Journal Issue:
Abstract:
In the present article author investigates the concept of "cyberwar", history and nature of computer wars studies. Author analyzes opinions of jurists and experts in the field, compares some views on the history of cyberwars. In the conclusion author notes that the solution of the problems connected in the cyberconflicts is impossible without creation of the branch "information law" and its dynamic development, expeditious introduction of timely precepts of law.
Keywords:
cyberwar, computer war, history, information law, perspective.
REFERENCES:
[1] Bachilo I.L., Kopylov V.A. Est li osnovaniya dlya sozdaniya otrasli "informacionnoe pravo" // Informacionnoe obshhestvo. 1999. No. 6.
[2] Bachilo I.L. Informacionnoe pravo novaya otrasl prava Rossijskoj Federacii (metodologiya, teoriya, praktika) // Gosudarstvo i pravo. 2008. No. 3.
[3] Bachilo I.L. Svobodnyj dostup k informacii i Internet // Informacionnoe obshhestvo. 2000. No. 4.
[4] Demidov O.V. Cifrovoj dzhinn na sluzhbe Tegerana // Indeks bezopasnosti. 2013. No. 4.
[5] Korsakov G.B. Informacionnoe oruzhie superderzhavy // Puti k miru i bezopasnosti. 2012. No. 1 (42).
[6] Cifrovaya ili kibervojna kak realnost // 2010-2015, Internet-zhurnal "Armejskij Vestnik". URL: https://army-news.ru/2013/12/cifrovaya-ili-kibervojna-kak-realnost/
[7] Estoniya i Rossiya: kibervojna // 2000-2015, InoSMI.ru. URL: https://inosmi.ru/world/20070511/234454.html
[8] Kshetri N. Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses // East Asia. 2014. No. 31.
[9] Kshetri N. Cyberwarfare: Western and Chinese Allegations // IT Professional. 2014. No. 1 (16).
[10] Krotofil M. Cyber can kill and destroy too: Blurring borders between conventional and cyber warfare. 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014
[11] Sarga L., Jašek R. Mobile cyberwarfare threats and mitigations: An overview. 12th European Conference on Information Warfare and Security 2013, ECIW 2013.
[12] Scanlon M., Kechadi T. The case for a collaborative universal peer-to-peer botnet investigation framework. 9th InternationalConference on Cyber Warfare and Security 2014.