<?xml version="1.0" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>'Cyber Warfare' - Tagged Articles - Inquiries Journal</title>
    <link>http://www.inquiriesjournal.com/keyword/cyber-warfare</link>
    <description>Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.</description>
    <language>en-us</language>
    <pubDate>Fri, 24 Apr 2026 07:14:50 -0400</pubDate>
    <lastBuildDate>Fri, 24 Apr 2026 07:14:50 -0400</lastBuildDate>
	
			<item>
				<title>Crossed Wires: International Cooperation on Cyber Security</title>
				<link>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</link>
				<description>By Madeline  Carr - Although cyber security is quite clearly a &amp;lsquo;post-state&#39; problem, it has actually proven very difficult to move beyond a Westphalian conception of either the problem or the possible solutions. This leads to a central paradox about cyber security as we currently conceive it: on the one hand, it appears to be a problem that cannot be dealt with effectively by state instruments like the military or law enforcement but despite that, there remains a strong expectation that the state retains responsibility for providing security in this realm. This paradox has led to an emphasis in cyber security...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</guid>
			</item>
			<item>
				<title>Book Review: &quot;Cyber War Will Not Take Place&quot;</title>
				<link>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</link>
				<description>By Justine  Chauvin - In Cyber War Will Not Take Place1, Thomas Rid develops his argument on the concept of &quot;cyberwar&quot;, previously formulated in an article of the same name2 published in January 2012. His chief point is that &quot;cyber war has never happened in the past, it does not occur in the present, and it is unlikely that it will disturb our future&quot;;3 ergo the use of this concept to describe cyberoffenses is misleading.4 He has also written several articles related to cyberwar5, cyberweapons6 and cyberpeace,7 in which he argues against the militarization of the debate about cyberattacks,8 and in particular the confusing...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</guid>
			</item>
			<item>
				<title>Stuxnet: The World&#39;s First Cyber... Boomerang?</title>
				<link>http://www.inquiriesjournal.com/articles/1343/stuxnet-the-worlds-first-cyber-boomerang</link>
				<description>By Alex  Middleton - In June 2012, two years after the initial discovery of the Stuxnet worm,1 an excerpt from David Sanger&#39;s then soon to be released book entitled Confront and Conceal was published in the New York Times.2 This piece, purportedly based on the testimony of several current and former American, European and Israeli officials, declared that Stuxnet &amp;ndash; &quot;the world&#39;s first fully fledged cyber weapon&quot;3 was engineered by the United States and Israel as part of a wider covert operation aimed at undermining the Iranian nuclear program.4 Whilst the United States and Israel had long been suspected of developing...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1343/stuxnet-the-worlds-first-cyber-boomerang</guid>
			</item>
			<item>
				<title>The Internet as a Slippery Object of State Security: The Problem of Physical Border Insensitivity, Anonymity and Global Interconnectedness</title>
				<link>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</link>
				<description>By Memphis  Krickeberg - Cybersecurity is presented in the growing literature on the subject as an essentially &quot;slippery&quot; object for state security.1 The Internet puts a lot of stress on the conventional conception of state security as the insurance of the state&#39;s survival in the international realm. In addition, cybersecurity supposedly leads to a reconfiguration of state security which must be apprehended through new paradigms. In this article we establish a typology of the main arguments found in cybersecurity discourses that emphasize fundamental differences between cybersecurity and more conventional factors of state...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</guid>
			</item>
			<item>
				<title>An Analysis on the Regulation of Grey Market Cyber Materials</title>
				<link>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</link>
				<description>By Kelsey  Annu-Essuman - The creation of the computer network system and its spread throughout the international realm has opened doors for new ways of gathering information as well as manipulating this information for both protective and malicious purposes. While the material stored within computer systems is often thought of as being privy to the user of that system and whomever the user decides to share their data with, the rise in cyberattacks has proven otherwise. Cyber &quot;crime&quot; or &quot;attacks&quot;─the exploitation of Internet and, more generally, computer vulnerabilities in order to access and use private information ─...</description>
				<pubDate>Sat, 01 Nov 2014 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</guid>
			</item>
			<item>
				<title>Defending the Cyber Realm</title>
				<link>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</link>
				<description>By Alex  Middleton - There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of cyber-threats.1 Whether these dangers are capable of generating enough damage to warrant a redistribution of government resources is the question at the heart of this essay. This paper provides an evaluation of the cyber-threat arguing that it deserves recognition as a top-tier priority given that it poses some significant challenges to both national security and economic prosperity. Whilst cyber -crime falls under...</description>
				<pubDate>Wed, 01 Jan 2014 07:58 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</guid>
			</item>
			<item>
				<title>The Law of Attack in Cyberspace: Considering the Tallinn Manual&#39;s Definition of &#39;Attack&#39; in the Digital Battlespace</title>
				<link>http://www.inquiriesjournal.com/articles/775/the-law-of-attack-in-cyberspace-considering-the-tallinn-manuals-definition-of-attack-in-the-digital-battlespace</link>
				<description>By Michael J. Norris - A lawful attack in armed conflict is predicated on four cumulative conditions. First, the target must be a &#39;military objective.&#39; Second, the &#39;means&#39; and &#39;method&#39; employed to attack the target must be lawful. Third, the attacker must take specified precautions. Finally, the attack must not cause damage to civilian objects or civilians excessive in relation to the concrete and direct military objective anticipated.[3] Attacks which do not meet these four conditions are considered unlawful. However, operations that do not meet the threshold of attack are not subject to the aforementioned conditions...</description>
				<pubDate>Tue, 22 Oct 2013 10:33 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/775/the-law-of-attack-in-cyberspace-considering-the-tallinn-manuals-definition-of-attack-in-the-digital-battlespace</guid>
			</item>
			<item>
				<title>Cracking the Digital Vault: A Study of Cyber Espionage</title>
				<link>http://www.inquiriesjournal.com/articles/629/cracking-the-digital-vault-a-study-of-cyber-espionage</link>
				<description>By Constantine J. Petallides - The Internet originated with research funding provided by the Department of Defense Advanced Research Projects Agency (DARPA) to establish a military network. As its use expanded, a civilian segment evolved with support from the National Science Foundation (NSF) and other science agencies.[3] While wired connections between mainframes at certain bases existed as early as the late 1950s,[4] these rudimentary links had very limited functionality. The connection was usually unreliable, and in some cases could only transmit small bundles of data in one direction. While it is true that these connections...</description>
				<pubDate>Tue, 03 Apr 2012 08:05 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/629/cracking-the-digital-vault-a-study-of-cyber-espionage</guid>
			</item>
			<item>
				<title>Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat</title>
				<link>http://www.inquiriesjournal.com/articles/627/cyber-terrorism-and-ir-theory-realism-liberalism-and-constructivism-in-the-new-security-threat</link>
				<description>By Constantine J. Petallides - This level of exposure and uncertainty creates a new security dilemma faced by all states. In his article &amp;ldquo;Virtual Defense,&amp;rdquo; James Adams adopts a strict neorealist approach to dealing with issues of cyber terrorism and security, and while he does lessen the security dilemma, he creates a tense, distrustful, and ultimately unsustainable international system. I argue along with Johan Eriksson and Giampiero Giocomello that to deal with these security threats, the Internet must be viewed as having its own customs and states must come together to promote its continued development and ensure...</description>
				<pubDate>Fri, 23 Mar 2012 10:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/627/cyber-terrorism-and-ir-theory-realism-liberalism-and-constructivism-in-the-new-security-threat</guid>
			</item>
	</channel>
</rss>
