Accountability and cyber conflict: examining institutional constraints on the use of cyber proxies

2021 ◽  
pp. 073889422110512
Author(s):  
William Akoto

As state-sponsored cyber operations have proliferated, some states are outsourcing these operations to non-state cyber proxies. However, given the relative ease of outsourcing cyber operations, it is puzzling why more states are not engaged in this practice. I examine how domestic accountability institutions potentially explain this restraint in the use of cyber proxies. I argue that in cases where the incumbent is likely to be held to account for cyber operations, there is restraint in the use of proxies. Moreover, I distinguish vertical from horizontal accountability and argue that because vertical accountability mechanisms directly threaten the tenure of the incumbent if outsourced cyber operations go wrong, it has a greater constraining effect relative to horizontal accountability. I test these propositions with new data on the activities of several hacker groups and robustly confirm that accountability institutions do place significant constraints on the use of cyber proxies.

Author(s):  
Laura S. DeThorne ◽  
Kelly Searsmith

Purpose The purpose of this article is to address some common concerns associated with the neurodiversity paradigm and to offer related implications for service provision to school-age autistic students. In particular, we highlight the need to (a) view first-person autistic perspectives as an integral component of evidence-based practice, (b) use the individualized education plan as a means to actively address environmental contributions to communicative competence, and (c) center intervention around respect for autistic sociality and self-expression. We support these points with cross-disciplinary scholarship and writings from autistic individuals. Conclusions We recognize that school-based speech-language pathologists are bound by institutional constraints, such as eligibility determination and Individualized Education Program processes that are not inherently consistent with the neurodiversity paradigm. Consequently, we offer examples for implementing the neurodiversity paradigm while working within these existing structures. In sum, this article addresses key points of tension related to the neurodiversity paradigm in a way that we hope will directly translate into improved service provision for autistic students. Supplemental Material https://doi.org/10.23641/asha.13345727


Author(s):  
Ronald T. Kellogg ◽  
Merilee Krueger ◽  
Rose Blair

1982 ◽  
Vol 14 (9-11) ◽  
pp. 1385-1392
Author(s):  
K D Linstedt

A review is provided of the world water resource situation. Water reuse is discussed as a means of augmenting conventional supplies, with types of potential reuse applications identified. Considerations of water quality, cost, public acceptance, and institutional constraints are discussed for their impact on decisions regarding implementation of water reuse.


Author(s):  
Jason Hanna

This chapter critically examines two of John Stuart Mill’s consequentialist objections to paternalism: that paternalistic authority is likely to be misapplied or abused and that intervention in the self-regarding sphere threatens individuality and self-development. It is argued here that both objections can be resisted. Concerns about misapplication and abuse pose no challenge to intervention that is likely to succeed in achieving its benevolent aims, and attempts to avoid this problem by construing Mill’s arguments in rule-consequentialist terms are unconvincing. Concerns about Millian individuality or self-development leave considerable room for justified paternalism, both because individuality is not the only component of well-being and because paternalistic intervention can sometimes promote individuality. Mill’s arguments may show that there ought to be some institutional constraints on the government’s ability to intervene in the self-regarding sphere, but defenders of paternalism can happily accept this result.


2020 ◽  
Vol 102 (913) ◽  
pp. 261-285
Author(s):  
Amandeep S. Gill

AbstractThis article examines a subset of multilateral forums dealing with security problems posed by digital technologies, such as cyber warfare, cyber crime and lethal autonomous weapons systems (LAWS).1 It identifies structural issues that make it difficult for multilateral forums to discuss fast-moving digital issues and respond in time with the required norms and policy measures. Based on this problem analysis, and the recent experience of regulating cyber conflict and LAWS through Groups of Governmental Experts, the article proposes a schema for multilateral governance of digital technologies in armed conflict. The schema includes a heuristic for understanding human–machine interaction in order to operationalize accountability with international humanitarian law principles and international law applicable to armed conflict in the digital age. The article concludes with specific suggestions for advancing work in multilateral forums dealing with cyber weapons and lethal autonomy.


2021 ◽  
Vol 69 ◽  
pp. 585-612
Author(s):  
Le Thanh Ha ◽  
To Trung Thanh ◽  
Doan Ngoc Thang ◽  
Pham Thi Hoang Anh

Sign in / Sign up

Export Citation Format

Share Document