Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

Walden University

International law

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Law

Delphi Study Of International Cybersecurity Norms, Kenneth J. Biskner Jan 2022

Delphi Study Of International Cybersecurity Norms, Kenneth J. Biskner

Walden Dissertations and Doctoral Studies

Unregulated state cyberattacks are an urgent threat to international peace and security because of the costs they impose and the devastating effects they can create. However, international norms governing state cyberattacks (international cybersecurity norms) have not yet emerged. The lack of meaningful consequences for state cyberattacks, and the high rewards derived from them, incentivize states to engage in this new form of hostile conduct (cyberconflict). The problem addressed in this modified Delphi study was the persistent struggle between authoritarian and democratic states over competing international cybersecurity norms that cause cyberconflict to remain unregulated. Kingdon’s multiple streams framework was used as …


Attitudes On International Standards For Criminal Hacking In The Public And Private Sector, Melinda Shoemaker Jan 2020

Attitudes On International Standards For Criminal Hacking In The Public And Private Sector, Melinda Shoemaker

Walden Dissertations and Doctoral Studies

There is a current gap in the literature regarding uniform and consistent standards and policies for addressing criminal hacking at the international level. The purpose of this quantitative dissertation was to explore the relationship between individuals in the public and private sectors and their attitudes toward the need for international law defining criminal hacking and the penalties associated with the act. Since the advent of information and communication technologies, there has been a need to address security holistically. The security and sustainability of evolving technologies are examined in light of the threat landscape of criminal hacking, privacy concerns, and policies …