PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

The (Il)legitimacy of Cybersecurity. An Application of Just Securitization Theory to Cybersecurity based on the Principle of Subsidiarity

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The application of securitization theory to cybersecurity is useful since it subjects the emotive rhetoric of threat construction to critical scrutiny. Floyd’s just securitization theory (JST) constitutes a mixture of securitization theory and just war theory. Unlike traditional securitization theory, it also addresses the normative question of when securitization is legitimate. In this contribution, I critically apply Floyd’s JST to cybersecurity and develop my own version of JST based on subsidiarity. Floyd’s JST follows a minimalistic and subsidiary approach by emphasizing that securitization is only legitimate if it has a reasonable chance of success in averting threats to the satisfaction of basic human needs. From this restrictive perspective, cyber-securitization is only legitimate if it serves to protect critical infrastructure. Whilst Floyd’s JST focuses exclusively on permissibility and needs instead of rights, I argue that there are cases in which states’ compliance with human rights obligations requires the guarantee of cybersecurity, most importantly regarding the human right to privacy. My version of JST is also based on the principle of subsidiarity, in the sense that securitization should always include stakeholders directly affected by a threat. To strengthen this kind of subsidiarity, focused on the private sector, I argue for the legitimacy of private active self-defence in cyberspace and emphasize the importance of a ‘whole-of-society approach’ involving digital literacy and everyday security practices. Moreover, I argue that far-reaching securitization on the nation-state-level should be avoided, particularly the hyper-securitization of the digital public sphere, following unclear notions of ‘digital sovereignty’.
Rocznik
Strony
1--24
Opis fizyczny
Bibliogr. 105 poz., tab.
Twórcy
  • Research Group Law, Science, Technology and Society (LSTS), Department of Metajuridica, Faculty of Law and Criminology, Vrije Universiteit Brussels, Belgium
  • International security management at the Faculty of Police and Security, Berlin School of Economics and Law, Germany
Bibliografia
  • 1. J. P. Barlow. (2016, Jan. 20). A declaration of the independence of cyberspace, Electronic Frontier Foundation. [Online]. Available: https://www.eff.org/de/cyberspace-independence. [Accessed: July 1, 2021].
  • 2. R. Barbrook, A. Cameron, “The Californian ideology,” Science as Culture, vol. 6, no. 1, pp. 44–72, 1996, doi:10.1080/09505439609526455.
  • 3. M. Dunn Cavelty, “Cybersecurity between hypersecuritization and technological routine,” in Routledgehandbook of international cybersecurity, E. Tikk, M. Kerttunen, Eds. New York: Routledge, Taylor & FrancisGroup, 2020, pp. 11–21.
  • 4. J. Burton, C. Lain, “Desecuritising cybersecurity: towards a societal approach,” Journal of Cyber Policy, vol. 5, no. 3, pp. 449–470, 2020, doi: 10.1080/23738871.2020.1856903.
  • 5. M. Lacy, D. Prince, “Securitization and the global politics of cybersecurity,” Global Discourse, vol. 8, no. 1, pp. 100–115, 2018, doi: 10.1080/23269995.2017.1415082.
  • 6. L. Hansen, H. Nissenbaum, “Digital disaster, cyber security, and the Copenhagen school,” International Studies Quarterly, vol. 53, no. 4, pp. 1155–1175, 2009.
  • 7. B. Buzan, O. Wæver, J. de Wilde, Security: A new framework for analysis. Boulder, Colo: Lynne Rienner Pub,1998.
  • 8. J. L. Austin, How to do things with words. Oxford: Clarendon Press, 1962.
  • 9. C. Kinnvall, J. Mitzen, “Anxiety, fear, and ontological security in world politics: Thinking with and beyondGiddens,” International Theory, vol. 12, no. 2, pp. 240–256, 2020, doi: 10.1017/S175297192000010X.
  • 10. R. McDermott, “Some emotional considerations in cyber conflict,” Journal of Cyber Policy, vol. 4, no. 3, pp. 309–325, 2019, doi: 10.1080/23738871.2019.1701692.
  • 11. J. Brito, T. Watkins. (2012, Apr. 10). Loving the cyber bomb? The dangers of threat inflation in cybersecuritypolicy, Mercatus Center. [Online]. Available: https://www.mercatus.org/publications/technology-and-innovation/loving-cyber-bomb-dangers-threat-inflation-cybersecurity. [Accessed: July 2, 2021].
  • 12. R. W. McChesney, Digital disconnect: How capitalism is turning the Internet against democracy. New York: The New Press, 2013.
  • 13. V. Bernal, “The cultural construction of cybersecurity: Digital threats and dangerous rhetoric, ”Anthropological Quarterly, vol. 94, no. 4, pp. 611–638, 2021, doi: 10.1353/anq.2021.0037.
  • 14. M. C. Libicki, “Is there a cybersecurity dilemma?,” The Cyber Defense Review, vol. 1, no. 1, pp. 129–140, 2016.
  • 15. M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removingvulnerabilities,” Science and Engineering Ethics, vol. 20, no. 3, pp. 701–715, 2014, doi: 10.1007/s11948-014-9551-y.
  • 16. B. C. Taylor, “Defending the state from digital deceit: The reflexive securitization of deepfake,” CriticalStudies in Media Communication, vol. 38, no. 1, pp. 1–17, 2021, doi: 10.1080/15295036.2020.1833058.
  • 17. N. Kshetri, The quest to cyber superiority: Cybersecurity regulations, frameworks, and strategies of majoreconomies. New York: Springer, 2016.
  • 18. P. Roe, Ethnic violence and the societal security dilemma. London, New York: Routledge, 2005.
  • 19. R. Floyd, The morality of security: A theory of just securitization. New York: Cambridge University Press, 2019.
  • 20. R. Floyd, “The promise of theories of just securitization,” in Ethical security studies: A new research agenda, J. Nyman, A. Burke, Eds. Abingdon, Oxon, New York: Routledge, 2016, pp. 75–88.
  • 21. R. Floyd, “Can securitization theory be used in normative analysis? Towards a just securitization theory,”Security Dialogue, vol. 42, no. 4–5, pp. 427–439, 2011, doi: 10.1177/0967010611418712.
  • 22. R. Floyd, “States, last resort, and the obligation to securitize,” Polity, vol. 51, no. 2, pp. 378–394, 2019, doi: 10.1086/701886.
  • 23. J. Thumfart, “The norm development of digital sovereignty between China, Russia, the EU and the US: From the late 1990s to the Covid-crisis 2020/21 as catalytic event,” in Enforcing rights in a changing world, D. Hallinan, R. Leenes, P. de Hert, Eds. London: Hart Publishing, 2021, pp. 1–44.
  • 24. M. Dunn Cavelty, F. J. Egloff, “Hyper‐securitization, everyday security practice and technification: Cybersecuritylogics in Switzerland,” Swiss Political Science Review, vol. 27, no. 1, pp. 139–149, 2021, doi: 10.1111/spsr.12433.
  • 25. J. Thumfart, “Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius,”Internet Policy Review, 2020, doi: 10.14763/2020.3.1500.
  • 26. G. Dimari, N. Papadakis, “The securitization of the Covid-19 pandemic in Greece: A just or unjustsecuritization?,” Quality & Quantity, 2022, doi: 10.1007/s11135-022-01341-9.
  • 27. A. C. Dwyer, C. Stevens, L. P. Muller, M. D. Cavelty, L. Coles-Kemp, P. Thornton, “What can a criticalcybersecurity do?,” International Political Sociology, vol. 16, no. 3, p. olac013, 2022, doi: 10.1093/ips/olac013.
  • 28. T. Maurer, Cyber mercenaries: The state, hackers, and power. Cambridge, New York, Port Melbourne, NewDelhi, Singapore: Cambridge University Press, 2018.
  • 29. E. Lilli, “Redefining deterrence in cyberspace: Private sector contribution to national strategiesof cyber deterrence,” Contemporary Security Policy, vol. 42, no. 2, pp. 163–188, 2021, doi: 10.1080/13523260.2021.1882812.
  • 30. S. Haataja, Cyber attacks and international law on the use of force: The turn to information ethics. Abingdon,Oxon, New York: Routledge, 2019.
  • 31. C. J. Finlay, “Just war, cyber war, and the concept of violence,” Philosophy & Technology, vol. 31, no. 3, pp.357–377, 2018, doi: 10.1007/s13347-017-0299-6.
  • 32. F. J. Egloff, J. Shires, “Offensive cyber capabilities and state violence: Three logics of integration,” Journal ofGlobal Security Studies, vol. 7, no. 1, p. ogab028, 2021, doi: 10.1093/jogss/ogab028.
  • 33. C. Schmitt, Political theology: Four chapters on the concept of sovereignty. Chicago: University of Chicago Press, 2005.
  • 34. J. Habermas, The structural transformation of the public sphere: an inquiry into a category of bourgeoissociety. Cambridge: MIT press, 1992.
  • 35. C. Schmitt, “The concept of the political,” in The concept of the political, G. Schwab, Ed. Chicago: University of Chicago Press, 2007, pp. 19–79.
  • 36. J. P. Burgess, N. Mouhleb. (2007). A presentation of the state of societal security in Norway, PRIO International Peace Research Institute, Oslo. [Online]. Available: https://www.prio.org/publications/7197. [Accessed: July 2, 2021].
  • 37. S. Elbe, “Should HIV/AIDS be securitized? The ethical dilemmas of linking HIV/AIDS and security,”International Studies Quarterly, vol. 50, no. 1, pp. 119–144, 2006, doi: 10.1111/j.1468-2478.2006.00395.x.
  • 38. N. J. Jackson, “International organizations, security dichotomies and the trafficking of persons and narcotics,”in “Post-soviet central Asia: A critique of the securitization framework,” Security Dialogue, vol. 37, no. 3, pp. 299–317, 2006.
  • 39. F. Robinson, “Feminist care ethics and everyday insecurities,” in Ethical security studies: A new research agenda, J. Nyman, A. Burke, Eds. Abingdon, Oxon, New York: Routledge, 2016, pp. 116–130.
  • 40. M. Foucault, The archaeology of knowledge. New York: Vintage Books, 2010.
  • 41. L. Tien, “Publishing software as a speech act,” Berkeley Technology Law Journal, vol. 15, no. 2, pp. 629–712, 2000.
  • 42. A. R. Galloway, Protocol: How control exists after decentralization. Cambridge, Mass: MIT Press, 2004.
  • 43. R. Floyd, The morality of security: A theory of just securitization. New York: Cambridge University Press, 2019.
  • 44. S. Ghafur, S. Kristensen, K. Honeyford, G. Martin, A. Darzi, P. Aylin, “A retrospective impact analysis of theWannaCry cyberattack on the NHS,” npj Digital Medicine, vol. 2, no. 1, p. 98, 2019, doi: 10.1038/s41746-019-0161-6.
  • 45. J. Waldron, “The rule of international law,” Harvard Journal of Law and Public Policy, vol. 30, no. 1, pp. 15–30, 2006.
  • 46. R. J. Deibert, “Toward a human-centric approach to cybersecurity,” Ethics & International Affairs, vol. 32, no. 4, pp. 411–424, 2018, doi: 10.1017/S0892679418000618.
  • 47. N. Möllers, “Making digital territory: Cybersecurity, techno-nationalism, and the moral boundaries of the state,”Science, Technology, & Human Values, vol. 46, no. 1, pp. 112–138, 2021, doi: 10.1177/0162243920904436.
  • 48. M. Mueller, Will the Internet fragment? Sovereignty, globalization and cyberspace. Cambridge, UnitedKingdom, Malden: Polity Press, 2017.
  • 49. A. Bradford. (2020). The Brussels effect: How the European Union rules the world, OxfordUniversity Press. [Online]. Available: https://oxford.universitypressscholarship.com/view/10.1093/oso/9780190088583.001.0001/oso-9780190088583. [Accessed: Feb. 13, 2022].
  • 50. M. S. Erie, T. Streinz. (2021). “The Beijing effect: China’s digital silk road as transnational data governance,”New York University Journal of International Law and Politics, vol. 54, no. 1. [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3810256. [Accessed: Feb. 13, 2022].
  • 51. A. Kokas, Trafficking data: How China is winning the battle for digital sovereignty. New York: Oxford University Press, 2022, doi: 10.1093/oso/9780197620502.001.0001.
  • 52. M. Prucková, Cyber attacks and Article 5 – a note on a blurry but consistent position of NATO, NATOCooperative Cyber Defence Centre of Excellence. [Online]. Available: https://ccdcoe.org/library/publications/cyberattacks-and-article-5-a-note-on-a-blurry-but-consistent-position-of-nato/. [Accessed: Nov. 2, 2022].
  • 53. M. N. Schmitt, NATO Cooperative Cyber Defence Centre of Excellence, Eds., Tallinn manual 2.0 onthe international law applicable to cyber operations, 2nd ed. Cambridge, United Kingdom, New York, USA:Cambridge University Press, 2017.
  • 54. F. J. Egloff, “Contested public attributions of cyber incidents and the role of academia,” Contemporary Security Policy, vol. 41, no. 1, pp. 55–81, 2020, doi: 10.1080/13523260.2019.1677324.
  • 55. W. Cong, J. Thumfart, “A Chinese precursor to the digital sovereignty debate: Digital anti-colonialism andauthoritarianism from the Post–Cold War Era to the Tunis Agenda,” Global Studies Quarterly, vol. 2, no. 4, 2022, doi: https://doi.org/10.1093/isagsq/ksac059.
  • 56. U. Nations. (1948, Dec. 10). Universal Declaration of Human Rights. [Online]. Available: https://www.un.org/en/about-us/universal-declaration-of-human-rights. [Accessed: Nov. 14, 2022].
  • 57. M. Michaelsen, J. Thumfart, “Drawing a line: Digital transnational repression against political exiles andhost state sovereignty,” European Journal of International Security, pp. 1–21, 2022, doi: 10.1017/eis.2022.27.
  • 58. A. Mitchell, “Posthuman security / ethics,” in Ethical security studies: A new research agenda, J. Nyman,A. Burke, Eds. Abingdon, Oxon, New York: Routledge, 2016, pp. 60–72.
  • 59. A. Avery. (2020). Cybersecurity Scenario Modeling: Imagining the Black Swans for Digital InfrastructuresRisk Management. [Online]. Available: https://aisel.aisnet.org/sais2020/5. [Accessed: Nov. 14, 2021].
  • 60. I.-C. Tsai, “Flash crash and policy uncertainty,” Journal of International Financial Markets, Institutions andMoney, vol. 57, pp. 248–260, 2018, doi: 10.1016/j.intfin.2018.09.002.
  • 61. K. Bannelier, T. Christakis. (2017). Cyber-Attacks – prevention-reactions: The role of states and privateactors, Les Cahiers de la Revue Défense Nationale, Paris. [Online]. Available: https://ssrn.com/abstract=2941988. [Accessed: Nov. 14, 2021].
  • 62. J. Pattison, “From defence to offence: The ethics of private cybersecurity,” European Journal of International Security, vol. 5, no. 2, pp. 233–254, 2020, doi: 10.1017/eis.2020.6.
  • 63. P. Beuth, J. Breithut. (2021, Sep. 12). 40 Jahre CCC: Chaos macht Politik, Der Spiegel. [Online]. Available: https://www.spiegel.de/netzwelt/netzpolitik/40-jahre-ccc-chaos-macht-politik-a-655ecc5b-d135-4ae5-846e-535d340448c3. [Accessed: Aug. 30, 2022].
  • 64. M. Wigell, H. Mikkola, T. Juntunen. (2021). Best practises in the whole of society approach in countering hybrid threats. [Online]. Available: https://www.europarl.europa.eu/committees/de/best-practises-in-thewhole-of-society-a/product-details/20210531CAN61132. [Accessed: July 1, 2021].
  • 65. Cybersecurity & Infrastructure Security Agency, Joint cyber defense collaborative. [Online]. Available:https://www.cisa.gov/jcdc. [Accessed: Aug. 30, 2022].
  • 66. M. D. Birnhack, N. Elkin-Koren, “The invisible handshake: The reemergence of the state in the DigitalEnvironment,” SSRN Electronic Journal, 2003, doi: 10.2139/ssrn.381020.
  • 67. M. Michaelsen. (2020). The digital transnational repression toolkit, and its silencing effects, Freedom House.[Online]. Available: https://freedomhouse.org/report/special-report/2020/digital-transnational-repressiontoolkit-and-its-silencing-effects. [Accessed: May 29, 2021].
  • 68. European Union. (2016). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across theUnion. [Online]. Available: https://eur-lex.europa.eu/eli/dir/2016/1148/oj. [Accessed: Nov. 4, 2022].
  • 69. The Clean Network. (2017–2021). United States Department of State. [Online]. Available:https://2017-2021.state.gov/the-clean-network/. [Accessed: Sep. 2, 2022].
  • 70. G. Maihold. (2022). A new geopolitics of supply chains: The rise of friend-shoring, Stiftung Wissenschaftund Politik. [Online]. Available: https://www.swp-berlin.org/10.18449/2022C45/. [Accessed: Oct. 26, 2022].
  • 71. F. J. Egloff, J. Shires, “The better angels of our digital nature? Offensive cyber capabilities and state violence,”European Journal of International Security, pp. 1–20, 2021, doi: 10.1017/eis.2021.20.
  • 72. CBS News. (2008, May 8). Epilepsy site hacked with seizure images. [Online]. Available: https://www.cbsnews.com/news/epilepsy-site-hacked-with-seizure-images/. [Accessed: May 17, 2022].
  • 73. A. Deeks, “Confronting and adapting: intelligence agencies and international law,” Virginia Law Review, vol. 102, no. 3, pp. 599–685, 2016.
  • 74. European Council, Malicious cyber-attacks: EU sanctions two individuals and one body over 2015 Bundestaghack. [Online]. Available: https://www.consilium.europa.eu/en/press/press-releases/2020/10/22/malicious-cyberattacks-eu-sanctions-two-individuals-and-one-body-over-2015-bundestag-hack/. [Accessed: Nov. 6, 2022].
  • 75. F. Dumortier, V. Papakonstantinou, P. de Hert. (2020, Sep. 28). EU sanctions against cyber-attacks anddefense rights: Wanna Cry?, European Law Blog. [Online]. Available: https://europeanlawblog.eu/2020/09/28/eu-sanctions-against-cyber-attacks-imposed-and-defense-rights-wanna-cry/. [Accessed: July 20, 2022].
  • 76. BBC News. (2021, Nov. 12). US President Joe Biden tightens restrictions on Huawei and ZTE. [Online]. Available: https://www.bbc.com/news/technology-59262329. [Accessed: Nov. 5, 2022].
  • 77. J. D. Ohlin. (2017). Did Russian cyber interference in the 2016 election violate international law?, TexasLaw Review, vol. 95, no. 7 [Online]. Available: https://texaslawreview.org/russian-cyber-interference-2016-election-violate-international-law/. [Accessed: June 30, 2022].
  • 78. D. Steiger, “Protecting democratic elections against online influencevia ‘fake news’ - and hate speech – thefrench Loi Avia and Loi No. 2018–1202, the GermanNetwork enforcement act and the EU’s Digital Services actinlight of the right to freedom of expression,” in Theory and practice of the European Convention on Human Rights, S. Schiedermair, A. Schwarz, D. Steiger, Eds. Baden-Baden: Nomos, 2022, pp. 165–214.
  • 79. L. Marc, Das NetzDG in der praktischen Anwendung: Eine Teilevaluation des Netzwerkdurchsetzungsgesetzes. Carl Grossmann, 2021. doi: 10.24921/2021.94115953.
  • 80. J. Mchangama, J. Fiss. (2019). The digital Berlin Wall: How Germany (accidentally) created a prototype for global online censorship, Justitia, Copenhagen. [Online]. Available: https://globalfreedomofexpression. columbia.edu/wp-content/uploads/2019/11/Analyse_The-Digital-Berlin-Wall-How-Germany-Accidentally-Created-a-Prototype-for-Global-Online-Censorship.pdf. [Accessed: Nov. 5, 2022].
  • 81. Human Rights Watch. (2018, Feb. 14). Germany: Flawed social media law. [Online]. Available: https://www.hrw.org/news/2018/02/14/germany-flawed-social-media-law. [Accessed: Sep. 8, 2022].
  • 82. B. Baade. (2022, Mar. 8). The EU’s ‘Ban’ of RT and Sputnik, Verfassungsblog. [Online]. Available: https://verfassungsblog.de/the-eus-ban-of-rt-and-sputnik/. [Accessed: Apr. 6, 2022].
  • 83. S. Bradshaw, R. DiResta, C. Miller, “Playing both sides: Russian state-backed media coverageof the #blacklivesmatter movement,” The International Journal of Press/Politics, 2022, doi: 10.1177/19401612221082052.
  • 84. T. Snyder, The road to unfreedom: Russia, Europe, America. New York: Tim Duggan Books, 2018.
  • 85. B. de Spinoza, Theological-political treatise. Cambridge, New York: Cambridge University Press, 2007.
  • 86. S. Krempl. (2022, Mar. 24). NetzDG-Streit mit Telegram: Deutsche Justiz wendet Zustellungstrick an, heiseonline. [Online]. Available: https://www.heise.de/news/NetzDG-Streit-mit-Telegram-Deutsche-Justiz-wendet-Zustellungstrick-an-6624629.html. [Accessed: Sep. 8, 2022].
  • 87. D. A. Scheufele, N. M. Krause, “Science audiences, misinformation, and fake news,” Proceedings of theNational Academy of Sciences, vol. 116, no. 16, pp. 7662–7669, 2019, doi: 10.1073/pnas.1805871115.
  • 88. L. M. Hurel, L. C. Lobato, “Unpacking cyber norms: private companies as norm entrepreneurs,” Journal of Cyber Policy, vol. 3, no. 1, pp. 61–76, 2018, doi: 10.1080/23738871.2018.1467942.
  • 89. C. M. Glen, “Norm entrepreneurship in global cybersecurity,” Politics & Policy, vol. 49, no. 5, pp. 1121–1145, 2021, doi: 10.1111/polp.12430.
  • 90. R. Caplan, “The Artisan and the Decision Factory: The organizational dynamics of private speechgovernance,” in Digital technology and democratic theory, L. Bernholz, H. Landemore, R. Reich, Eds. Chicago: University of Chicago Press, 2020, pp. 167–190.
  • 91. J. Thumfart, “Francisco de Vitoria and the Nomos of the Code: The Digital Commons and NaturalLaw, digital communication as a human right, just cyber-warfare,” in At the origins of modernity, vol. 10, J. M. Beneyto, J. Corti Varela, Eds. Cham: Springer International Publishing, 2017, pp. 197–217.
  • 92. D. Barnard-Wills, L. Cochrane, K. Matturi, F. Marchetti. (2019). Report on the SME experience of theGDPR, Trilateral Research, Budapest - Brussels - Waterford, STAR II Deliverable D2.2. [Online]. Available:https://www.trilateralresearch.com/wp-content/uploads/2020/01/STAR-II-D2.2-SMEs-experience-with-the-GDPR-v1.0-.pdf. [Accessed: Nov. 5, 2022].
  • 93. European Parliament. (2022, Mar. 24). Deal on digital markets act: Ensuring fair competition and more choicefor users. [Online]. Available: https://www.europarl.europa.eu/news/en/press-room/20220315IPR25504/dealon-digital-markets-act-ensuring-fair-competition-and-more-choice-for-users. [Accessed: Apr. 14, 2022].
  • 94. European Parliament. (2020). Digital Services Act – questions and answers. [Online]. Available: https://ec.europa.eu/commission/presscorner/detail/en/QANDA_20_2348. [Accessed: Apr. 14, 2022].
  • 95. V. Lehdonvirta, Cloud empires: How digital platforms are overtaking the state and how we can regaincontrol. Cambridge, Massachusetts: The MIT Press, 2022.
  • 96. H. Gandhi, “Active cyber defense certainty: A digital self-defense in the modern age,” Oklahoma CityUniversity Law Review, vol. 43, pp. 101–131, 2019.
  • 97. C. McClellan, E. Tekin, “Stand your ground laws, homicides, and injuries,” Journal of Human Resources, vol. 52, no. 3, pp. 621–653, 2017, doi: 10.3368/jhr.52.3.0613-5723R2.
  • 98. J. Bülte, “Zur Verhältnismäßigkeit der Notwehr und Art. 103 Abs. 2 GG als Schranken-Schranke,” NeueKriminalpolitik, vol. 28, no. 2, pp. 172–192, 2016.
  • 99. T. Graves. (2019, June 28). Text - H.R.3270 -116th Congress (2019–2020): Active Cyber DefenseCertainty Act. [Online]. Available: https://www.congress.gov/bill/116th-congress/house-bill/3270/text. [Accessed: July 1, 2021].
  • 100. M. Noone. (2018, Feb. 2). Self-defense goes cyber: Congress considers a bill permitting victims of cyberattacks to ‘hack back’, University of Baltimore Law Review. [Online]. Available: https://ubaltlawreview.com/2018/02/02/self-defense-goes-cyber-congress-considers-a-bill-permitting-victims-of-cyberattacks-tohack- back/. [Accessed: Sep. 4, 2022].
  • 101. M. Giles. (2019). Five reasons ‘hacking back’ is a recipe for cybersecurity chaos, MIT Technology Review. [Online]. Available: https://www.technologyreview.com/2019/06/21/134840/cybersecurity-hackers-hackingback-us-congress/. [Accessed: Sep. 10, 2022]
  • 102. A. Howell, M. Richter-Montpetit, “Is securitization theory racist? Civilizationism, methodologicalwhiteness, and antiblack thought in the Copenhagen school,” Security Dialogue, vol. 51, no. 1, pp. 3–22, 2020, doi: 10.1177/0967010619862921.
  • 103. S.-y. Peng, “Cybersecurity threats and the WTO national security exceptions,” Journal of International Economic Law, vol. 18, no. 2, pp. 449–478, 2015, doi: 10.1093/jiel/jgv025.
  • 104. S. Nebehay. (2020, June 11). China hits back at U.S. telecom supply chain order at WTO, Reuters. [Online]. Available: https://www.reuters.com/article/us-usa-trade-china-wto-idUSKBN23I32V. [Accessed: Nov. 2, 2022].
  • 105. J. Cohen. (2007). Cyberspace as/and space, Georgetown Law Faculty Publications and Other Works.[Online]. Available: https://scholarship.law.georgetown.edu/facpub/807. [Accessed: Nov. 2, 2022].
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-28f5cd91-3788-45fc-a1a2-f978e5b29ce8
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.