Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments

Abstract On the basis of a review of information warfare literature from 1990 to mid-2005, this article presents a framework of 12 important trends. These trends demonstrate the transformation of information warfare from primarily a military issue into a major commercial issue as well. Corporate IS managers need to understand the growing cyberwar threats and implement appropriate strategies to mitigate risk.

[1]  Omar El Sawy,et al.  The Four Tigers of Global E-Business Infrastructure: Strategies and Implications for Emerging Economies , 2003, Commun. Assoc. Inf. Syst..

[2]  Moshe Zviran,et al.  Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..

[3]  Paul J. Bolt,et al.  Information warfare across the Taiwan strait , 2004 .

[4]  Charles C. Wood,et al.  Information Security Policies Made Easy , 1994 .

[5]  Amitava Dutta,et al.  Management's Role in Information Security in a Cyber Economy , 2002 .

[6]  Jonathan Rosenoer,et al.  Safeguarding Your Critical Business Information , 2002 .

[7]  Derek S. Reveron,et al.  China's Use of Perception Management , 2003 .

[8]  Ashish Garg,et al.  The Financial Impact of IT Security Breaches: What Do Investors Think? , 2003, Inf. Secur. J. A Glob. Perspect..

[9]  Peter G. Neumann Identity-related misuse , 1997, CACM.

[10]  Mark N. Frolick A New Webmaster's Guide to Firewalls and Security , 2003, Inf. Syst. Manag..

[11]  Michael Grüninger,et al.  Introduction , 2002, CACM.

[12]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[13]  Winn Schwartau Information Warfare , 1996, Encyclopedia of Public Administration and Public Policy, Third Edition.

[14]  Thomas Peltier,et al.  Information Technology: Code of Practice for Information Security Management , 2001 .

[15]  B. Cronin Information warfare: peering inside Pandora’s postmodern box , 2001 .

[16]  Ephraim R. McLean,et al.  Key Issues for IT Executives , 2004, MIS Q. Executive.

[17]  D. Denning Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .

[18]  Rita Marcella,et al.  Managing in the Next Society , 2003, J. Documentation.

[19]  Robert D Austin,et al.  The myth of secure computing. , 2003, Harvard business review.

[20]  T. Neff,et al.  Survival of the Fittest , 1997 .

[21]  Philip N. James Education and training. Key to a competitive IS strategy , 1992 .

[22]  Peter Svensson,et al.  Al-Jazeera Site Experiences Hack Attack , 2003 .

[23]  Morgan O apos,et al.  Cyber-extortion evolves , 2004 .

[24]  Martin P. Loeb,et al.  CSI/FBI Computer Crime and Security Survey , 2004 .

[25]  Carl J. Pacini,et al.  What your firm should know about identity theft , 2004 .

[26]  Gerald L. Kovacich,et al.  Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2 , 2002, Inf. Secur. J. A Glob. Perspect..

[27]  Tom Stafford,et al.  Spyware: The Ghost in the Machine , 2004, Commun. Assoc. Inf. Syst..

[28]  J Girvin,et al.  Education and training , 2016, Elderly care.

[29]  Janice C. Sipior,et al.  The Ethical and Legal Concerns of Spyware , 2005, Inf. Syst. Manag..

[30]  R. Panko Corporate Computer and Network Security , 2003 .

[31]  Alan D. Campen,et al.  Cyberwar 2.0: Myths, Mysteries and Reality , 1998 .

[32]  Dinesh Sequeira INTRUSION PREVENTION SYSTEMS - SECURITY'S SILVER BULLET? , 2002 .

[33]  Anne Powell,et al.  Information Systems Management , 1997 .

[34]  日本規格協会 情報技術 : 情報セキュリティ管理実施基準 : 国際規格 : ISO/IEC 17799 = Information technology : code of practice for infromation security management : international standard : ISO/IEC 17799 , 2000 .

[35]  Philip Calvert Strategic Warfare in Cyberspace , 2002 .

[36]  Ken M. Shaurette,et al.  Security Infrastructure: Basics of Intrusion Detection Systems , 2000 .

[37]  Tim Porter Information warfare - Your company needs you! , 1996, Comput. Secur..

[38]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[39]  Kevin D. Mitnick Are You the Weak Link , 2003 .

[40]  D. Parker Crime by computer , 1976 .

[41]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[42]  Blaise Cronin,et al.  Information Warfare: Its Application in Military and Civilian Contexts , 1999, Inf. Soc..

[43]  Kallol Kumar Bagchi,et al.  An Analysis of the Growth of Computer and Internet Security Breaches , 2003, Commun. Assoc. Inf. Syst..

[44]  William Hutchinson Concepts in information warfare , 2002 .