Skip to main content
Top

2018 | OriginalPaper | Chapter

Assessing Opinions on Software as a Weapon in the Context of (Inter)national Security

Authors : Jantje A. M. Silomon, Mark Patrick Roeling

Published in: Transactions on Computational Science XXXII

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Modern life is permeated by software which provides a large attack surface, ranging from generic, low impact malware attacks, to sophistically created and targeted code touted as a next generation of weapons. Although some research on this broad area of cyber weapons exists, the solicitation of public opinion through surveys is lacking. A questionnaire was conducted on the attitudes towards Software as a Weapon (SaaW), with this article presenting further results, linking traditional aspects of weapons to the understanding of, and differences between, software and malware in context of international security. The results suggest that there is a statistically significant difference between respondents in the Military, Academia, or Other professions concerning questions of capabilities, and the demise of the state-centric model. Furthermore, factor analyses identified eight dimensions in our questionnaire. Comparison of these across the three groups revealed significant differences in how peoples’ background influenced their perception concerning the nature, intent, and potential of software and malware to be used as a weapon. Finally, using text-mining, we present the words frequently used to describe malware, software, and weapons, and provide an interpretation for overlap between constructs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agrafiotis, I., Nurse, J.R.C., Buckley, O., Legg, P.A., Creese, S., Goldsmith, M.: Identifying attack patterns for insider threat detection. Comput. Fraud Secur. 2015(7), 9–17 (2015)CrossRef Agrafiotis, I., Nurse, J.R.C., Buckley, O., Legg, P.A., Creese, S., Goldsmith, M.: Identifying attack patterns for insider threat detection. Comput. Fraud Secur. 2015(7), 9–17 (2015)CrossRef
2.
go back to reference Alperovitch, D.: Towards establishment of cyberspace deterrence strategy. In: 2011 3rd International Conference on Cyber Conflict, pp. 1–8 (2011) Alperovitch, D.: Towards establishment of cyberspace deterrence strategy. In: 2011 3rd International Conference on Cyber Conflict, pp. 1–8 (2011)
4.
go back to reference Betts, R.K.: The lost logic of deterrence. Foreign Aff. 1(87), 87–99 (2013) Betts, R.K.: The lost logic of deterrence. Foreign Aff. 1(87), 87–99 (2013)
5.
go back to reference Bhatt, P., Yano, E.T., Gustavsson, P.: Towards a framework to detect multi-stage advanced persistent threats attacks. In: Proceedings of IEEE 8th International Symposium on Service Oriented System Engineering, SOSE 2014, pp. 390–395 (2014) Bhatt, P., Yano, E.T., Gustavsson, P.: Towards a framework to detect multi-stage advanced persistent threats attacks. In: Proceedings of IEEE 8th International Symposium on Service Oriented System Engineering, SOSE 2014, pp. 390–395 (2014)
6.
go back to reference Blake, D., Imburgia, J.S.: Bloodless weapons? Air Force Law Rev. 66, 157–204 (2010) Blake, D., Imburgia, J.S.: Bloodless weapons? Air Force Law Rev. 66, 157–204 (2010)
7.
go back to reference Brown, G., Metcalf, A.: Easier said than done: legal reviews of cyber weapons. J. Natl. Secur. Law Policy 7, 115–138 (2014) Brown, G., Metcalf, A.: Easier said than done: legal reviews of cyber weapons. J. Natl. Secur. Law Policy 7, 115–138 (2014)
8.
go back to reference Choi, B.C.K., Pak, A.W.P.: A catalog of biases in questionnaires. Prev. Chronic Dis. 2(1), 1–13 (2005) Choi, B.C.K., Pak, A.W.P.: A catalog of biases in questionnaires. Prev. Chronic Dis. 2(1), 1–13 (2005)
9.
go back to reference Cimbala, S.J.: On nuclear war: deterrence, escalation, and control. Mil. Strateg. Aff. 4(3), 25–43 (2012) Cimbala, S.J.: On nuclear war: deterrence, escalation, and control. Mil. Strateg. Aff. 4(3), 25–43 (2012)
10.
go back to reference Cirenza, P.: An evaluation of the analogy between nuclear and cyber deterrence. Ph.D. thesis, Stanford University (2015) Cirenza, P.: An evaluation of the analogy between nuclear and cyber deterrence. Ph.D. thesis, Stanford University (2015)
11.
go back to reference Fowler Jr., F.J.: Survey Research Methods. Sage Publications Limited, London (2013) Fowler Jr., F.J.: Survey Research Methods. Sage Publications Limited, London (2013)
12.
go back to reference Hakkarainen, P.: Cyber Weapon Target Analysis. BoD (2014) Hakkarainen, P.: Cyber Weapon Target Analysis. BoD (2014)
13.
go back to reference Harvard Nuclear Study Group: Living With Nuclear Weapons. Bantam Books, New York (1983) Harvard Nuclear Study Group: Living With Nuclear Weapons. Bantam Books, New York (1983)
14.
go back to reference Herr, T.: Malware counter-proliferation and the Wassenaar arrangement (2016) Herr, T.: Malware counter-proliferation and the Wassenaar arrangement (2016)
15.
go back to reference Herr, T., Armbrust, E.: Milware: the implications of state authored malicious software. Soc. Sci. Res. Netw. (2015) Herr, T., Armbrust, E.: Milware: the implications of state authored malicious software. Soc. Sci. Res. Netw. (2015)
16.
go back to reference Herr, T., Dc, W.: PrEP: a framework for malware & cyber weapons. J. Inf. Warf. 13(1) (2014) Herr, T., Dc, W.: PrEP: a framework for malware & cyber weapons. J. Inf. Warf. 13(1) (2014)
17.
go back to reference Herr, T., Rosenzweig, P.: Cyber weapons and export control: incorporating dual use with the PrEP model. J. Natl. Secur. Law Policy 8(2), 1–16 (2015) Herr, T., Rosenzweig, P.: Cyber weapons and export control: incorporating dual use with the PrEP model. J. Natl. Secur. Law Policy 8(2), 1–16 (2015)
18.
go back to reference International Group of Experts, Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013) International Group of Experts, Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)
19.
go back to reference Kello, L.: The meaning of the cyber revolution. Int. Secur. 38(2), 7–40 (2013)CrossRef Kello, L.: The meaning of the cyber revolution. Int. Secur. 38(2), 7–40 (2013)CrossRef
20.
go back to reference Kello, L.: The Virtual Weapon and International Order. Yale University Press, New Haven (2017)CrossRef Kello, L.: The Virtual Weapon and International Order. Yale University Press, New Haven (2017)CrossRef
21.
go back to reference Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutor. 16(2), 898–924 (2014)CrossRef Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutor. 16(2), 898–924 (2014)CrossRef
22.
go back to reference Kramer, B.M., Kalick, S.M., Milburn, M.A.: Attitudes toward nuclear weapons and nuclear war: 1945–1982. J. Soc. Issues 39(I), 7–24 (1983)CrossRef Kramer, B.M., Kalick, S.M., Milburn, M.A.: Attitudes toward nuclear weapons and nuclear war: 1945–1982. J. Soc. Issues 39(I), 7–24 (1983)CrossRef
23.
go back to reference Lindsay, J.R., Kello, L.: Correspondence: a cyber disagreement. Int. Secur. 39(2), 181–192 (2014)CrossRef Lindsay, J.R., Kello, L.: Correspondence: a cyber disagreement. Int. Secur. 39(2), 181–192 (2014)CrossRef
25.
go back to reference Mele, S.: Cyber-weapons: legal and strategic aspects (Version 2.0). Italian Institute of Strategic Studies “Niccolò Machiavelli”, 22 June 2013 Mele, S.: Cyber-weapons: legal and strategic aspects (Version 2.0). Italian Institute of Strategic Studies “Niccolò Machiavelli”, 22 June 2013
26.
go back to reference Peterson, D.: Offensive cyber weapons: construction, development, and employment. J. Strateg. Stud. 36(1), 120–124 (2013)CrossRef Peterson, D.: Offensive cyber weapons: construction, development, and employment. J. Strateg. Stud. 36(1), 120–124 (2013)CrossRef
27.
29.
go back to reference Silomon, J.A.M., Roscoe, A.W.: Attitudes towards software as a weapon. In: IADIS International Conference ICT, Society and Human Beings, Lisbon, pp. 119–126 (2017) Silomon, J.A.M., Roscoe, A.W.: Attitudes towards software as a weapon. In: IADIS International Conference ICT, Society and Human Beings, Lisbon, pp. 119–126 (2017)
30.
go back to reference Silomon, J.A.M., Roscoe, A.W.: Software and malware capabilities: opinions on (inter)national security. In: International Conference on Cyberworlds, pp. 96–102 (2017) Silomon, J.A.M., Roscoe, A.W.: Software and malware capabilities: opinions on (inter)national security. In: International Conference on Cyberworlds, pp. 96–102 (2017)
31.
go back to reference Tabansky, L.: Critical infrastructure protection against cyber threats, vol. 3 (2011) Tabansky, L.: Critical infrastructure protection against cyber threats, vol. 3 (2011)
32.
go back to reference Wilson, C.: Cyber weapons: 4 defining characteristics (2015) Wilson, C.: Cyber weapons: 4 defining characteristics (2015)
Metadata
Title
Assessing Opinions on Software as a Weapon in the Context of (Inter)national Security
Authors
Jantje A. M. Silomon
Mark Patrick Roeling
Copyright Year
2018
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-56672-5_4

Premium Partner