Cyber Warfare And Its Place In Modern Geopolitics And War

Authors

  • Idden Aryasatya University of Indonesia
  • Eko Daryanto University of Indonesia

DOI:

https://doi.org/10.70710/sitj.v2i1.31

Keywords:

Cyber Warfare, Cyber Security, Development, Technology

Abstract

There are now major cybersecurity concerns as a result of how fast technology has changed geopolitics. Attacks against a nation's communication, infrastructure, and economy through cyber espionage, sabotage, disinformation, and DDoS attacks undermine national stability. The high level of digital integration in industrialized nations makes them easy targets, while the lack of resources and digital knowledge makes underdeveloped nations vulnerable. There has to be international collaboration on cybersecurity rules and ethics because of this chasm. While cutting-edge innovation like AI strengthens defenses, it also introduces new dangers and raises new ethical questions. This study delves into the consequences of cyberwarfare. It highlights the importance of strong cybersecurity measures, online education, and global cooperation to safeguard nations and their inhabitants against ever-changing cyber dangers.

Downloads

Download data is not yet available.

References

Al-Hawamleh, A. M. (2023). Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures. Momentum, 3(14), 15.

Atrews, R. (2020). Cyberwarfare: Threats, security, attacks, and impact. Journal of Information Warfare, 19(4), 17–28. Retrieved from https://www.jstor.org/stable/27033642

Bardin, J. S. (2024). Cyber warfare. In Computer and Information Security Handbook (pp. 1345–1380). Morgan Kaufmann.

Bartlett, B. (2024). Why do states engage in cybersecurity capacity-building assistance? Evidence from Japan. The Pacific Review, 37(3), 475–503.

Buçaj, E., & Idrizaj, K. (2025). The need for cybercrime regulation on a global scale by international law and cyber convention. Multidisciplinary Reviews, 8(1), 2025024–2025024.

Clim, A., Toma, A., Zota, R. D., & Constantinescu, R. (2022). The need for cybersecurity in the industrial revolution and smart cities. Sensors, 23(1), 120.

Cremer, F., Sheehan, B., Mullins, M., Fortmann, M., Ryan, B. J., & Materne, S. (2024). On the insurability of cyber warfare: An investigation into the German cyber insurance market. Computers & Security, 123, 103886.

de Neira, A. B., Kantarci, B., & Nogueira, M. (2023). Distributed denial of service attack prediction: Challenges, open issues and opportunities. Computer Networks, 222, 109553.

Digmelashvili, T. (2023). The impact of cyberwarfare on national security. Future Human Image, (19), 12–19.

Haddad, C., Vorlíček, D., & Klimburg-Witjes, N. (2024). The security-innovation nexus in (geo-)political imagination. Geopolitics, 29(3), 741–764.

Kayode-Ajala, O. (2023). Establishing cyber resilience in developing countries: An exploratory investigation into institutional, legal, financial, and social challenges. International Journal of Sustainable Infrastructure for Cities and Societies, 8(9), 1–10.

Khan, N. F., Ikram, N., & Saleem, S. (2024). Effects of socioeconomic and digital inequalities on cybersecurity in a developing country. Security Journal, 37(2), 214–244.

Kravchenko, O., Veklych, V., Krykhivskyi, M., & Madryha, T. (2024). Cybersecurity in the face of information warfare and cyberattacks. Multidisciplinary Science Journal, 6.

Lonergan, E. D., Smith, M. W., & Mueller, G. B. (2023, May). Evaluating assumptions about the role of cyberspace in warfighting: Evidence from Ukraine. In 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) (pp. 85–102). IEEE.

McLean, M. (2024). 2024 must-know cyberattack statistics and trends. Retrieved from https://www.embroker.com/blog/cyber-attack-statistics/

Muller, L. P. (2015). Cybersecurity capacity building in developing countries: Challenges and opportunities.

Musakhanov, D. (2023). The international consequences of cyber warfare: A study of the Stuxnet case. Acta of Turin Polytechnic University in Tashkent, 13(3), 47–50.

Mumford, A., & Carlucci, P. (2023). Hybrid warfare: The continuation of ambiguity by other means. European Journal of International Security, 8(2), 192–206.

Obi, O. C., Akagha, O. V., Dawodu, S. O., Anyanwu, A. C., Onwusinkwue, S., & Ahmad, I. A. I. (2024). Comprehensive review on cybersecurity: Modern threats and advanced defense strategies. Computer Science & IT Research Journal, 5(2), 293–310.

Peter, A., & Ohakpougwu, U. (2023, May). Origins of cyberwarfare: How the internet got weaponized. In European Conference on Social Media (Vol. 10, No. 1, pp. 364–372).

Pollard, M. (2024). A case study of Russian cyber-attacks on the Ukrainian power grid: Implications and best practices for the United States. Pepperdine Policy Review, 16(1), 1.

Popoola, O. A., Akinsanya, M. O., Nzeako, G., Chukwurah, E. G., & Okeke, C. D. (2024). Exploring theoretical constructs of cybersecurity awareness and training programs: Comparative analysis of African and US initiatives. International Journal of Applied Research in Social Sciences, 6(5), 819–827.

Rahman, M. H., Wuest, T., & Shafae, M. (2023). Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies. Journal of Manufacturing Systems, 68, 196–208.

Raska, M., & Bitzinger, R. A. (2023). Introduction: The AI wave in defence innovation. In The AI Wave in Defence Innovation (pp. 1–11). Routledge.

Rowe, N. C. (n.d.). The ethics of cyberweapons in warfare. Retrieved from https://faculty.nps.edu/ncrowe/ethics_of_cyberweapons_09.htm

Shandler, R., Gross, M. L., & Canetti, D. (2023). Cyberwarfare and democracy: Emerging risks and protective measures. Journal of Cybersecurity Studies, 5(3), 245–267.

Downloads

Published

2025-03-07

How to Cite

Aryasatya, I., & Daryanto, E. (2025). Cyber Warfare And Its Place In Modern Geopolitics And War. Security Intelligence Terrorism Journal (SITJ), 2(1), 48–55. https://doi.org/10.70710/sitj.v2i1.31

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.