Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Air gaps (1)
- Attribution (1)
- Causation (1)
- Critical infrastructure (1)
- Cyber attack (1)
-
- Cyberattack (1)
- Cybersecurity (1)
- Cyberwar (1)
- Cyberwarfare (1)
- Cyberweapons (1)
- Digital technologies (1)
- Digital warfare (1)
- Diminishing returns (1)
- Economies of scale (1)
- Efficiencies (1)
- Geneva Convention (1)
- Heterogeneity of consumer preference (1)
- Independent Group of Experts (IGE) (1)
- International humanitarian law (1)
- Jus ad bellum (1)
- Jus in bello (1)
- Kill switches (1)
- Law of armed conflict (1)
- Law of war (1)
- Laws of war (1)
- Metcalfe’s Law (1)
- Moore’s Law (1)
- National security (1)
- Network economic effects (1)
- Protocols (1)
Articles 1 - 3 of 3
Full-Text Articles in Law
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
All Faculty Scholarship
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
All Faculty Scholarship
Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.