On the Risks of Relying on Analogies to Understand Cyber Conflicts

Efforts to regulate cyber conflicts—and cyber-defence postures more generally— rose to prominence almost a decade ago, when the risks for national and international security and stability arising from the cyber domain became clear. As I argued elsewhere (Taddeo 2014), these efforts often rely on an analogy-based approach, according to which the regulatory problems concerning cyber conflicts are only apparent, insofar as these are not radically different from other forms of conflicts. Those endorsing this approach claim that the existing legal framework governing armed conflicts is sufficient to regulate the cyber battlefield. All that is needed is an in-depth analysis of such laws and an adequate interpretation of the phenomena. As Schmitt stresses.

[1]  FloridiLuciano The Method of Levels of Abstraction , 2008 .

[2]  T. Stevens,et al.  Analogical reasoning and cyber security , 2013, Security Dialogue.

[3]  L. Floridi,et al.  Data ethics , 2021, Effective Directors.

[4]  M. Taddeo,et al.  Ethics and Policies for Cyber Operations , 2017 .

[5]  Mary Ellen O'Connell Cyber Security Without Cyber War , 2012 .

[6]  Michael N. Schmitt Cyberspace and International Law: The Penumbral Mist of Uncertainty , 2013 .

[7]  Randall R. Dipert,et al.  THE ESSENTIAL FEATURES OF AN ONTOLOGY FOR CYBERWARFARE , 2016 .

[8]  Luciano Floridi,et al.  Toleration and the Design of Norms , 2015, Sci. Eng. Ethics.

[9]  Herbert Lin,et al.  Cyber conflict and international humanitarian law , 2012, International Review of the Red Cross.

[10]  M. Engelmann The Philosophical Investigations , 2013 .

[11]  Edsger W. Dijkstra,et al.  Structured programming , 1972, A.P.I.C. Studies in data processing.

[12]  N. Falconer Structured Programming , 1973, Nature.

[13]  R. Powell,et al.  Nuclear Deterrence Theory: The Search for Credibility , 1990 .

[14]  M. Taddeo Information Warfare: A Philosophical Perspective , 2011, Philosophy & Technology.

[15]  Mario Blaser POLITICAL ONTOLOGY , 2009 .

[16]  L. Floridi,et al.  The Ethics of Information Warfare , 2014 .

[17]  P. Howard,et al.  Routledge Handbook of Internet Politics , 2018 .

[18]  Mariarosaria Taddeo,et al.  Just Information Warfare , 2014, Topoi.

[19]  Robert E. Goodin,et al.  The Oxford Handbook of Political Science , 2011 .