Matches in SemOpenAlex for { <https://semopenalex.org/work/W2766332463> ?p ?o ?g. }
Showing items 1 to 74 of
74
with 100 items per page.
- W2766332463 abstract "Malicious cyber-attacks, those cyber-attacks which do not rise to the level of force in international law, pose a significant problem to the international community. Attributing responsibility for malicious cyber-attacks is imperative if states are to respond and prevent the attacks from continuing. Unfortunately, due to both technical and legal issues attributing malicious cyber-attacks to the responsible state or non-state actor is difficult if not impossible in the vast majority of attacks. Even if an injured state may recursively trace the malicious cyber-attack to the responsible IP address, this is not enough under the current international customary law to hold a state or non-state actor responsible for the cyber-attack as it is virtually impossible to bridge the air gap between the computer system and end user to demonstrate affirmatively who initiated the attack. Even if a state could demonstrate the identity of the end user that initiated the attack, this is not enough to link the end user to the state for responsibility to lie under existing customary international law. As such this study was conducted to analyze the issue of malicious cyber-attacks as a matter of customary international law to ascertain mechanism to hold states responsible for malicious cyber-attacks which originate from a state’s sovereign territory. Specifically, this study addresses the issue of legal and technical attribution of malicious cyber-attacks for the purposes of holding states responsible for those attacks.This study argues that under existing customary international law attributing malicious cyber-attacks for the purpose of ascertaining state responsibility is difficult if not impossible. As such, this study proposes alternative theories, which already exist within customary international law, for holding states responsible for malicious cyber-attacks which originate from their sovereign territory. This study addresses alternative theories of state responsibility existing in customary international law such as those put forth in Trail Smelter and Corfu Channel and the theory of strict liability for ultra-hazardous activities. In addition, this study addresses the theory of indirect responsibility, the duty to prevent harm, and due diligence in cyber-space. Lastly this study analysis the impact of the post-9/11 invasion of Afghanistan by the United States and NATO forces and determines that a burgeoning rule of attribution may be present which would impact the attribution of malicious cyber-attacks to states.This study makes an original and important addition to the corpus of international law by addressing the issues of technical and legal attribution, state responsibility, and the duty to prevent malicious cyber-attacks as a matter of customary international law. This study is needed; malicious cyber-attacks implicate international law, as the majority are interstate in nature. However, international law currently has no paradigm, per se, in place to effectively deal with the issue of malicious cyber-attacks." @default.
- W2766332463 created "2017-11-10" @default.
- W2766332463 creator A5001197620 @default.
- W2766332463 date "2017-01-01" @default.
- W2766332463 modified "2023-09-27" @default.
- W2766332463 title "Attribution, State Responsibility, and the Duty to Prevent Malicious Cyber-Attacks in International Law" @default.
- W2766332463 doi "https://doi.org/10.2139/ssrn.3056832" @default.
- W2766332463 hasPublicationYear "2017" @default.
- W2766332463 type Work @default.
- W2766332463 sameAs 2766332463 @default.
- W2766332463 citedByCount "0" @default.
- W2766332463 crossrefType "journal-article" @default.
- W2766332463 hasAuthorship W2766332463A5001197620 @default.
- W2766332463 hasConcept C108827166 @default.
- W2766332463 hasConcept C11413529 @default.
- W2766332463 hasConcept C144133560 @default.
- W2766332463 hasConcept C171769113 @default.
- W2766332463 hasConcept C17744445 @default.
- W2766332463 hasConcept C185436325 @default.
- W2766332463 hasConcept C186229450 @default.
- W2766332463 hasConcept C199539241 @default.
- W2766332463 hasConcept C201307755 @default.
- W2766332463 hasConcept C2778042224 @default.
- W2766332463 hasConcept C2779872411 @default.
- W2766332463 hasConcept C2779921323 @default.
- W2766332463 hasConcept C38652104 @default.
- W2766332463 hasConcept C41008148 @default.
- W2766332463 hasConcept C48103436 @default.
- W2766332463 hasConcept C55447825 @default.
- W2766332463 hasConcept C94625758 @default.
- W2766332463 hasConceptScore W2766332463C108827166 @default.
- W2766332463 hasConceptScore W2766332463C11413529 @default.
- W2766332463 hasConceptScore W2766332463C144133560 @default.
- W2766332463 hasConceptScore W2766332463C171769113 @default.
- W2766332463 hasConceptScore W2766332463C17744445 @default.
- W2766332463 hasConceptScore W2766332463C185436325 @default.
- W2766332463 hasConceptScore W2766332463C186229450 @default.
- W2766332463 hasConceptScore W2766332463C199539241 @default.
- W2766332463 hasConceptScore W2766332463C201307755 @default.
- W2766332463 hasConceptScore W2766332463C2778042224 @default.
- W2766332463 hasConceptScore W2766332463C2779872411 @default.
- W2766332463 hasConceptScore W2766332463C2779921323 @default.
- W2766332463 hasConceptScore W2766332463C38652104 @default.
- W2766332463 hasConceptScore W2766332463C41008148 @default.
- W2766332463 hasConceptScore W2766332463C48103436 @default.
- W2766332463 hasConceptScore W2766332463C55447825 @default.
- W2766332463 hasConceptScore W2766332463C94625758 @default.
- W2766332463 hasLocation W27663324631 @default.
- W2766332463 hasOpenAccess W2766332463 @default.
- W2766332463 hasPrimaryLocation W27663324631 @default.
- W2766332463 hasRelatedWork W1975780100 @default.
- W2766332463 hasRelatedWork W2487784979 @default.
- W2766332463 hasRelatedWork W2519973796 @default.
- W2766332463 hasRelatedWork W2529262763 @default.
- W2766332463 hasRelatedWork W2561059065 @default.
- W2766332463 hasRelatedWork W2589468398 @default.
- W2766332463 hasRelatedWork W2728619516 @default.
- W2766332463 hasRelatedWork W2773123243 @default.
- W2766332463 hasRelatedWork W2959733027 @default.
- W2766332463 hasRelatedWork W2967436886 @default.
- W2766332463 hasRelatedWork W2995245159 @default.
- W2766332463 hasRelatedWork W3097267065 @default.
- W2766332463 hasRelatedWork W3100241813 @default.
- W2766332463 hasRelatedWork W3121288313 @default.
- W2766332463 hasRelatedWork W3123248919 @default.
- W2766332463 hasRelatedWork W3123603510 @default.
- W2766332463 hasRelatedWork W3178387577 @default.
- W2766332463 hasRelatedWork W600317746 @default.
- W2766332463 hasRelatedWork W874857290 @default.
- W2766332463 hasRelatedWork W1731323768 @default.
- W2766332463 isParatext "false" @default.
- W2766332463 isRetracted "false" @default.
- W2766332463 magId "2766332463" @default.
- W2766332463 workType "article" @default.