Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cyber (2)
- Cybersecurity (2)
- Internet (2)
- Jus ad bellum (2)
- Jus in bello (2)
-
- Law of armed conflict (2)
- Air gaps (1)
- Armed conflict (1)
- Attacks (1)
- Attribution (1)
- Audit Committee (1)
- Board Structure (1)
- Causation (1)
- Computer Law (1)
- Computers (1)
- Conflict (1)
- Corporate Governance (1)
- Corporations (1)
- Crime (1)
- Critical infrastructure (1)
- Cyber attack (1)
- Cyber-terrorism (1)
- Cyberattack (1)
- Cyberattacks (1)
- Cybercrimes (1)
- Cyberwar (1)
- Cyberwarfare (1)
- Cyberweapons (1)
- DHS (1)
- Data Breach (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Military, War, and Peace
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
All Faculty Scholarship
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …
Managing Cyberthreat, Lawrence J. Trautman
Managing Cyberthreat, Lawrence J. Trautman
Lawrence J. Trautman Sr.
Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.