Search results

41 – 50 of over 5000
Article
Publication date: 14 March 2016

Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis and Theodoros Apostolopoulos

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the…

2379

Abstract

Purpose

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, from a strictly legal standpoint, it indicates that addressing cyber attacks does not fall within the jurisdiction of just one legal branch. This is mainly because of the fact that the concept of cyber warfare itself is open to many different interpretations, ranging from cyber operations performed by the States within the context of armed conflict, under International Humanitarian Law, to illicit activities of all kinds performed by non-State actors including cybercriminals and terrorist groups. The paper initially presents major cyber-attack incidents and their impact on the States. On this basis, it examines the existing legal framework at the European and international levels. Furthermore, it approaches “cyber warfare” from the perspective of international law and focuses on two major issues relating to cyber operations, i.e. “jurisdiction” and “attribution”. The multi-layered process of attribution in combination with a variety of jurisdictional bases in international law makes the successful tackling of cyber attacks difficult. The paper aims to identify technical, legal and, last but not least, political difficulties and emphasize the complexity in applying international law rules in cyber operations.

Design/methodology/approach

The paper focuses on the globalization of the “cyber warfare phenomenon” by observing its evolutionary process from the early stages of its appearance until today. It examines the scope, duration and intensity of major cyber-attacks throughout the years in relation to the reactions of the States that were the victims. Having this as the base of discussion, it expands further by exemplifying “cyber warfare” from the perspective of the existing European and International legal framework. The main aim of this part is to identify and analyze major obstacles that arise, for instance in terms of “jurisdiction” and “attribution” in applying international law rules to “cyber warfare”.

Findings

The absence of a widely accepted legal framework to regulate jurisdictional issues of cyber warfare and the technical difficulties in identifying, with absolute certainty, the perpetrators of an attack, make the successful tackling of cyber attacks difficult.

Originality/value

The paper fulfills the need to identify difficulties in applying international law rules in cyber warfare and constitutes the basis for the creation of a method that will attempt to categorize and rank cyber operations in terms of their intensity and seriousness.

Details

Information & Computer Security, vol. 24 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 28 February 2005

Marnie Enos Carroll

Increasing the ethicality of a project and the usefulness of the data enhances the probability that social good will result from the research; a combination of ethical and…

Abstract

Increasing the ethicality of a project and the usefulness of the data enhances the probability that social good will result from the research; a combination of ethical and methodological soundness is therefore crucial. From 1999‐2002 I conducted a qualitative study of women’s, men’s, and mixed Internet chat room conversations. In this article, I discuss the particular ethical issues that arose, outlining my ethical decision‐making process within the context of current debates. I also describe the methodological concerns, demonstrating why a synthesized method responsive to the advantages and disadvantages of cyberspace was necessary, and how the data were enhanced by this choice of method and by certain characteristics of cyberspace. In discussing the details of my study, my overall goal is to provide an assessment of the social good of the project with a view to increasing the probability of more ethical and useful Internet‐based research outcomes more generally.

Details

Journal of Information, Communication and Ethics in Society, vol. 3 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 5 August 2019

Hanci Lei

Information warfare (IW) is a novel and poorly understood threat to the international community, which may be used more commonly as a foreign policy tool in the future. By…

1212

Abstract

Purpose

Information warfare (IW) is a novel and poorly understood threat to the international community, which may be used more commonly as a foreign policy tool in the future. By identifying the key components of modern IW, this paper seeks to formulate policy recommendations for how best to deal with this new threat. The general overview of the topic that this paper provides contributes to current efforts to develop strategies to counter IW operations around the world.

Design/methodology/approach

The goal of this paper is to break down the components of modern IW and provide policy recommendations for domestic and international governance on the issue. These recommendations will be based in part of historical initiatives to counter IW and existing literature on cyber governance. Central to the framework used to analyze the cases of Russian and North Korean IW operations are the seven defining features of “strategic” IW established by a 1996 RAND Corporation report, modified to incorporate the importance of cyberspace to cases of IW in the modern day.

Findings

Modern IW presents a new, multifaceted threat to states. Because of the value of IW as a tool by weaker states to counter stronger ones and the weakness of existing legal and normative frameworks, use of IW can be expected to be increasingly common. States can take action to promote international governance on the issue and develop policy frameworks for protecting themselves against IW.

Practical implications

IW has historically been a very tricky tactic to define and identify. By analyzing IW’s basic features, this paper provides a framework for breaking down IW into its component parts, which reveals valuable policy implications. Preventative efforts against IW can help restore trust to global information networks and lower the risk of conflict.

Originality/value

Formal scholarship on modern IW and related subjects is lacking in comparison with higher visibility threats. Increased awareness of this issue, especially amongst civilian leaders, can augment global efforts to counter IW.

Details

foresight, vol. 21 no. 4
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 4 August 2021

Tripti Bhushan

We live in a techno savvy era that is called as virtual connection and communication.

Abstract

Purpose

We live in a techno savvy era that is called as virtual connection and communication.

Design/methodology/approach

During this pandemic crisis, we all are dependent upon technology, internet for connecting to our families and our friends; this all is monitored by cyberlaw.

Findings

Today, the computer crimes are increasing at a high rate, and it should be controlled and managed to maintain the platform .Cyberspace on the other hand can be discussed as the space where all internet-related activities are taking place and cyberlaw regulates. The paper will throw light on the impact of internet on the COVID-19 pandemic.

Originality/value

The paper will throw light on the impact of internet on the COVID-19 pandemic.

Details

World Journal of Engineering, vol. 19 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 April 2014

Hsien-Tang Lin and Lawrence W. Lan

The purpose of this paper was to develop a new interactive guiding system allowing people to use their own smart mobile devices, such as smart phones or tablet PCs, to activate…

Abstract

Purpose

The purpose of this paper was to develop a new interactive guiding system allowing people to use their own smart mobile devices, such as smart phones or tablet PCs, to activate the guiding services at the art gallery. The system provided interactions between visitors and exhibit items. It focused on the highly interactive functions between visitors and artworks authors as well as among visitors at both exhibition sites and social network sites (SNSs).

Design/methodology/approach

The system used quick response (QR) codes as the context aware elements, Facebook as the platform of SNSs, and smart mobile devices as the human-machine interfaces. Visitors carrying their own smart phones or tablet PCs can activate the guiding services by scanning the QR codes of the interested exhibit items. A system usability scale (SUS) survey was conducted to understand the visitors' perceptions on system usability. A questionnaire survey was conducted to collect the visitors' and authors' attitudes on releasing messages through Facebook.

Findings

The system was implemented at an art centre where lacquer artworks were on display. The SUS survey showed that 94 per cent of the participated visitors have satisfactorily rated this new guiding system, indicating rather high usability of the system. Most participated visitors agreed on Facebook as an ideal channel to release messages and they would pay more attention to the highly-recommended exhibit items. All the artworks authors consented to this new guiding system with potential power to disseminate their works over the cyberspace.

Originality/value

This new system possesses some important features in blending real world and cyberspace activities. Visitors at exhibit sites can become more informed and captivated because the interactive guiding system enables them to share knowledge and commentary opinions with others who were, are or will be at the same exhibition. It also allows people to share with their cyberspace friends who may have no times or opportunities to visit the exhibition. Most importantly, the new system may immensely expand the number of potential visitors in ways to make the authors and their artworks rapidly recognized.

Details

The Electronic Library, vol. 32 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 October 2004

Andrew Calabrese

Nonviolent civil disobedience is a vital and protected form of political communication in modern constitutional democracies. Reviews the idea of both demonstrating its continued…

2129

Abstract

Nonviolent civil disobedience is a vital and protected form of political communication in modern constitutional democracies. Reviews the idea of both demonstrating its continued relevance, and providing a basis for considering its uses as an information‐age strategy of radical activism. The novelty of the forms of speech and action possible in cyberspace make it difficult to compare these new methods of expression easily. Whether in cyberspace or the real world, civil disobedience has historically specific connotations that should be sustained because the concept has special relevance to the political theory and practice of constitutional democracy. Civil disobedience is a unique means of political expression that is used to provoke democratic deliberation about important questions of just law and policy. Among the significant problems that new forms of radical political practice in cyberspace introduce is that their practitioners and advocates neglect the need to distinguish between violence and nonviolence. Examines that problem and others that are central to considering theoretical and political implications of radical activism in general, and civil disobedience in particular, in cyberspace.

Details

info, vol. 6 no. 5
Type: Research Article
ISSN: 1463-6697

Keywords

Article
Publication date: 1 October 1999

Riel Miller

Few dispute the very strong likelihood that within twenty years the global information infrastructure, often referred to as the internet or “the net” will become as generalized…

Abstract

Few dispute the very strong likelihood that within twenty years the global information infrastructure, often referred to as the internet or “the net” will become as generalized, indispensable and invisible as today”s phone or electrical networks. Many commentators also expect this digital web to become the host for cyberspace, the next frontier. This article provides an overview of where a wide range of experts from business, government and the academic world believe this rapidly expanding global information infrastructure is heading over the next two decades.

Details

Foresight, vol. 1 no. 5
Type: Research Article
ISSN: 1463-6689

Keywords

Article
Publication date: 1 May 2007

Julia J.A. Shaw

To address the impact of information technology on culture and society, in particular the potential for control and manipulation afforded to state, government and unregulated…

267

Abstract

Purpose

To address the impact of information technology on culture and society, in particular the potential for control and manipulation afforded to state, government and unregulated corporations, by the medium of sophisticated communication networks. The paper sets out to expose the corporate world's manipulation of IT and the multi‐media as it exercises a powerful coercive force, constituting a legitimating principle for economic and cultural domination. It is suggested that the relentless progression of science as profit and the individual as profit‐generating automaton constitutes the subversion of a world rightly ordered by human principles. The paper calls for the ethical regulation of cyberspace, necessitating a philosophical approach and one which prizes human endeavour.

Design/methodology/approach

Examples from the technosocial world taken from across a range of uses, providers and users are explored according to their impact on everyday life. The ontological and phenomenological nature of the technological medium is also explicated with reference to various academic sources including Castells and Bauman. A sociological / philosophical / ethical approach is adopted by reference to the writings of inter alia Baudrillard and Kant.

Findings

The traditional territories of communication in which social exchange takes place have been dislocated and we have formed new attachments to the pervasive replacement technoculture and technologies. Many examples evidence the extent to which human values and achievements are increasingly organised around various enslaving technological mediums. Cyberspace is in need of a regulatory framework, one which has an ethical basis.

Originality/value

Presents an alternative perspective on a significant topic.

Details

Social Responsibility Journal, vol. 3 no. 2
Type: Research Article
ISSN: 1747-1117

Keywords

Executive summary
Publication date: 23 March 2022

INT: Ukraine alters the role of cyberspace in war

Details

DOI: 10.1108/OXAN-ES268147

ISSN: 2633-304X

Keywords

Geographic
Topical
Article
Publication date: 1 October 2005

Georgios I. Zekos

Globalisation is generally defined as the “denationalisation of clusters of political, economic, and social activities” that destabilize the ability of the sovereign State to…

2088

Abstract

Globalisation is generally defined as the “denationalisation of clusters of political, economic, and social activities” that destabilize the ability of the sovereign State to control activities on its territory, due to the rising need to find solutions for universal problems, like the pollution of the environment, on an international level. Globalisation is a complex, forceful legal and social process that take place within an integrated whole with out regard to geographical boundaries. Globalisation thus differs from international activities, which arise between and among States, and it differs from multinational activities that occur in more than one nation‐State. This does not mean that countries are not involved in the sociolegal dynamics that those transboundary process trigger. In a sense, the movements triggered by global processes promote greater economic interdependence among countries. Globalisation can be traced back to the depression preceding World War II and globalisation at that time included spreading of the capitalist economic system as a means of getting access to extended markets. The first step was to create sufficient export surplus to maintain full employment in the capitalist world and secondly establishing a globalized economy where the planet would be united in peace and wealth. The idea of interdependence among quite separate and distinct countries is a very important part of talks on globalisation and a significant side of today’s global political economy.

Details

Managerial Law, vol. 47 no. 5
Type: Research Article
ISSN: 0309-0558

Keywords

41 – 50 of over 5000