To the Question of the Computer Wars History

Journal Issue:

Author Information: 

Doctor of Philosophy (Law), Head of the Department of Humanitarian, Social, Economic and Information-Legal Disciplines of the Stolypin International Institute of Informatization and Public Administration, Associate Professor of International Level of the Department of Municipal Law of the Peoples' Friendship University of Russia

Abstract: 

In the present article author investigates the concept of "cyberwar", history and nature of computer wars studies. Author analyzes opinions of jurists and experts in the field, compares some views on the history of cyberwars. In the conclusion author notes that the solution of the problems connected in the cyberconflicts is impossible without creation of the branch "information law" and its dynamic development, expeditious introduction of timely precepts of law.

Keywords: 

cyberwar, computer war, history, information law, perspective.

REFERENCES: 
[1] Bachilo I.L., Kopylov V.A. Est li osnovaniya dlya sozdaniya otrasli "informacionnoe pravo" // Informacionnoe obshhestvo. 1999. No. 6.
[2] Bachilo I.L. Informacionnoe pravo novaya otrasl prava Rossijskoj Federacii (metodologiya, teoriya, praktika) // Gosudarstvo i pravo. 2008. No. 3.
[3] Bachilo I.L. Svobodnyj dostup k informacii i Internet // Informacionnoe obshhestvo. 2000. No. 4.
[4] Demidov O.V. Cifrovoj dzhinn na sluzhbe Tegerana // Indeks bezopasnosti. 2013. No. 4.
[5] Korsakov G.B. Informacionnoe oruzhie superderzhavy // Puti k miru i bezopasnosti. 2012. No. 1 (42). 
[6] Cifrovaya ili kibervojna kak realnost // 2010-2015, Internet-zhurnal "Armejskij Vestnik". URL: https://army-news.ru/2013/12/cifrovaya-ili-kibervojna-kak-realnost/
[7] Estoniya i Rossiya: kibervojna // 2000-2015, InoSMI.ru. URL: https://inosmi.ru/world/20070511/234454.html
[8] Kshetri N. Cyberwarfare in the Korean Peninsula: Asymmetries and Strategic Responses // East Asia. 2014. No. 31.
[9] Kshetri N. Cyberwarfare: Western and Chinese Allegations // IT Professional. 2014. No. 1 (16). 
[10] Krotofil M. Cyber can kill and destroy too: Blurring borders between conventional and cyber warfare. 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014
[11] Sarga L., Jašek R. Mobile cyberwarfare threats and mitigations: An overview. 12th European Conference on Information Warfare and Security 2013, ECIW 2013.
[12] Scanlon M., Kechadi T. The case for a collaborative universal peer-to-peer botnet investigation framework. 9th InternationalConference on Cyber Warfare and Security 2014.