Relational geographies of cyberterrorism and cyberwar

  title={Relational geographies of cyberterrorism and cyberwar},
  author={Barney Warf and Emily Fekete},
  journal={Space and Polity},
  pages={143 - 157}
Cyberterrorism is an increasingly pervasive term in the mainstream media; however, its definition remains vague at best. As the use of information technology continues to expand, the real and virtual worlds are evermore entwined, including the use of such technology for military purposes. Contemporary work in border studies explains the growing permeability of state borders. Inspired by the works of Paul Virilio, this paper holds that cyberattacks exemplify the increasingly relational quality… 
Cyber security and the Leviathan
Using data gathered from in-depth, semi-structured interviews with 15 Chief Information Security Officers, as well as six senior organisational leaders, it is shown that the work of political philosopher Thomas Hobbes, particularly Leviathan, offers a useful lens through which to understand the context of these functions and of cyber security in Western society.
Geographies of e-Government in Europe
  • Barney Warf
  • Computer Science
    International Journal of E-Planning Research
  • 2018
This article explores the spatiality of e-government in Europe and sitsuates the topic within wider theorizations of geographies of cyberspace, emphasizing that e- government must be approached geographically in a manner tailored to different national contexts.
Cyberterrorism Today? Findings From a Follow-on Survey of Researchers
Abstract This article reports on a survey of researchers designed to capture current perspectives on core questions around cyberterrorism. The survey—conducted in 2017 as a follow-on to an initial,
Cyber Conflict Bibliography, 2015 Update
The purpose of this bibliography, originally prepared for the Future of Cyber Warfare symposium held at The George Washington University Law School in April 2012, is to provide scholarly and other
Die Virtualisierung der Kriegsführung
Mit der Rede von Cyberwar und dem die bewaffnete Drohne begleitenden Narrativ vom „Toten auf Distanz“ sind militarstrategische Hoffnungen einerseits, andererseits aber auch humanitare und
Cyber security and the Leviathan
Cloaked Facebook pages: Exploring fake Islamist propaganda in social media
This research analyses cloaked Facebook pages that are created to spread political propaganda by cloaking a user profile and imitating the identity of a political opponent in order to spark hateful


Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
This paper examines the concept of cyberterrorism, rejecting the idea that cyberterrorism is widespread, and focuses on terrorist groups’ ‘use’ of the Internet, in particular the content of their Web sites, and their ‘misuse' of the medium, as in hacking wars, for example.
The emergence of iWar: Changing practices and perceptions of military engagement in a digital era
The article develops the term iWar to account for the technological affordances that facilitate the latter, and introduces five key dimensions of the concept – individuation, implicitness, interactivity, intimacy and immediacy.
Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War
The size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small and the use of computer network attack as a brute force weapon will probably become increasingly frequent.
Obama Order Sped Up Wave of Cyberattacks Against Iran
N.B. As per the disclaimer [1], neither the ICRC nor the authors can be identified with the opinions expressed in the Cases and Documents. Some cases even come to solutions that clearly violate IHL.
The everywhere war
Much of the discussion of 9/11 has debated its historical significance, but it is equally important to explore the geographical dimensions of the wars that have been conducted in its shadows.
Cyberdeterrence and Cyberwar
There are important differences in how states are involved in cyberspace and how the United States protects itself in the face of attack.
Globalization and Sovereignty
Globalization represents the reality that we live in a time when the walls of sovereignty are no protection against the movements of capital, labor, information and ideas—nor can they provide
Cyber-Terror—Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate
This paper analyzes the US cyber-terror discourse from a constructivist security studies angle, and speculates on characteristics that are responsible for the rapid and considerable political impact of the widespread conceptualization of aspects of information technology as a security problem in the 1990s.
Predator Empire: The Geopolitics of US Drone Warfare
This paper critically assesses the CIA's drone programme and proposes that the use of unmanned aerial vehicles is driving an increasingly “dronified” US national security strategy. The paper suggests