Weaponization of computers

Research output: Book chapter/Published conference paperChapter in textbook/reference bookpeer-review

1 Citation (Scopus)

Abstract

This chapter examines how computers hardware and software can be weaponized. It draws analogies with other items of common use and shows how, why and by whom cyber technology is weaponization. It concludes with a discussion of the implications for policy and ramifications for practice.
Original languageEnglish
Title of host publicationCyber weaponry
Subtitle of host publicationIssues and implications of digital arms
EditorsHenry Prunckun
Place of PublicationCham, Switzerland
PublisherSpringer
Chapter1
Pages1-12
Number of pages12
ISBN (Electronic)9783319741079
ISBN (Print)9783319741062
DOIs
Publication statusPublished - 2018

Publication series

NameAdvanced Sciences and Technologies for Security Applications
PublisherSpringer
ISSN (Electronic)1613-5113

Fingerprint

Dive into the research topics of 'Weaponization of computers'. Together they form a unique fingerprint.

Cite this