Book contents
- Security in the Cyber Age
- Reviews
- Security in the Cyber Age
- Copyright page
- Epigraph
- Contents
- Boxes
- Preface
- Acknowledgments
- Introduction
- 1 The Emergence of Cyberspace and Its Implications
- 2 From the Abacus to the Computer
- 3 Communicating through Cyberspace
- 4 The Human Dimensions of Cyberspace
- 5 Strategy and Cyberspace
- 6 Domestic Regulation of Cyberspace
- 7 Internet Governance and International Institutions
- 8 International Law and Norms in Cyberspace
- 9 Artificial Intelligence and Ethics
- 10 Conclusions and Future Directions of Cybersecurity Policy
- 11 Leading in the Cyber Age
- Glossary
- References
- Index
8 - International Law and Norms in Cyberspace
Published online by Cambridge University Press: 02 November 2023
- Security in the Cyber Age
- Reviews
- Security in the Cyber Age
- Copyright page
- Epigraph
- Contents
- Boxes
- Preface
- Acknowledgments
- Introduction
- 1 The Emergence of Cyberspace and Its Implications
- 2 From the Abacus to the Computer
- 3 Communicating through Cyberspace
- 4 The Human Dimensions of Cyberspace
- 5 Strategy and Cyberspace
- 6 Domestic Regulation of Cyberspace
- 7 Internet Governance and International Institutions
- 8 International Law and Norms in Cyberspace
- 9 Artificial Intelligence and Ethics
- 10 Conclusions and Future Directions of Cybersecurity Policy
- 11 Leading in the Cyber Age
- Glossary
- References
- Index
Summary
Chapter 8 explores the application of international law and norms in cyberspace. It examines law that governs use of force in international politics, the types of weapons that can be developed and used in armed conflict, how combatants engage in conflict on the battlefield, and when individuals can be held criminally accountable for violating these rules. Some governments classify a cyber operation as equivalent to a use of force or form of warfare only if it produces physical destruction or death, while others declare a cyber operation to be an attack when the targeted system loses its ability to function. Finally, the chapter considers how to develop and encourage the adoption of cyberspace norms for governmental behavior and set expectations for states to regulate illicit cyber activity within their borders.
- Type
- Chapter
- Information
- Security in the Cyber AgeAn Introduction to Policy and Technology, pp. 226 - 252Publisher: Cambridge University PressPrint publication year: 2023