Cyber Security without Cyber War

被引:35
|
作者
O'Connell, Mary Ellen [1 ]
机构
[1] Univ Notre Dame, Law & Res, Notre Dame, IN 46556 USA
来源
JOURNAL OF CONFLICT & SECURITY LAW | 2012年 / 17卷 / 02期
关键词
D O I
10.1093/jcsl/krs017
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Which government agency should have primary responsibility for the Internet? The USA seems to have decided this question in favour of the military-the US military today has the largest concentration of expertise and legal authority with respect to cyberspace. Those in the legal community who support this development are divided as to the appropriate legal rules to guide the military in its oversight of the Internet. Specialists on the international law on the use of force argue that with analogy and interpretation, current international law can be applied in a way that allows great freedom without sending the message that the USA is acting lawlessly when it comes to the Internet. Others reject this argument as unnecessary and potentially too restrictive. The USA need not observe international law rules, especially not with respect to the Internet. The way forward is to follow the Cold War strategy of threatening enemies with overwhelming force and preparing to act on these threats. This article also questions the application of international law on the use of force to the Internet. Rather than rejecting international law in general, however, the thesis here is that international law rules governing economic activity and communications are the relevant ones for activity on the Internet. Moving away from military analogy in general and Cold War deterrence in particular, will result in the identification and application of rules with a far better chance of keeping the Internet open and safer for all.
引用
收藏
页码:187 / 209
页数:23
相关论文
共 50 条
  • [21] Cyber Security Competencies - Cyber Security Education and Research in Finnish Universities
    Lehto, Martti
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 179 - 188
  • [22] National Cyber Security in South Africa: A Letter to the Minister of Cyber Security
    von Solms, Rossouw
    von Solms, Basie
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 369 - 374
  • [23] What kind of cyber security? Theorising cyber security and mapping approaches
    Fichtner, Laura
    INTERNET POLICY REVIEW, 2018, 7 (02):
  • [24] Cyber Security via Signaling Games: Toward a Science of Cyber Security
    Casey, William
    Morales, Jose A.
    Thomson Nguyen
    Spring, Jonathan
    Weaver, Rhiannon
    Wright, Evan
    Metcalf, Leigh
    Mishra, Bud
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 34 - 42
  • [25] What is 'Cyber Security'?: Differential Language of Cyber Security Across the Lifespan
    Jones, Simon L.
    Collins, Emily I. M.
    Levordashka, Ana
    Muir, Kate
    Joinson, Adam
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [26] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [27] Aviation cyber security: legal aspects of cyber threats
    Klenka, Michal
    JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 177 - 195
  • [28] Anti-War Era: The Need for Proactive Cyber Security
    Herpig, Sven
    CYBER SECURITY AND PRIVACY, 2013, 182 : 165 - 176
  • [29] A bibliometric analysis of cyber security and cyber forensics research
    Sharma, Deepak
    Mittal, Ruchi
    Sekhar, Ravi
    Shah, Pritesh
    Renz, Matthias
    RESULTS IN CONTROL AND OPTIMIZATION, 2023, 10
  • [30] Cyber Security of Cyber Physical Systems and Its Problems
    Journal of the Institute of Electrical Engineers of Japan, 2022, 142 (04): : 195 - 196