Ethics of Cyber War Attacks

Author(s):  
Neil C. Rowe

Offensive cyber warfare raises serious ethical problems for societies, problems that need to be addressed by policies. Since cyber weapons are so different from conventional weapons, the public is poorly informed about their capabilities and may endorse extreme ethical positions in either direction on their use. Cyber weapons are difficult to precisely target given the interdependence of most computer systems, so collateral damage to civilian targets is a major danger, as when a virus aimed at military sites spreads to civilian sites. Damage assessment is difficult for cyber war attacks, since most damage is hidden inside data; this encourages massive attacks in the hopes of guaranteeing some damage. Damage repair may be difficult, especially for technologically primitive victim countries. For these reasons, some cyber war attacks may be prosecutable as war crimes. In addition, cyber-war weapons are expensive and tend to lose effectiveness quickly after use as they lose the element of surprise, so the weapons are not cost effective.

1993 ◽  
Vol 1993 (1) ◽  
pp. 721-725 ◽  
Author(s):  
Marisa J. Mazzotta ◽  
James J. Opaluch ◽  
Thomas A. Grigalunas

ABSTRACT To date, the focus of damage assessment has tended to be either on economic valuation of lost services in monetary terms or on scientific studies of resource restoration. This paper suggests an alternative approach that integrates legal concepts based on the public trust doctrine, economic methods of determining compensation, and scientific approaches to restoration. The approach is based on a definition of restoration as a remedy for oil spill damages which identifies alternative restoration actions that provide resource services that are “equally desirable” to society as those lost due to the spill. The least costly of these alternatives is then selected as the cost-effective means of making the public whole.


Author(s):  
Тамерлан Шайх-Магомедович Едреев

Развитие международного уголовного права происходит с учетом современных реалий, в которых противостояние государств зачастую приобретает формы войны в киберпространстве, при этом такого рода атаки имеют высокую опасность. В связи с этим в данной статье предпринята попытка определения кибервойны как нового вида преступления в международном уголовном праве. The development of international criminal law takes into account modern realities, in which the confrontation of states often takes the form of war in cyberspace, while such attacks are of high danger. In this regard, this article attempts to define cyber warfare as a new type of crime in international criminal law.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1342
Author(s):  
Borja Nogales ◽  
Miguel Silva ◽  
Ivan Vidal ◽  
Miguel Luís ◽  
Francisco Valera ◽  
...  

5G communications have become an enabler for the creation of new and more complex networking scenarios, bringing together different vertical ecosystems. Such behavior has been fostered by the network function virtualization (NFV) concept, where the orchestration and virtualization capabilities allow the possibility of dynamically supplying network resources according to its needs. Nevertheless, the integration and performance of heterogeneous network environments, each one supported by a different provider, and with specific characteristics and requirements, in a single NFV framework is not straightforward. In this work we propose an NFV-based framework capable of supporting the flexible, cost-effective deployment of vertical services, through the integration of two distinguished mobile environments and their networks: small sized unmanned aerial vehicles (SUAVs), supporting a flying ad hoc network (FANET) and vehicles, promoting a vehicular ad hoc network (VANET). In this context, a use case involving the public safety vertical will be used as an illustrative example to showcase the potential of this framework. This work also includes the technical implementation details of the framework proposed, allowing to analyse and discuss the delays on the network services deployment process. The results show that the deployment times can be significantly reduced through a distributed VNF configuration function based on the publish–subscribe model.


Temida ◽  
2012 ◽  
Vol 15 (3) ◽  
pp. 5-21
Author(s):  
Vesna Nikolic-Ristanovic

This paper aims to present German experiences in documenting the crimes of the past using Berlin as a case study. The first part provides a brief overview of the history and the broader social context in which the process of dealing with the past took place in Germany in general, and in Berlin in particular, as well as the most important characteristics of data on crimes that were presented to the public. The second part provides an overview and analysis of the data presented in two memorials: the Topography of Terror and the Memorial to the Murdered Jews of Europe. These two memorials are examples of presenting information about war crimes that can be considered as fairly inclusive, thus the goal of their presentation is to highlight the potential that these approaches may have in creating a social memory and the overall attitude of society toward the past. The findings presented in this paper are the result of the research carried out by the author in Berlin in June 2011.


2021 ◽  
Vol 9 (1) ◽  
pp. 1-14
Author(s):  
Syeda Faeza Hasan ◽  
Farjana Rahman

Dhaka is one of the fastest-growing cities in the world with a population of 21 million. With the constantly rising inhabitants, this urbanizing hub officially only has 122 public toilets, and in reality, most of them are not functional (Sanyal, November 05, 2016). Different studies also suggested that current situations of the public toilets in the city are unusable and unhygienic. Apart from a few good ones, most toilets have filthy floors, inadequate lighting and ventilation, and unbearable odor of human waste. Although unhygienic open defecation by men is a common scene in the city, for the woman it is not an option. While the city plans to construct a few, there still will be a huge need for public toilets to meet the demand of the vast population. It is critical to realize the challenges existing and evolving from the forbidding public hygiene situation and the lack of proper public infrastructure. Understanding the user group is crucial as modern and costly toilets end up being rejected than being used. Thus the paper tries to address the problems and suggests design strategies to achieve a feasible design solution for a sustainable public toilet that supports and empowers communal hygiene. The contribution of this paper is not only to promote a design solution but how this infrastructure can integrate with the surrounding urban context. A modular prototype is proposed which is adaptable, feasible, cost-effective, easy to erect, and can be plugged into any corner of the city. Rethinking public toilets as an adaptable prototype is not only about providing proper sanitation but also encouraging people about hygiene education, awareness, and innovation. The design is conceptualized as a prefabricated self-sustainable modular unit that can be altered, increased, or decreased as per the necessity of the surrounding area. 


2000 ◽  
Vol 95 (1) ◽  
pp. 171-182 ◽  
Author(s):  
Ian Richards

Although it has been hailed as the salvation of American journalism, public journalism poses many dilemmas. While the most immediate of these arise from its definitional imprecision, some of the most significant are in the area of journalism ethics. Some of the problems emerge from public journalism's disregard of traditional notions of journalistic objectivity, others from the inherent conflict between serving the public and serving the market. At the same time, the public journalism movement has yet to confront the fact that ethical debates in journalism have generally been constructed around the individual, thereby ignoring the reality that most ethical problems originate at the level of ownership and management. While it is too soon to determine just how well public journalism will adapt to Australian conditions, it is clear that it has a long way to go before it justifies the extravagant claims that have been made in its name.


Author(s):  
Dakota S. Rudesill

What civil-military challenges will arise from the virtual world of cyber warfare? Congress and the president have grown increasingly comfortable with permissive grants of authorities and decentralized delegations—including via classified documents with legal force (secret law)—, allowing military commanders to operationalize cyber tools in both defensive and offensive modes with greater ease and frequency. These cyber tools are unusually complex in their variety, design, and potential uses, at least relative to more traditional and conventional weapons. Their technical attributes render them difficult to monitor and regulate because those responsible for decisions to use such weapons—civilian officials—are often least likely to have experience or familiarity with them. The relatively low-cost, rapid-effect nature of cyberwar also encourages not just use in armed conflict, but also below the standard threshold of war. Cyber operations initiated without careful inter-agency planning, decision process, and presidential review drive up operational risk and undermine civil-military norms. To foster more effective civilian oversight and control of the nation’s military’s cyber sword, and to encourage more deliberative application of ever-evolving technologies, Congress should use its constitutional authorities over “the [cyber] land and naval Forces” to craft better decision processes and better civil-military and legal transparency balances.


2011 ◽  
Vol 2 (2) ◽  
pp. 14-26
Author(s):  
José Antonio Ariza Montes ◽  
Alfonso Carlos Morales Gutiérrez ◽  
Emilio Morales Fernández ◽  
Alfredo Romeo

The use of internet along with other technologies that enable wireless connectivity and the expansion and dissemination of the real-time positioning (GPS) in all countries and levels of the population is a great opportunity for entrepreneurship in the field of information technology. This paper shows how the effective channeling of the available information would place decision making at different levels and, regarding different concerns of today’s society, connect the online world of the Internet with the physical world. This paper has three parts. The first part shows characteristics of some applications that emerge from individual needs –geosocial networking- and those that arise to improve the functioning of society and of the public interest– like collaborative mapping and augmented reality. In the second part an example of e-enterprise–City 2020 Ltd–is described as well as its use of these sources of opportunities. Finally, the third part analyzes the main socio-ethical problems and some opportunities of location based services.


Author(s):  
Fathey Mohammed ◽  
Othman Bin Ibrahim

Adopting and using Information and Communication Technologies (ICTs) in the public sector affords undeniable benefits in terms of efficient and cost-effective provision of services, facilitating public management and promoting transparency and participation through e-government systems. However, many governments around the globe face many challenges and still struggle to implement e-government initiatives successfully. Cloud computing may offer a new chance to address many of these challenges by providing elastic scalable, customized, and highly available environment. Moreover, it is already adopted and proved to be advantageous for governmental institutions in different countries. By analyzing some cases, this paper extracts the main drivers of cloud computing adoption in the public sector organizations. Cost saving and the need for scalability are the main common factors that drive public sector organizations to move their services to the cloud.


Sign in / Sign up

Export Citation Format

Share Document