This article discusses why computer scientists should be aware of cyberconflict and U.S. National Security policies regarding cyberconflict. It presents information on cyberterrorism, espionage, and the cyberattacks reported by Computer Network Emergency Response Coordination Centers in order to attribute the importance of cybersecurity. Herbert Lin has published many articles on cyberconflict with the majority published in scholarly journals. The authors' recommendation seems unbiased on the topic and presents the notion that voice of computer scientists can help policymakers make more informed decisions.
This article was found in Business Source Complete.
Power, R. (2000). Tangled Web : Tales of Digital Crime From the Shadows of Cyberspace. Que.
Denning, P. J., & Denning, D. E. (2010). The Profession of IT Discussing Cyber Attack. Communications Of The ACM, 53(9), 29-31. doi:10.1145/1810891.1810904
This article was found in Business Source Complete.
LUKASIK, S. J. (2011). Protecting Users of the Cyber Commons. Communications Of The ACM, 54(9), 54-61. doi:10.1145/1995376.1995393
This article was found in Computers & Applied Sciences Complete.
Ayofe, A., & Irwin, B. (2010). CYBER SECURITY: CHALLENGES AND THE WAY FORWARD. Computer Science & Telecommunications, 29(6), 56-69.
This article was found in Social Sciences Citation Index.
Lin, H. (2012). A virtual necessity: Some modest steps toward greater cybersecurity. Bulletin Of The Atomic Scientists, 68(5), 75-87. DOI: 10.1177/0096340212459039
This article discusses the two cyber operations: offensive and defensive involved in cyberattacks over critical infrastructure. It reveals several approaches to mitigate cyberthreats over critical infrastructure and information technology targets. The author, Herbert Lin, has