2020
DOI: 10.1007/978-3-030-29053-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Norms of Responsible State Behaviour in Cyberspace

Abstract: Cyberspace has witnessed a 'militarisation' as a growing number of states engage in a variety of cyber operations directed against foreign entities. The rate of this militarisation has outstripped the diplomatic efforts undertaken to provide this unique environment with some 'rules of the road'. The primary mechanism for discussing possible norms of responsible state behaviour has been a series of UN Groups of Governmental Experts, which have produced three consensus reports over the last decade. The 2015 repo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Moreover, it asserts that it considered how International Law applies to the use of ICTs by States [42] but a thorough lecture and analysis does not reveal clearer issues than the previous ones. The 2015 Report also contains a series of recommendations [43], as voluntary norms, rules and principles for the States' behaviour in Cyberspace. That was the maximum result of the UN GGE because in 2017 it ended in a deadlock as it was not able to adopt a consensus report [44].…”
Section: Overview Of the Relevant Conclusion Of The Un Ggementioning
confidence: 99%
“…Moreover, it asserts that it considered how International Law applies to the use of ICTs by States [42] but a thorough lecture and analysis does not reveal clearer issues than the previous ones. The 2015 Report also contains a series of recommendations [43], as voluntary norms, rules and principles for the States' behaviour in Cyberspace. That was the maximum result of the UN GGE because in 2017 it ended in a deadlock as it was not able to adopt a consensus report [44].…”
Section: Overview Of the Relevant Conclusion Of The Un Ggementioning
confidence: 99%
“…On the one hand, China has officially promoted international initiatives for regulating hostile state-run activities in cyberspace, and to fill the existing regulatory gap for state behaviour in this domain (Ku 2017;Austin 2016;Taddeo 2012;Taddeo 2016). For example, China co-sponsored the International Code of Conduct for Information Security at the UN General Assembly in September 2011, which sought a commitment against using information technologies in acts of aggression and has provided continued support for dialogue by the UN Group of Government Experts in preventing cyber conflicts (Meyer 2020). On the other hand, China has also run cyber operations targeting US infrastructure and aiming at extracting commercial and scientific information as well as acquiring relevant intelligence against several countries, including Australia, Philippines, Hong Kong, and the US.…”
Section: International Competitionmentioning
confidence: 99%
“…An important distinction is often made in this literature between the ethical issues related to state or national cybersecurity and those related to civil or commercial cybersecurity. The former grouping includes issues such as cyberwarfare and state-sponsored cyber-surveillance, which are typically discussed in terms of just war theory, state sovereignty, international relations, and national security ( Meyer, 2020 ;Schlehahn, 2020 ). In contrast, the latter includes issues such as the hacking of commercial entities or end users, which are not typically discussed in such terms and which raise a different set of ethical issues ( Nissenbaum, 2005 ;2011 ).…”
Section: Approaches To Cybersecurity Ethicsmentioning
confidence: 99%
“…To focus our discussion, we limit ourselves to the ethical issues raised by computer or information security in the context of civil or commercial cybersecurity where issues such as just war theory, state sovereignty and national security are not central. We thus omit discussion of state cybersecurity cases (but for a treatment of such cases see: Efrony and Shany, 2018 ;Macnish, 2018 ;Manjikian, 2018 ;Meyer, 2020 ;Schlehahn, 2020 ;Stevens, 2020 ). Cybersecurity within a civil or commercial context encompasses not only threats to infrastructure that stores commercial or user data, but also an ancillary set of financial, psychological, and social harms associated with the everyday use of information and communications technologies.…”
Section: Approaches To Cybersecurity Ethicsmentioning
confidence: 99%