TITLE

CYBER WARS: APPLYING CONVENTIONAL LAWS OF WAR TO CYBER WARFARE AND NON-STATE ACTORS

AUTHOR(S)
Roberts, Shaun
PUB. DATE
July 2014
SOURCE
Northern Kentucky Law Review;2014, Vol. 41 Issue 3, p535
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article focuses on the role of conventional laws of warfare in the regulation of cyber warfare. Topics discussed include laws for the regulation of damages caused due to cyber warfare and cyber attacks, the role of the cyber attacks in hampering the communication thus causing destruction, and the importance of the international law of wars for the cyber attacks.
ACCESSION #
99856499

 

Related Articles

  • ARMED WITH A KEYBOARD: PRESIDENTIAL DIRECTIVE 20, CYBER-WARFARE, AND THE INTERNATIONAL LAWS OF WAR. RINEAR, MATTHEW // Capital University Law Review;Summer2015, Vol. 43 Issue 3, p679 

    The article discusses American government cyberspace security measures in relation to U.S. President Barack Obama's issuance of Presidential Policy Directive 20 on cyber-warfare in October 2012 and the international laws of war. America's National Security Agency (NSA) and military cyber...

  • HACKING CYBER STOVEPIPES. Maier, Matthew; Cook, Jerry // Army AL&T Magazine;Jan-Mar2015, p10 

    The article discusses the holistic approach adopted by the U.S. Army acquisition, logistics and technology (ALT) to meet the demand for cyber expertise. Topics discussed include the military vision for Army Cyberspace operations, creation of a career management field focused on developing cyber...

  • Understanding People. Farris, Stuart L. // Army Magazine;Dec2015, Vol. 65 Issue 12, p33 

    In the article, the author discusses the things that are necessary to win a war. He claims that dominating air warfare, as well as cyber warfare are necessary to have a competitive advantage over adversaries. He also explains the importance of winning the human domain in order to effectively win...

  • SILENCING THE CALL TO ARMS: A SHIFT AWAY FROM CYBER ATTACKS AS WARFARE. Patterson, Ryan // Loyola of Los Angeles Law Review;Spring2015, Vol. 48 Issue 3, p969 

    Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the...

  • Cyberspace from the Hybrid Threat Perspective. Gunneriusson, HÃ¥kan; Ottis, Rain // Proceedings of the European Conference on Information Warfare & ;2013, p98 

    Hybrid threats use conventional and unconventional means to achieve their goals. In this paper we explore the cyber threats as one possible aspect of hybrid threats. We describe three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional...

  • UNPUNISHED INSULTS--THE LOOMING CYBER BARBARY WARS. Martemucci, Matteo G. // Case Western Reserve Journal of International Law;Spring2015, Vol. 47 Issue 3, p53 

    This article argues that while current cyber literature focuses on cyber crime and cyber war, policy makers do not treat the most damaging cyber activity--large-scale economic espionage--in a manner commensurate with its importance. The threat from nation-states like China is real, and it...

  • SHOW ME ON THE MAP WHERE THEY HACKED YOU: CYBERWAR AND THE GEOSPATIAL INTERNET DOCTRINE. Sauter, Molly // Case Western Reserve Journal of International Law;Spring2015, Vol. 47 Issue 3, p63 

    Using metaphor theory as presented by George Lakoff and Mark Johnson, this paper presents four conceptual metaphors found in international internet policy documents. This paper argues that these four metaphors encourage the development of a fractured infrastructure, national internets, the...

  • TALKING FOREIGN POLICY: A DISCUSSION ON CYBER WARFARE.  // Case Western Reserve Journal of International Law;Spring2015, Vol. 47 Issue 3, p319 

    Talking Foreign Policy is a production of Case Western Reserve University and is produced in partnership with 90.3 FM WCPN ideastream, Cleveland's NPR affiliate. Produced quarterly, the program is hosted by Case Western Reserve University School of Law Interim Dean Michael Scharf, and focuses on...

  • By Disanalogy, Cyberwarfare Is Utterly New. Bringsjord, Selmer; Licato, John // Philosophy & Technology;Sep2015, Vol. 28 Issue 3, p339 

    We provide an underlying theory of argument by disanalogy, in order to employ it to show that cyberwarfare is fundamentally new (relative to traditional kinetic warfare, and espionage). Once this general case is made, the battle is won: we are well on our way to establishing our main thesis:...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics