Buch, Englisch, 329 Seiten, Format (B × H): 165 mm x 231 mm, Gewicht: 590 g
Self-Defence, Countermeasures, Necessity, and the Question of Attribution
Buch, Englisch, 329 Seiten, Format (B × H): 165 mm x 231 mm, Gewicht: 590 g
ISBN: 978-1-108-47986-8
Verlag: Cambridge University Press
Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a State faces when considering a reaction to a malicious cyber operation conducted by an adversarial State. While often invoked in political debates and widely analysed in international legal scholarship, self-defence and countermeasures will often remain unavailable to states in situations of cyber emergency due to the pervasive problem of reliable and timely attribution of cyber operations to State actors. Analysing the legal questions surrounding attribution in detail, the book presents the necessity defence as an evidently available alternative. However, the shortcomings of the doctrine as based in customary international law that render it problematic as a remedy for states are examined in-depth. In light of this, the book concludes by outlining a special emergency regime for cyberspace.
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Wirtschaftssektoren & Branchen Medien-, Informations und Kommunikationswirtschaft Informationstechnik, IT-Industrie
- Rechtswissenschaften Internationales Recht und Europarecht Internationales Recht Internationales Öffentliches Recht, Völkerrecht, Internationale Organisationen
- Sozialwissenschaften Politikwissenschaft Internationale Beziehungen
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
Weitere Infos & Material
Part I. Cybersecurity Incidents and International Law: 1. The spectre of cyberwar; 2. Terminology; 3. International legal framework; Part II. Unilateral Remedies to Cybersecurity Incidents: 4. Self-defence; 5. Countermeasures; 6. Necessity; Part III. Outlines of an Emergency Regime for Cyberspace: 7. Transnational cybersecurity, unilateral remedies, and the rule of law; 8. 'Such incidents might recur at any time': the intervention convention; 9. Possible elements of the cyber emergency regime; 10. Concluding remarks; Bibliography; Index.