This chapter examines how computers hardware and software can be weaponized. It draws analogies with other items of common use and shows how, why and by whom cyber technology is weaponization. It concludes with a discussion of the implications for policy and ramifications for practice.
|Title of host publication||Cyber weaponry|
|Subtitle of host publication||Issues and implications of digital arms|
|Place of Publication||Cham, Switzerland|
|Number of pages||12|
|Publication status||Published - 2018|
|Name||Advanced Sciences and Technologies for Security Applications|