Stanford law and policy review, Vol. 25, issue 2, 2014, p. 269-299
Languages:
English
General Note:
Photocopies
Abstract:
Where is the law of cyberware going? This article offers thoughts on the process of normative evolution and identifies certain aspects of the law of sovereignty, the jus ad bellum, and the jus in bello which will have to acclimate to the growing threat cyberterrorists, cyberspies, cyberthieves, cyberwarriors, cyber hacktivists, and malicious hackers pose. For each, the article describes current law and indicates the probable vector of any change. Knowing where such fault lines lie should prove useful as states craft national cyberspace policies and issue rules of engagement, international organizations launch projects designed to achieve normative compatability in cyberspace, and scholars explore the theoretical foundation for the future law of cyber warfare.
By entering this website, you consent to the use of technologies, such as cookies and analytics, to customise content, advertising and provide social media features. This will be used to analyse traffic to the website, allowing us to understand visitor preferences and improving our services. Learn more