics/national-cyber-security-strategies [Accessed 28 January 2019].
  • Trump, D. J., 2018. NATIONAL CYBER STRATEGY of the United States of America. [Online] Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf [Accessed 24 September 2020].

Cyber Theatre: a fifth domain of international politics

Yıl 2020, Cilt: 2 Sayı: 2, 98 - 111, 31.12.2020

Öz

The cyberspace has now become a space theatre that enshrines activities such as cyber strategy, cybersecurity, cyber defence, and cyberwar. The cyberspace is a realm likened to the global arena where involved or interested actors are spurred by one interest or the other. The challenge in such a realm is the lack of a central authority to enforce order. This explains why the cyberspace will remain an arena of cyberwar since no state nor individual has a monopoly over the internet. Issue of anonymous identity in the cyberspace has proven to be a challenge without a solution in sight as National Cyber Securities are infiltrated by trojans and cyber-actors. However, national cybersecurity has made success in identifying the source or location of a cyber-threat or attack, but identifying the attacker or hacker remains unattainable due to the anonymity of the attackers who have perfected the art of hiding their identity during cyber-attacks, although there are success stories of hackers being identified, this remains scanty. The cyberspace is a double-edged sword at the individual unit, state and global levels. Cyberwar can only come to an abrupt opt when morality becomes a norm. Cyberwar is a means to an end in the hands of cyber-actors. China, Russia, North Korea, Iran, America, terrorist networks, individuals, investors, universities, companies, and other stakeholders have prioritised the use of cyberspace due to its efficiency and accuracy. The cyberspace has presented itself to humanity as a viable alternative to land, water, and space.

Kaynakça

  • Xiaoxing, S., 2017. The Theatre Times. [Online] Available at: https://thetheatretimes.com/cyber-theatre-china-performance-action/ [Accessed 27 January 2019].
  • Chatzichristodoulou, M., n.d. Cymposium.net. [Online] Available at: http://www.cyposium.net/wp-content/uploads/2012/09/maria_text.pdf [Accessed 27 January 2019].
  • Osho, O. & Onoja, A. D., 2015. National Cyber Security Policy and Strategy of Nigeria: a Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), pp. 120-443.
  • Luiijf, E., Besseling, K. & Patrick, d. G., 2013. Nineteen National Cyber Security Strategies. International Journal of Critical Infrastructure, 9(1/2), pp. 3-31. Department of Defence, 2018. Department of Defence Cyber Strategy, Washington DC: DoD.
  • Porup, J., 2017. CSO. [Online] Available at: https://www.csoonline.com/article/3242690/data-protection/what-is-cyber-security-how-to-build-a-cyber-security-strategy.html [Accessed 27 January 2019].
  • Mansbach, W. R. & Taylor, L. K., 2012. Introduction to Global Politics. 2nd ed. New York: Routledge.
  • Cambridge University Press, 2020. Cyber. [Online] Available at: https://dictionary.cambridge.org/dictionary/english/cyber [Accessed 23 September 2020].
  • Kaspersky, 2020. What is Cyber Security?. [Online] Available at: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security [Accessed 23 September 2020].
  • Merriam-Webster, 2020. Cyberattack. [Online] Available at: https://www.merriam-webster.com/dictionary/cyberattack [Accessed 23 September 2020].
  • Sheldon, J. B., 2016. Cyberwar. [Online] Available at: https://www.britannica.com/topic/cyberwar [Accessed 23 September 2020].
  • BBC, 2020. US charges Chinese Covid-19 research 'cyber-spies'. [Online] Available at: https://www.bbc.com/news/world-us-canada-53493028 [Accessed 23 September 2020].
  • Lenthang, M., 2020. China, Russia and Iran 'have deployed spies to steal US vaccine research in an intelligence war targeting biotech companies and university research centres'. [Online] Available at: https://www.dailymail.co.uk/news/article-8703843/China-Russia-Iran-deployed-spies-steal-vaccine-research-intelligence-war.html [Accessed 23 September 2020].
  • De Groot, J., 2020. What is Cyber Security? Definition, Best Practices & More. [Online] Available at: https://digitalguardian.com/blog/what-cyber-security [Accessed 23 September 2020].
  • Dennis, M. A., 2020. Cybercrime. [Online] Available at: https://www.britannica.com/topic/cybercrime#ref235699 [Accessed 24 September 2020].
  • enisa, 2019. National Cybersecurity Strategies. [Online] Available at: https://www.enisa.europa.eu/topics/national-cyber-security-strategies [Accessed 28 January 2019].
  • Trump, D. J., 2018. NATIONAL CYBER STRATEGY of the United States of America. [Online] Available at: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf [Accessed 24 September 2020].
Toplam 16 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Araştırma Makaleleri
Yazarlar

Lukman Adewale Quadrı 0000-0002-1352-030X

Monsuru Olaitan Rasaq 0000-0002-3849-1234

Yayımlanma Tarihi 31 Aralık 2020
Yayımlandığı Sayı Yıl 2020 Cilt: 2 Sayı: 2

Kaynak Göster

APA Quadrı, L. A., & Rasaq, M. O. (2020). Cyber Theatre: a fifth domain of international politics. Akdeniz Havzası Ve Afrika Medeniyetleri Dergisi, 2(2), 98-111.

Gelecek sayılar için makale kabulleri devam etmektedir.