网络和平法

Scott J. Shackelford
{"title":"网络和平法","authors":"Scott J. Shackelford","doi":"10.2139/SSRN.2805061","DOIUrl":null,"url":null,"abstract":"Increasing and worthwhile attention has been paid to applying existing international law to the cause of enhancing global cybersecurity. The bulk of this research, though, has been focused on leveraging international humanitarian law to regulate the conduct of cyber warfare. Yet much of this work is largely theoretical given how exceedingly rare it is for a cyber attack to cross the armed attack threshold. The bulk of the cyber risk facing the public and private sectors lies in the arena of cybercrime and espionage. More scholars have been applying international law ‘below the threshold’ to these issues, but much more work remains to be done. For example, perhaps surprisingly, relatively little attention has been paid to leveraging private international law to the cause of mitigating cyber risk. This Article seeks to address this omission by offering a roadmap that synthesizes and extends work in this field by drawing from cybersecurity due diligence, bilateral investment treaties, and customary international law along with underexplored realms of public international law including the Vienna Convention on Diplomatic Relations, lesser studied global commons regimes, and Mutual Legal Assistance Treaties. The time is ripe for a fresh look at existing international legal tools that would help us better manage the multifaceted cyber threat. Only then can an accounting be made of gaps to be filled in by norms, custom, and perhaps one day, new accords.","PeriodicalId":87172,"journal":{"name":"Chicago journal of international law","volume":"52 1","pages":"1"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":"{\"title\":\"The Law of Cyber Peace\",\"authors\":\"Scott J. Shackelford\",\"doi\":\"10.2139/SSRN.2805061\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Increasing and worthwhile attention has been paid to applying existing international law to the cause of enhancing global cybersecurity. The bulk of this research, though, has been focused on leveraging international humanitarian law to regulate the conduct of cyber warfare. Yet much of this work is largely theoretical given how exceedingly rare it is for a cyber attack to cross the armed attack threshold. The bulk of the cyber risk facing the public and private sectors lies in the arena of cybercrime and espionage. More scholars have been applying international law ‘below the threshold’ to these issues, but much more work remains to be done. For example, perhaps surprisingly, relatively little attention has been paid to leveraging private international law to the cause of mitigating cyber risk. This Article seeks to address this omission by offering a roadmap that synthesizes and extends work in this field by drawing from cybersecurity due diligence, bilateral investment treaties, and customary international law along with underexplored realms of public international law including the Vienna Convention on Diplomatic Relations, lesser studied global commons regimes, and Mutual Legal Assistance Treaties. The time is ripe for a fresh look at existing international legal tools that would help us better manage the multifaceted cyber threat. Only then can an accounting be made of gaps to be filled in by norms, custom, and perhaps one day, new accords.\",\"PeriodicalId\":87172,\"journal\":{\"name\":\"Chicago journal of international law\",\"volume\":\"52 1\",\"pages\":\"1\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"28\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Chicago journal of international law\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/SSRN.2805061\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Chicago journal of international law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.2805061","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

摘要

将现有国际法应用于加强全球网络安全事业的问题日益受到重视。然而,大部分研究都集中在利用国际人道主义法来规范网络战的行为上。然而,鉴于网络攻击跨越武装攻击门槛的情况极为罕见,这些工作在很大程度上是理论性的。公共和私营部门面临的大部分网络风险来自网络犯罪和间谍活动。越来越多的学者将国际法“低于阈值”应用于这些问题,但仍有更多的工作要做。例如,或许令人惊讶的是,很少有人关注如何利用国际私法来缓解网络风险。本文试图通过提供一个路线图来解决这一遗漏,该路线图综合并扩展了该领域的工作,借鉴了网络安全尽职调查、双边投资条约、习惯国际法以及未被充分探索的国际公法领域,包括《维也纳外交关系公约》、研究较少的全球公地制度和司法互助条约。重新审视现有国际法律工具的时机已经成熟,这些工具将帮助我们更好地应对多方面的网络威胁。只有这样,才能对需要由规范、习俗、或许有一天新的协议来填补的空白进行核算。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Law of Cyber Peace
Increasing and worthwhile attention has been paid to applying existing international law to the cause of enhancing global cybersecurity. The bulk of this research, though, has been focused on leveraging international humanitarian law to regulate the conduct of cyber warfare. Yet much of this work is largely theoretical given how exceedingly rare it is for a cyber attack to cross the armed attack threshold. The bulk of the cyber risk facing the public and private sectors lies in the arena of cybercrime and espionage. More scholars have been applying international law ‘below the threshold’ to these issues, but much more work remains to be done. For example, perhaps surprisingly, relatively little attention has been paid to leveraging private international law to the cause of mitigating cyber risk. This Article seeks to address this omission by offering a roadmap that synthesizes and extends work in this field by drawing from cybersecurity due diligence, bilateral investment treaties, and customary international law along with underexplored realms of public international law including the Vienna Convention on Diplomatic Relations, lesser studied global commons regimes, and Mutual Legal Assistance Treaties. The time is ripe for a fresh look at existing international legal tools that would help us better manage the multifaceted cyber threat. Only then can an accounting be made of gaps to be filled in by norms, custom, and perhaps one day, new accords.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信