Economic Information Warfare: Feasibility and Legal Considerations for Cyber-Operations Targeting Commodity Value Chains

Abstract:

With the increasing prevalence of cyberattacks and the drive for hyper-connected digital economies, there is a growing probability that national economies will be directly affected by cy- berattacks. There is also a growing consideration of vulnerabilities in the physical transportation infrastructure, which is comprised of a number of interlinking components that enable international trade in raw materials and consumer goods, known as commodity value chains. Through the use of scenario analysis and document analysis, this article investigates the feasibility and legal considerations of cyberattacks to target commodity value chains in order to further or protect national interests.


AUTHORS

Photo of Dr. Brett van Niekerk

School of Management, IT and Governance University of KwaZulu-Natal
South Africa

Dr Brett van Niekerk is currently a senior lecturer in computer science at the University of KwaZulu-Natal, and previously was a senior information security analyst at Transnet. He has 10 years’ experience in information security, cybersecurity and information operations spanning academia, industry and civil society. He serves as secretary for the International Federation of Information Processing Working Group 9.10 on ICT in Peace and War, co-Editor-in-Chief of the International Journal of Cyber Warfare and Terrorism, Associate Editor for the International Journal of Information Security and Privacy, on the international advisory board for the Journal of Information Warfare, as a reviewer for multiple other international and local journal and conferences such as the International Conference on Cyber Warfare and Security and the European Conference on Cyber Warfare and Security. He previously served as ISACA South Africa’s Academic Relations Coordinator (2016-2018) and a contributor to the SABS working group for ISO/IEC 27000-series standards. In 2012 he graduated with his PhD and has subsequently completed two years of postdoctoral research into information warfare and critical infrastructure protection. He is an NRF rated researcher, and has made over 30 presentations at local and international conferences and has published ten book chapters and over 20 journal articles. He is a Certified Information Security Manager, achieving the third highest score in South Africa in the December 2014 exam period. In 2018 he was award ISACA South Africa’s contribution award for his work in information security and cybersecurity.

 

Photo of Dr. Trishana Ramluckan

School of Law University of KwaZulu-Natal Durban,
South Africa

Dr. Trishana Ramluckan is an academic and researcher in the Information Technology and Governance field and has worked in the Higher Education sector for the past 12 years. In 2017 she graduated with a Doctor of Administration degree in Information Systems &Technology and Public Administration, School of Management, IST and Governance from the University of KwaZulu-Natal. She is currently a Post-Doctoral Researcher in International Cyber Law at the University of KwaZulu-Natal’s School of Law. Further to this, she serves on the International Federation for Information Processing (IFIP) working group 9.10 on ICT uses in Peace and War and the Global Commission on the Stability of Cyberspace (GCSC) Research Advisory Group (RAG). She has contributed to the SABS working group for ISO/IEC standards for information security and is an ISACA South Africa Chapter Academic Advocate at UKZN. She is a reviewer for the International Journal of Cyber Warfare and Terrorism, the Journal of Contemporary Management, the annual International Conference on Cyber Warfare and Security and the annual European Conference on Cyber Warfare and Security. Her research areas include IT Governance and International Relations.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com