Research Article
BibTex RIS Cite

CHANGING WAR CONCEPT IN TERMS OF INTERNATIONAL SYSTEM AND SECURITY; CYBER WAR SAMPLE

Year 2017, Volume: 6 Issue: 2, 81 - 108, 15.11.2017
https://doi.org/10.28956/gbd.354150

Abstract



States basically act with conflict and this
tendency needs some different tools in systematic. Diversification of these
tools is the result of changing world. The states that also defend on these
tools create new war concepts. These tendencies which are generally expressed
with the approaches like war-attack-conflict, have also been used in cyber
area. Although the controversial feauture of the cyber war concept continves in
itself, its presence within international politics has now reached remarkable
dimensions. In this study cyber war sample has grounded with cyber terrorism,
cyber politics, cyber deterrence and evaluated with its position in
international relations.




References

  • Aral, Berdal (2007), “Asimetrik Saldırı Savaşları, Siyaset ve Uluslararası Hukuk”, Uluslararası İlişkiler Dergisi, 4(14), 39-83.
  • Arnold, Todd ve diğerleri (2013), “Professionalizing The Army’s Cyber Army’s Cyber Officer Force”, Army Cyber Center, http://www.gregconti.com/publications/pro_ cyber.pdf (13.04.2016).
  • Barnum, Sean (2014), “Standardizing Cyber Threat Intelligence Information with The Structured Threat Information Expression”, STIX Whitepaper, (1.1) http://stixproject.github.io/getting-started/whitepaper/ (12.04.2016).
  • Bayraktar, Gökhan (2015), Siber Savaş ve Ulusal Güvenlik Stratejisi, İstanbul: Yeniyüzyıl Yayınları.
  • Bendiek, Annegret ve Metzger, Tobias (2015), Deterrence Theory in the Cyber Security, Working Paper RD EU/Europe, Berlin: Research division/EU.
  • Bendrath, Ralf ve diğerleri (2007), “From ‘Cyberterrorism’ to ‘Cyberwar’, back and forth: How The United States Securitized Cyberspace”, Johan Eriksson ve Giampiero Giacomello (Ed.), International Relations and Security in The Digital Age, 1. Baskı içinde (57-83), New York: Routledge Publishing.
  • Bıçakçı, Salih (2012), “Yeni Savaş ve Siber Güvenlik Arasında NATO’nun Yeniden Doğuşu”, Uluslararası İlişkiler Dergisi, 9(34), 205-226.
  • Brown, Gary D., Tullow, Owen W. (2012), “On the Spectrum of Cyber Space Operations”, Small War Journals, http://smallwarsjournal.com/jrnl/art/on-the-spectrum-of-cyberspace-operations (04.02.2016).
  • Bucci, Steven (2009), “The Confluence of Cyber Crime and Terrorism”, Lecture#1123 on National Security and Defence, http://www.heritage.org/research/lecture/the-confluence-of-cyber-crime-and-terrorism (13.01.2016).
  • Burgess, Heidi ve Guy M. Burgess (1997), Encyclopedia of Conflict Resolution, California: ABC-CLIO, Santa Barbara, California.
  • Carr, Jeffrey (2012), Inside Cyber Warfare, 2nd Ed. Sebastopol: O’Reilly Publishing.
  • Caşın, Mesut Hakkı (2008), Uluslararası Terörizm, Ankara: Nobel Yayın Dağıtım.
  • Choucri, Nazli (2012), Cyberpolitics in International Relations, Cambridge: MIT Press.
  • Clarke, Richard A. ve Knake, Robert K. (2011), Siber Savaş: Ulusal Güvenliğe Yönelik Yeni Tehdit, (Çev. Murat Erduran), İstanbul: İKÜ Yayınevi.
  • Çakmak, Haydar ve Demir, Cenker Korhan (2009), “Siber Dünyadaki Tehdit ve Kavramlar”, Haydar Çakmak ve Taner Altınok (Ed.), Suç, Terör ve Savaş Üçgeninde Siber Dünya, 1. Baskı içinde (23-55), Anakara: Barış Platin Kitabevi.
  • Çifçi, Hasan (2013), Her Yönüyle Siber Savaş, Ankara: TÜBİTAK Bilim Kitapları.
  • Gallo, Giorgio ve Marzano, Arturo (2009), “The Dynamics of Asymmetric Conflicts: The Israeli-Palestinian Case”, The Journal of Conflict Studies, Volume 29.
  • Gray, Colin S. (2007), War, Peace and International Relations: An Introduction to Strategic History, New York: Routledge Publishing.
  • Gücüyener, Ayhan (2015), Enerji Güvenliğinde Yeni Bir Arayış, https://www.linkedin.com/pulse/enerji-güvenliğinde-yeni-bir-arayış-ayhan-gucuyener?forceNoSplash=true (15.06.2015).
  • Hayes, Richard E ve Alberts, David S. (1995), “Information Warfare and Deterrence: Appendix B. The Realm of Information Dominance: Beyond Information War”, Federation of American Scientists, http://fas.org/irp/threat/cyber/docs/iwd/appb .html (08.01.2016).
  • Hosein, Ian ve Eriksson, Johan (2007), “International Policy Dynamics and The Regulation of Dataflows: Bypassing Domestic Restrictions”, Johan Eriksson ve Giampiero Giacomello (Ed.), International Relations and Security in The Digital Age, 1. Baskı içinde (158-172), New York: Routledge Publishing.
  • İduğ Y. ve diğerleri (2013), “Siber Caydırıcılık ve Türkiye’nin İmkan ve Kabiliyeti”, 6. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı Bildiriler Kitabı, 1. Baskı içinde (287-290), Ankara: Bilgi Güvenliği Derneği.
  • Libicki, Martin C. (2007), Conquest in Cyberspace: National Security and Information Warfare, Cambridge: Cambridge University Press.
  • Libicki, Martin C. (2009), Cyberdeterrence and Cyberwar, Santa Monica: Rand Corporation.
  • Little, Richard (2007), The Balance of Power in International Relations: Metaphors, Myths and Models, Cambridge: Cambridge University Press.
  • Lupovici, Amir (2011), “Cyber Warfare and Deterrence: Trends and Challenges in Research”, Military and Strategic Affairs, 3(3), 49-62.
  • Merrick, Kathryn ve diğerleri (2016), “A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios”, Future Internet, 8 (3), 1-29.
  • Nye, Joseph S. (2010), Cyber Power, Cambridge: Harvard Kennedy School, Belfer Center for Science and International Affairs.
  • Passeri, Paolo (2016), “June 2016 Cyber Attacks Statistics”, Hackmageddon Information Security Timelines and Statistics, http://www.hackmageddon.com/2016/07/25/16-30-june-2016-cyber-attacks-statistics/ (03.06.2016).
  • Rawnsley, Gary D. (2008), “The Laws of The Playground: Information Warfare and Propaganda Across The Taiwan Strait”, Athina Karatzogianni (Ed.), Cyber Conflict and Global Politics, 1. Baskı içinde (79-94), London: Routledge Chapman Hall.
  • Singer, P.W. ve Friedman, Allan (2015), Siber Güvenlik ve Siber Savaş, (Çev. Ali Atav), Ankara: Buzdağı Yayınları.
  • Sönmezoğlu, Faruk (2014), Uluslararası Politika ve Dış Poltika Analizi, 6. Baskı, Der İstanbul: Der Yayınları.
  • Stevens, Tim (2012), “A Cyberwar of Ideas? Deterrence and Norms in Cyberspace”, Contemporary Security Policy, 33(1), 148-170.
  • Stone, John (2012), “Cyber War will Take Place”, Journal of Strategic Studies, 36(1), 101-108.
  • The Statistics Portal (2016a), “Amount of Monetary Damage Caused by Reported Cyber Crime to the IC3 from 2001 to 2015”, http://www.statista.com/statistics/267132/total-damage-caused-by-by-cyber-crime-in-the-us/ (03.05.2016).
  • Toptaş, Ergüder (2009), 21. Yüzyılda Savaş, Ankara: Kripto Yayınları.
  • United States Government Accountability Office (2010), Briefing to the Subcommittee on Terrorism: Unconventional Threats and Capabilities, Washington DC: Committee on Armed Services, House of Representatives.
  • Varlık, Ali Bilgin (2013), “Savaşı Tanımlamak, Terminolojik Bir Yaklaşım”, Avrasya Terim Dergisi, 1(2), 114-129.
  • Vinnakota T. (2013), “Understanding of Cyberspace Using Cybernetics: An Imperative need for Cybersecurity of Enterprises”, IEEEXplore, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6865791 (18.01.2016).
  • Viotti, Paul R. ve Kauppi, Mark V. (2014), Uluslararası İlişkiler ve Dünya Siyaseti, (Çev. Ayşe Özbay Erozan), Ankara: Nobel Yayıncılık.
  • Walt, Stephen M. (2003), “Güvenlik Çalışmalarının Rönesansı”, Avrasya Dosyası, 9(2), 71-107.
  • Wiener, Norbert (1948), Cybernetics, or Control and Communication in the Animal and the Machine, Cambridge: MIT Press.
  • Yılmaz, Sait (2006), 21. Yüzyılda Güvenlik ve İstihbarat, İstanbul: Alfa Yayınları.

ULUSLARARASI SİSTEM VE GÜVENLİK AÇISINDAN DEĞİŞEN SAVAŞ KURGUSU; SİBER SAVAŞ ÖRNEĞİ

Year 2017, Volume: 6 Issue: 2, 81 - 108, 15.11.2017
https://doi.org/10.28956/gbd.354150

Abstract



Devletler temel olarak çatışma halinde hareket
etmektedir ve bu eğilim sistemsel olarak farklı araçlara ihtiyaç duymaktadır.
Bu araçların çeşitlenmesi aslında gelişen dünyanın bir sonucudur. Altyapı
olarak da kendisini bu araçlara bağımlı kılan devletler yeni savaş konseptleri
oluşturmaktadır. Genellikle savaş-saldırı-çatışma gibi yaklaşımlarla ifade
edilen bu eğilimler siber ortamda da yerini almıştır. Siber savaş kavramının
tartışmalı niteliği kendi özelinde devam ettirilse de uluslararası politika dâhilindeki
varlığı artık dikkat çekici boyutlara ulaşmıştır. Çalışma dâhilinde siber savaş
örneği siber terörizm, siber politikalar, siber caydırıcılık gibi unsurlarla
temellendirilerek uluslararası ilişkilerdeki konumu açısından
değerlendirilmiştir.



References

  • Aral, Berdal (2007), “Asimetrik Saldırı Savaşları, Siyaset ve Uluslararası Hukuk”, Uluslararası İlişkiler Dergisi, 4(14), 39-83.
  • Arnold, Todd ve diğerleri (2013), “Professionalizing The Army’s Cyber Army’s Cyber Officer Force”, Army Cyber Center, http://www.gregconti.com/publications/pro_ cyber.pdf (13.04.2016).
  • Barnum, Sean (2014), “Standardizing Cyber Threat Intelligence Information with The Structured Threat Information Expression”, STIX Whitepaper, (1.1) http://stixproject.github.io/getting-started/whitepaper/ (12.04.2016).
  • Bayraktar, Gökhan (2015), Siber Savaş ve Ulusal Güvenlik Stratejisi, İstanbul: Yeniyüzyıl Yayınları.
  • Bendiek, Annegret ve Metzger, Tobias (2015), Deterrence Theory in the Cyber Security, Working Paper RD EU/Europe, Berlin: Research division/EU.
  • Bendrath, Ralf ve diğerleri (2007), “From ‘Cyberterrorism’ to ‘Cyberwar’, back and forth: How The United States Securitized Cyberspace”, Johan Eriksson ve Giampiero Giacomello (Ed.), International Relations and Security in The Digital Age, 1. Baskı içinde (57-83), New York: Routledge Publishing.
  • Bıçakçı, Salih (2012), “Yeni Savaş ve Siber Güvenlik Arasında NATO’nun Yeniden Doğuşu”, Uluslararası İlişkiler Dergisi, 9(34), 205-226.
  • Brown, Gary D., Tullow, Owen W. (2012), “On the Spectrum of Cyber Space Operations”, Small War Journals, http://smallwarsjournal.com/jrnl/art/on-the-spectrum-of-cyberspace-operations (04.02.2016).
  • Bucci, Steven (2009), “The Confluence of Cyber Crime and Terrorism”, Lecture#1123 on National Security and Defence, http://www.heritage.org/research/lecture/the-confluence-of-cyber-crime-and-terrorism (13.01.2016).
  • Burgess, Heidi ve Guy M. Burgess (1997), Encyclopedia of Conflict Resolution, California: ABC-CLIO, Santa Barbara, California.
  • Carr, Jeffrey (2012), Inside Cyber Warfare, 2nd Ed. Sebastopol: O’Reilly Publishing.
  • Caşın, Mesut Hakkı (2008), Uluslararası Terörizm, Ankara: Nobel Yayın Dağıtım.
  • Choucri, Nazli (2012), Cyberpolitics in International Relations, Cambridge: MIT Press.
  • Clarke, Richard A. ve Knake, Robert K. (2011), Siber Savaş: Ulusal Güvenliğe Yönelik Yeni Tehdit, (Çev. Murat Erduran), İstanbul: İKÜ Yayınevi.
  • Çakmak, Haydar ve Demir, Cenker Korhan (2009), “Siber Dünyadaki Tehdit ve Kavramlar”, Haydar Çakmak ve Taner Altınok (Ed.), Suç, Terör ve Savaş Üçgeninde Siber Dünya, 1. Baskı içinde (23-55), Anakara: Barış Platin Kitabevi.
  • Çifçi, Hasan (2013), Her Yönüyle Siber Savaş, Ankara: TÜBİTAK Bilim Kitapları.
  • Gallo, Giorgio ve Marzano, Arturo (2009), “The Dynamics of Asymmetric Conflicts: The Israeli-Palestinian Case”, The Journal of Conflict Studies, Volume 29.
  • Gray, Colin S. (2007), War, Peace and International Relations: An Introduction to Strategic History, New York: Routledge Publishing.
  • Gücüyener, Ayhan (2015), Enerji Güvenliğinde Yeni Bir Arayış, https://www.linkedin.com/pulse/enerji-güvenliğinde-yeni-bir-arayış-ayhan-gucuyener?forceNoSplash=true (15.06.2015).
  • Hayes, Richard E ve Alberts, David S. (1995), “Information Warfare and Deterrence: Appendix B. The Realm of Information Dominance: Beyond Information War”, Federation of American Scientists, http://fas.org/irp/threat/cyber/docs/iwd/appb .html (08.01.2016).
  • Hosein, Ian ve Eriksson, Johan (2007), “International Policy Dynamics and The Regulation of Dataflows: Bypassing Domestic Restrictions”, Johan Eriksson ve Giampiero Giacomello (Ed.), International Relations and Security in The Digital Age, 1. Baskı içinde (158-172), New York: Routledge Publishing.
  • İduğ Y. ve diğerleri (2013), “Siber Caydırıcılık ve Türkiye’nin İmkan ve Kabiliyeti”, 6. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı Bildiriler Kitabı, 1. Baskı içinde (287-290), Ankara: Bilgi Güvenliği Derneği.
  • Libicki, Martin C. (2007), Conquest in Cyberspace: National Security and Information Warfare, Cambridge: Cambridge University Press.
  • Libicki, Martin C. (2009), Cyberdeterrence and Cyberwar, Santa Monica: Rand Corporation.
  • Little, Richard (2007), The Balance of Power in International Relations: Metaphors, Myths and Models, Cambridge: Cambridge University Press.
  • Lupovici, Amir (2011), “Cyber Warfare and Deterrence: Trends and Challenges in Research”, Military and Strategic Affairs, 3(3), 49-62.
  • Merrick, Kathryn ve diğerleri (2016), “A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios”, Future Internet, 8 (3), 1-29.
  • Nye, Joseph S. (2010), Cyber Power, Cambridge: Harvard Kennedy School, Belfer Center for Science and International Affairs.
  • Passeri, Paolo (2016), “June 2016 Cyber Attacks Statistics”, Hackmageddon Information Security Timelines and Statistics, http://www.hackmageddon.com/2016/07/25/16-30-june-2016-cyber-attacks-statistics/ (03.06.2016).
  • Rawnsley, Gary D. (2008), “The Laws of The Playground: Information Warfare and Propaganda Across The Taiwan Strait”, Athina Karatzogianni (Ed.), Cyber Conflict and Global Politics, 1. Baskı içinde (79-94), London: Routledge Chapman Hall.
  • Singer, P.W. ve Friedman, Allan (2015), Siber Güvenlik ve Siber Savaş, (Çev. Ali Atav), Ankara: Buzdağı Yayınları.
  • Sönmezoğlu, Faruk (2014), Uluslararası Politika ve Dış Poltika Analizi, 6. Baskı, Der İstanbul: Der Yayınları.
  • Stevens, Tim (2012), “A Cyberwar of Ideas? Deterrence and Norms in Cyberspace”, Contemporary Security Policy, 33(1), 148-170.
  • Stone, John (2012), “Cyber War will Take Place”, Journal of Strategic Studies, 36(1), 101-108.
  • The Statistics Portal (2016a), “Amount of Monetary Damage Caused by Reported Cyber Crime to the IC3 from 2001 to 2015”, http://www.statista.com/statistics/267132/total-damage-caused-by-by-cyber-crime-in-the-us/ (03.05.2016).
  • Toptaş, Ergüder (2009), 21. Yüzyılda Savaş, Ankara: Kripto Yayınları.
  • United States Government Accountability Office (2010), Briefing to the Subcommittee on Terrorism: Unconventional Threats and Capabilities, Washington DC: Committee on Armed Services, House of Representatives.
  • Varlık, Ali Bilgin (2013), “Savaşı Tanımlamak, Terminolojik Bir Yaklaşım”, Avrasya Terim Dergisi, 1(2), 114-129.
  • Vinnakota T. (2013), “Understanding of Cyberspace Using Cybernetics: An Imperative need for Cybersecurity of Enterprises”, IEEEXplore, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6865791 (18.01.2016).
  • Viotti, Paul R. ve Kauppi, Mark V. (2014), Uluslararası İlişkiler ve Dünya Siyaseti, (Çev. Ayşe Özbay Erozan), Ankara: Nobel Yayıncılık.
  • Walt, Stephen M. (2003), “Güvenlik Çalışmalarının Rönesansı”, Avrasya Dosyası, 9(2), 71-107.
  • Wiener, Norbert (1948), Cybernetics, or Control and Communication in the Animal and the Machine, Cambridge: MIT Press.
  • Yılmaz, Sait (2006), 21. Yüzyılda Güvenlik ve İstihbarat, İstanbul: Alfa Yayınları.
There are 43 citations in total.

Details

Journal Section Articles
Authors

Vahit Güntay

Publication Date November 15, 2017
Submission Date November 16, 2017
Published in Issue Year 2017 Volume: 6 Issue: 2

Cite

APA Güntay, V. (2017). ULUSLARARASI SİSTEM VE GÜVENLİK AÇISINDAN DEĞİŞEN SAVAŞ KURGUSU; SİBER SAVAŞ ÖRNEĞİ. Güvenlik Bilimleri Dergisi, 6(2), 81-108. https://doi.org/10.28956/gbd.354150

2434714728147311473929833


This journal is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License29846