COMPUTER NETWORK OPERATIONS IN THE LIGHT OF IUS IN BELLO Cover Image

COMPUTER NETWORK OPERATIONS IN THE LIGHT OF IUS IN BELLO
COMPUTER NETWORK OPERATIONS IN THE LIGHT OF IUS IN BELLO

Author(s): Kaja Kowalczewska
Subject(s): Security and defense
Published by: Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego “Apeiron” w Krakowie
Keywords: cyber attack;warfare;international humanitarian law;distinction;

Summary/Abstract: The paper deals with the legal definition of attack under international humanitarian law, analysed in the context of cyber “attacks”. The armed nature of cyber operation is distinguished from a violent one and therefore special section is devoted to the indirect consequences of cyber attacks. It is also noted that the incremental resort to automated weapon systems, controlled by computer networks still highly vulnerable to hostile malware and interference, challenges the current state of law. Finally, the author attempts to render the linkage between law and IT, both greatly concerned with cyber security.

  • Issue Year: 2014
  • Issue No: 15
  • Page Range: 135-143
  • Page Count: 9
  • Language: English
Toggle Accessibility Mode