The Ethics of Cyberwarfare

TitleThe Ethics of Cyberwarfare
Publication TypeJournal Article
Year of Publication2010
AuthorsDipert, RR
JournalJournal of Military Ethics
Volume9
Issue4
Pagination384-410
Date Published2010
Publication Languageeng
ISBN Number15027570
Keywordscomputer , cyberattack , cyberespionage , cybersecurity , cyberwarfare , Data , ESPIONAGE , ethics , just , War
AbstractThe paper addresses several issues in the morality of cyberwar and cyberwarfare, defined as one nation's attacks on the governmental or civilian information systems of another nation. It sketches the diverse technical ways in which an attack may occur, including denial-of-service attacks and the insertion of various forms of malware. It argues that existing international law and widely discussed principles of Just War Theory do not straightforwardly apply to cyberwarfare, and many forms of cyberwarfare differ from previous forms of warfare in neither injuring nor killing human beings, nor causing lasting physical damage - but can nevertheless cause serious harm to a nation's vital interests. Another dissimilarity with traditional warfare is in the degree of knowledge of the identity of an attacker (the 'attribution problem'). The paper argues that cyberwarfare is not amenable to regulation by international pacts and that we can expect long periods of low-level, multilateral cyberwarfare, a Cyber Cold War, as a game-theoretic equilibrium is sought,. The paper laments the lack of a cyberwarfare policy, and concludes that it is only by applying game-theoretic principles that strategies can be discovered that are both moral and effective in suppressing overall harm to all parties in the long run. [ABSTRACT FROM AUTHOR]Copyright of Journal of Military Ethics is the property of Routledge and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
NotesDIPERT, RANDALL R. 1; Email Address: rdipert@buffalo.edu; Affiliation: 1: SUNY (State University of New York), Buffalo, NY, USA; Source Info: Dec2010, Vol. 9 Issue 4, p384; Subject Term: ETHICS; Subject Term: COMPUTER crimes; Subject Term: ESPIONAGE; Subject Term: WAR; Subject Term: COMPUTER viruses; Subject Term: DATA protection; Subject Term: COMPUTER security; Author-Supplied Keyword: cyberattack; Author-Supplied Keyword: cyberespionage; Author-Supplied Keyword: cybersecurity; Author-Supplied Keyword: cyberwarfare; Author-Supplied Keyword: Ethics; Author-Supplied Keyword: just war theory; Number of Pages: 27p; Document Type: Article
DOI10.1080/15027570.2010.536404

Discipline: 

Subject: 

Publication: