27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Karim Hamza and Van Dalen<br />

Cyber-War: actions by a nation-state to penetrate another nation's computers or networks for the<br />

purposes of causing damage or disruption. (Clarke, 2010)<br />

Cyber Crime: refers to any crime that involves a computer and a network, where the computers<br />

may or may not have played an instrumental part in the commission of a crime<br />

Espionage or spying: involves individuals obtaining information that is considered secret or<br />

confidential without the permission of the holder of this information.<br />

5. Types of threats internal / external and state / non state<br />

Critical to the success of any eGovernance framework, is its security. Since such governance<br />

frameworks somehow will be open to interactions with different “stakeholders”, who may, by making<br />

use of eGovernance frameworks, influence the decision making process in the government, create<br />

political pressure or even start a cyber-war.<br />

A. Internal Stakeholders [Domestic] (within the boundaries of the state) as<br />

Pressure groups,<br />

Political parties,<br />

Business,<br />

Citizens<br />

Organized crime .. etc<br />

or<br />

B. External Stakeholders [Foreign] (outside boundaries of the state) as<br />

Other states,<br />

Multinational businesses,<br />

Worldwide operating malicious organizations,.. etc<br />

Given the wide array of possible opponents, weapons, and strategies, it becomes increasingly difficult<br />

to distinguish between foreign and domestic sources of IW threats and actions. You may not know<br />

who’s under attack by whom, or who’s in charge of the attack. This greatly complicates the traditional<br />

role distinction between domestic law enforcement, on the one hand, and national security and<br />

intelligence entities on the other. Another consequence of this blurring phenomenon is the<br />

disappearance of clear distinctions between different levels of anti-state activity, ranging from crime to<br />

warfare. (Roger, Molander, Riddile, Wilson, 1996)<br />

6. Importance of eGovernance national security and the need to be covered in<br />

information warfare strategies<br />

Presence of threats, like: terrorists, competitors, state enemies and malicious organizations makes<br />

the threat of information warfare very important to governments and private sector attached to<br />

eGovernance frameworks. It will raise a high attention to develop strategic information warfare to<br />

protect dimensions as: Military, Physical, Economic, Political, And Social (Roger, Molander, Riddile, Wilson,<br />

1996).<br />

7. Non military response: Policies, laws, diplomacies, awareness and media<br />

Governments have to develop military as well as non-military tools and mechanisms that can<br />

supplement dynamic eGovernance frameworks. Application domains encompass fields like Political,<br />

Legal and Diplomatic. Interaction between agencies inside and outside the government, in addition to<br />

international affairs will be needed to define international legal regulations and political channels to<br />

control relevant threats. In the end, it will certainly require a (re)definition of the distribution of<br />

responsibilities for international legal arrangements in case of legal disputes, as that’s taking place in<br />

the United Nations or NATO.<br />

The appropriate role for the government in responding to the strategic Information Warfare threat<br />

impacting the eGovernance framework needs to be addressed, this role to be part leadership and part<br />

partnership with the domestic sector. In addition to being the performer of certain basic functions such<br />

as; organizing, equipping, training, and sustaining military forces, the government may play a more<br />

110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!