Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1)
- Databases and Information Systems (1)
- Defense and Security Studies (1)
- Engineering (1)
- International Relations (1)
-
- Law (1)
- Management Information Systems (1)
- Military and Veterans Studies (1)
- Organizational Behavior and Theory (1)
- Other Computer Sciences (1)
- Other Political Science (1)
- Peace and Conflict Studies (1)
- Physical Sciences and Mathematics (1)
- Policy Design, Analysis, and Evaluation (1)
- Political Science (1)
- Political Theory (1)
- Public Affairs (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Risk Analysis (1)
Articles 1 - 2 of 2
Full-Text Articles in Social and Behavioral Sciences
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Jan Kallberg
Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …