Topic question: What are the legal requirements in international relations of governments for cyber-attacks?
Description:
The overarching theme I wish to focus my thesis on is terrorism in the form of cyberwarfare This is fine but drop the terrorism part- some cyberattacks may be terrorist, some are not so keep the focus on cyberattacks to avoid getting sidetracked into the whole terrorism debate. The reason I chose to research this topic over others is because more and more governments are beginning to transition their data and other sensitive information onto digital platforms (e.g. online databases) which can be compromised- so do you just want to look at cyberattacks on information databases or cyberattacks in general- for instance, these could be on infrastructure, on weapons, or even on corporations (like the Sony attack).
In particular, I wish to focus on how the change in the scope of power from hard power to soft power has also shifted in the process of military attacks to cyberattack- cyberattacks would also fall under hard power depending on the target of the attack. As of now, there is a gray area as to how cyber-attacks fit into the framework of humanitarian law- better to think of it how it fits into the legal framework for war. In order for cyber-attacks to be viewed in the same light as armed attacks it is necessary for cyber-attacks to fit into the same framework of humanitarian law that armed attacks are- why? Not really necessary- unless you make the case.
Currently there are existing documents identifying governments responsibilities in conducting? military strikes- unsure what this means? Do you mean obligations?. Therefore, I wish to develop an analytical-descriptive method based on these existing documents to identify governments responsibilities for their cyberattacks. Cyber-attacks, like armed attacks, impact humanity in a variety of ways- potentially, yes. Cyberattacks can target a large variety of sectors within a government- so one thing to decide on is what kind of cyberattacks you’re interested in- maybe pick two that target different types of entities- government or civilian. The damage done by these attacks can also vary substantially. To limit this scope I will create two baskets of cyberattacks: one which warrants legitimate defense, to the same degree that a government would take in an armed attack situation, and one which does not.
Either way- Definitely identify some cases of cyberattacks so that you ground your paper in something concrete- Stuxnet is an important case, Russian attacks in Estonia in the mid 2000s are also important as is U.S. cyberattacks on Russian powergrids.
And read Joseph Nye’s work on cyberdetterence and Susan Hennesey to get started on an understanding of the issues.
Sources:
International Relations:
State actors:
Cases:
Regions:
The use of cyber-attacks in exchange
Our Advantages
Plagiarism Free Papers
All our papers are original and written from scratch. We will email you a plagiarism report alongside your completed paper once done.
Free Revisions
All papers are submitted ahead of time. We do this to allow you time to point out any area you would need revision on, and help you for free.
Title-page
A title page preceeds all your paper content. Here, you put all your personal information and this we give out for free.
Bibliography
Without a reference/bibliography page, any academic paper is incomplete and doesnt qualify for grading. We also offer this for free.
Originality & Security
At Homework Valley, we take confidentiality seriously and all your personal information is stored safely and do not share it with third parties for any reasons whatsoever. Our work is original and we send plagiarism reports alongside every paper.
24/7 Customer Support
Our agents are online 24/7. Feel free to contact us through email or talk to our live agents.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Our Services
We work around the clock to see best customer experience.
Pricing
Our prices are pocket friendly and you can do partial payments. When that is not enough, we have a free enquiry service.
Communication
Admission help & Client-Writer Contact
When you need to elaborate something further to your writer, we provide that button.
Deadlines
Paper Submission
We take deadlines seriously and our papers are submitted ahead of time. We are happy to assist you in case of any adjustments needed.
Reviews
Customer Feedback
Your feedback, good or bad is of great concern to us and we take it very seriously. We are, therefore, constantly adjusting our policies to ensure best customer/writer experience.