Eintrag weiter verarbeiten
Wired warfare 3.0: Protecting the civilian population during cyber operations
Gespeichert in:
Zeitschriftentitel: | International Review of the Red Cross |
---|---|
Personen und Körperschaften: | |
In: | International Review of the Red Cross, 101, 2019, 910, S. 333-355 |
Format: | E-Article |
Sprache: | Englisch |
veröffentlicht: |
Cambridge University Press (CUP)
|
Schlagwörter: |
author_facet |
Schmitt, Michael N. Schmitt, Michael N. |
---|---|
author |
Schmitt, Michael N. |
spellingShingle |
Schmitt, Michael N. International Review of the Red Cross Wired warfare 3.0: Protecting the civilian population during cyber operations Law Sociology and Political Science |
author_sort |
schmitt, michael n. |
spelling |
Schmitt, Michael N. 1816-3831 1607-5889 Cambridge University Press (CUP) Law Sociology and Political Science http://dx.doi.org/10.1017/s1816383119000018 <jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p> Wired warfare 3.0: Protecting the civilian population during cyber operations International Review of the Red Cross |
doi_str_mv |
10.1017/s1816383119000018 |
facet_avail |
Online Free |
finc_class_facet |
Rechtswissenschaft Soziologie |
format |
ElectronicArticle |
fullrecord |
blob:ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNy9zMTgxNjM4MzExOTAwMDAxOA |
id |
ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNy9zMTgxNjM4MzExOTAwMDAxOA |
institution |
DE-D275 DE-Bn3 DE-Brt1 DE-Zwi2 DE-D161 DE-Gla1 DE-Zi4 DE-15 DE-Pl11 DE-Rs1 DE-105 DE-14 DE-Ch1 DE-L229 |
imprint |
Cambridge University Press (CUP), 2019 |
imprint_str_mv |
Cambridge University Press (CUP), 2019 |
issn |
1816-3831 1607-5889 |
issn_str_mv |
1816-3831 1607-5889 |
language |
English |
mega_collection |
Cambridge University Press (CUP) (CrossRef) |
match_str |
schmitt2019wiredwarfare30protectingthecivilianpopulationduringcyberoperations |
publishDateSort |
2019 |
publisher |
Cambridge University Press (CUP) |
recordtype |
ai |
record_format |
ai |
series |
International Review of the Red Cross |
source_id |
49 |
title |
Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_unstemmed |
Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_full |
Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_fullStr |
Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_full_unstemmed |
Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_short |
Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_sort |
wired warfare 3.0: protecting the civilian population during cyber operations |
topic |
Law Sociology and Political Science |
url |
http://dx.doi.org/10.1017/s1816383119000018 |
publishDate |
2019 |
physical |
333-355 |
description |
<jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p> |
container_issue |
910 |
container_start_page |
333 |
container_title |
International Review of the Red Cross |
container_volume |
101 |
format_de105 |
Article, E-Article |
format_de14 |
Article, E-Article |
format_de15 |
Article, E-Article |
format_de520 |
Article, E-Article |
format_de540 |
Article, E-Article |
format_dech1 |
Article, E-Article |
format_ded117 |
Article, E-Article |
format_degla1 |
E-Article |
format_del152 |
Buch |
format_del189 |
Article, E-Article |
format_dezi4 |
Article |
format_dezwi2 |
Article, E-Article |
format_finc |
Article, E-Article |
format_nrw |
Article, E-Article |
_version_ |
1792331103930941445 |
geogr_code |
not assigned |
last_indexed |
2024-03-01T13:35:39.765Z |
geogr_code_person |
not assigned |
openURL |
url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Wired+warfare+3.0%3A+Protecting+the+civilian+population+during+cyber+operations&rft.date=2019-04-01&genre=article&issn=1607-5889&volume=101&issue=910&spage=333&epage=355&pages=333-355&jtitle=International+Review+of+the+Red+Cross&atitle=Wired+warfare+3.0%3A+Protecting+the+civilian+population+during+cyber+operations&aulast=Schmitt&aufirst=Michael+N.&rft_id=info%3Adoi%2F10.1017%2Fs1816383119000018&rft.language%5B0%5D=eng |
SOLR | |
_version_ | 1792331103930941445 |
author | Schmitt, Michael N. |
author_facet | Schmitt, Michael N., Schmitt, Michael N. |
author_sort | schmitt, michael n. |
container_issue | 910 |
container_start_page | 333 |
container_title | International Review of the Red Cross |
container_volume | 101 |
description | <jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p> |
doi_str_mv | 10.1017/s1816383119000018 |
facet_avail | Online, Free |
finc_class_facet | Rechtswissenschaft, Soziologie |
format | ElectronicArticle |
format_de105 | Article, E-Article |
format_de14 | Article, E-Article |
format_de15 | Article, E-Article |
format_de520 | Article, E-Article |
format_de540 | Article, E-Article |
format_dech1 | Article, E-Article |
format_ded117 | Article, E-Article |
format_degla1 | E-Article |
format_del152 | Buch |
format_del189 | Article, E-Article |
format_dezi4 | Article |
format_dezwi2 | Article, E-Article |
format_finc | Article, E-Article |
format_nrw | Article, E-Article |
geogr_code | not assigned |
geogr_code_person | not assigned |
id | ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNy9zMTgxNjM4MzExOTAwMDAxOA |
imprint | Cambridge University Press (CUP), 2019 |
imprint_str_mv | Cambridge University Press (CUP), 2019 |
institution | DE-D275, DE-Bn3, DE-Brt1, DE-Zwi2, DE-D161, DE-Gla1, DE-Zi4, DE-15, DE-Pl11, DE-Rs1, DE-105, DE-14, DE-Ch1, DE-L229 |
issn | 1816-3831, 1607-5889 |
issn_str_mv | 1816-3831, 1607-5889 |
language | English |
last_indexed | 2024-03-01T13:35:39.765Z |
match_str | schmitt2019wiredwarfare30protectingthecivilianpopulationduringcyberoperations |
mega_collection | Cambridge University Press (CUP) (CrossRef) |
physical | 333-355 |
publishDate | 2019 |
publishDateSort | 2019 |
publisher | Cambridge University Press (CUP) |
record_format | ai |
recordtype | ai |
series | International Review of the Red Cross |
source_id | 49 |
spelling | Schmitt, Michael N. 1816-3831 1607-5889 Cambridge University Press (CUP) Law Sociology and Political Science http://dx.doi.org/10.1017/s1816383119000018 <jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p> Wired warfare 3.0: Protecting the civilian population during cyber operations International Review of the Red Cross |
spellingShingle | Schmitt, Michael N., International Review of the Red Cross, Wired warfare 3.0: Protecting the civilian population during cyber operations, Law, Sociology and Political Science |
title | Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_full | Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_fullStr | Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_full_unstemmed | Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_short | Wired warfare 3.0: Protecting the civilian population during cyber operations |
title_sort | wired warfare 3.0: protecting the civilian population during cyber operations |
title_unstemmed | Wired warfare 3.0: Protecting the civilian population during cyber operations |
topic | Law, Sociology and Political Science |
url | http://dx.doi.org/10.1017/s1816383119000018 |