Matches in SemOpenAlex for { <https://semopenalex.org/work/W50556705> ?p ?o ?g. }
Showing items 1 to 84 of
84
with 100 items per page.
- W50556705 startingPage "1571" @default.
- W50556705 abstract "I. Introduction This Article will expand the Symposium's dialogue on law, technology, and national security in two ways: first, by examining the intersection of those three subjects through the optic of public international law versus domestic statutes, regulations, or case law; and second, by providing broader context for the related legal and policy challenges that are simultaneously confronting many countries. A global perspective on these issues is essential because no single nation's declaratory policy or legal interpretations will be binding on the international community. Moreover, law will be but one factor in determining how nation-states ultimately manage cyber conflicts among themselves in the future. Efforts to analyze information warfare under international law began in the 1990s,1 and since then, numerous governmental, military, academic, and corporate commentators around the world have expressed their personal or organizational views.2 However, the international community itself has yet to reach collective conclusions regarding many aspects of law in cyberspace, including what constitutes an act of aggression or use of force in cyberspace.3 Those legal ambiguities are only exacerbated by the technological limitations that currently preclude definitive attribution of cyber events within the timeframe that would be required for nationalcommand-authority decisions in the face of genuine military attacks.4 With those dual uncertainties - legal and practical - in mind, states are striving to protect their national security interests and critical infrastructures. The threefold objectives of this Article are to (1) elucidate how cyberspace and cyber conflicts are currently being considered by sovereign governments, (2) identify related and unresolved areas of public international law, and (3) describe the strategic dynamic of state practice as it pertains to cyberspace. This Article will not, on the other hand, review the secondary literature in detail, evaluate the legal arguments of any specific nation, or offer a comprehensive framework from the internationalist perspective. The purpose herein is to raise awareness of - rather than critique - the sovereign decisions that are being made within national governments and multilateral organizations as well as their potential impact. Accordingly, the normative discussion will be limited to a single, preambulary admonition that government and military officials in every nation should have the requisite knowledge to be fully cognizant of the international legal ramifications of the actions they take.5 Without such circumspection, they may inadvertently set precedents that could lead to increased insecurity for their own countries and the global community at large.6 II. Territorial Sovereignty A. Misnomer of a Virtual Jurisdiction Although some futurists might argue that cyberspace constitutes a realm unto itself which exists beyond all territorial boundaries and cannot be regulated, nation-states do strive to exercise their sovereignty over cyberspace - albeit ineffectively at times.7 The physical location of actors, victims, and the technical nodes that connect them are of central importance because governments continue to address cyber conflicts involving both state and nonstate actors as matters to be resolved by sovereign powers under their respective legal systems or through bilateral or multilateral agreements with other governments.8 In the case of cybercrime, for instance, those events that cannot be adequately investigated by local law enforcement authorities or fully prosecuted under domestic criminal systems find recourse to transnational judicial cooperation via mutual-legal-assistance treaties and multilateral organizations, such as the International Criminal Police Organization (INTERPOL).9 Furthermore, the nature of the international legal system affords this sovereign-centric approach primacy under the United Nations (U. …" @default.
- W50556705 created "2016-06-24" @default.
- W50556705 creator A5009159498 @default.
- W50556705 date "2010-06-01" @default.
- W50556705 modified "2023-09-23" @default.
- W50556705 title "Sovereign Discourse on Cyber Conflict under International Law" @default.
- W50556705 hasPublicationYear "2010" @default.
- W50556705 type Work @default.
- W50556705 sameAs 50556705 @default.
- W50556705 citedByCount "5" @default.
- W50556705 countsByYear W505567052012 @default.
- W50556705 countsByYear W505567052015 @default.
- W50556705 countsByYear W505567052017 @default.
- W50556705 countsByYear W505567052021 @default.
- W50556705 crossrefType "journal-article" @default.
- W50556705 hasAuthorship W50556705A5009159498 @default.
- W50556705 hasConcept C110875604 @default.
- W50556705 hasConcept C136764020 @default.
- W50556705 hasConcept C144024400 @default.
- W50556705 hasConcept C151730666 @default.
- W50556705 hasConcept C17319257 @default.
- W50556705 hasConcept C17744445 @default.
- W50556705 hasConcept C185436325 @default.
- W50556705 hasConcept C186229450 @default.
- W50556705 hasConcept C190253527 @default.
- W50556705 hasConcept C199539241 @default.
- W50556705 hasConcept C2779343474 @default.
- W50556705 hasConcept C2779921323 @default.
- W50556705 hasConcept C2781241145 @default.
- W50556705 hasConcept C41008148 @default.
- W50556705 hasConcept C528167355 @default.
- W50556705 hasConcept C55447825 @default.
- W50556705 hasConcept C67497173 @default.
- W50556705 hasConcept C86803240 @default.
- W50556705 hasConcept C94625758 @default.
- W50556705 hasConceptScore W50556705C110875604 @default.
- W50556705 hasConceptScore W50556705C136764020 @default.
- W50556705 hasConceptScore W50556705C144024400 @default.
- W50556705 hasConceptScore W50556705C151730666 @default.
- W50556705 hasConceptScore W50556705C17319257 @default.
- W50556705 hasConceptScore W50556705C17744445 @default.
- W50556705 hasConceptScore W50556705C185436325 @default.
- W50556705 hasConceptScore W50556705C186229450 @default.
- W50556705 hasConceptScore W50556705C190253527 @default.
- W50556705 hasConceptScore W50556705C199539241 @default.
- W50556705 hasConceptScore W50556705C2779343474 @default.
- W50556705 hasConceptScore W50556705C2779921323 @default.
- W50556705 hasConceptScore W50556705C2781241145 @default.
- W50556705 hasConceptScore W50556705C41008148 @default.
- W50556705 hasConceptScore W50556705C528167355 @default.
- W50556705 hasConceptScore W50556705C55447825 @default.
- W50556705 hasConceptScore W50556705C67497173 @default.
- W50556705 hasConceptScore W50556705C86803240 @default.
- W50556705 hasConceptScore W50556705C94625758 @default.
- W50556705 hasIssue "7" @default.
- W50556705 hasLocation W505567051 @default.
- W50556705 hasOpenAccess W50556705 @default.
- W50556705 hasPrimaryLocation W505567051 @default.
- W50556705 hasRelatedWork W2031284714 @default.
- W50556705 hasRelatedWork W2078121827 @default.
- W50556705 hasRelatedWork W208250531 @default.
- W50556705 hasRelatedWork W208509966 @default.
- W50556705 hasRelatedWork W217909396 @default.
- W50556705 hasRelatedWork W2258780682 @default.
- W50556705 hasRelatedWork W2481160384 @default.
- W50556705 hasRelatedWork W2500936479 @default.
- W50556705 hasRelatedWork W2956696471 @default.
- W50556705 hasRelatedWork W3090130032 @default.
- W50556705 hasRelatedWork W3124724066 @default.
- W50556705 hasRelatedWork W3125074536 @default.
- W50556705 hasRelatedWork W3125178143 @default.
- W50556705 hasRelatedWork W3125509309 @default.
- W50556705 hasRelatedWork W3125843258 @default.
- W50556705 hasRelatedWork W3126090640 @default.
- W50556705 hasRelatedWork W3127395443 @default.
- W50556705 hasRelatedWork W3200973317 @default.
- W50556705 hasRelatedWork W750634472 @default.
- W50556705 hasRelatedWork W3122972680 @default.
- W50556705 hasVolume "88" @default.
- W50556705 isParatext "false" @default.
- W50556705 isRetracted "false" @default.
- W50556705 magId "50556705" @default.
- W50556705 workType "article" @default.