Abstract
Cyber attacks are escalating in frequency, impact, and sophistication. For this reason, it is crucial to identify and define regulations for state behaviour and strategies to deploy countering measures that would avoid escalation and disproportionate use of cyber means, while protecting and fostering the stability of our societies. To this end, strategies to deter cyber attacks and norms regulating state behaviour in cyberspace are both necessary; unfortunately neither is available at the moment. In this chapter, I offer a theory of cyber deterrence and a set of policy recommendations to fill this vacuum.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/, accessed on the 20.06.2019.
- 2.
https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html?_r=0, accessed on the 20.06.2019.
- 3.
https://www.symantec.com/connect/blogs/greenbug-cyberespionage-group-targeting-middle-east-possible-links-shamoon, accessed on the 20.06.2019.
- 4.
http://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm, accessed on the 20.06.2019.
- 5.
http://arstechnica.com/security/2014/07/how-elite-hackers-almost-stole-the-nasdaq/, accessed on the 20.06.2019.
- 6.
http://www.c4isrnet.com/articles/cyber-red-lines-ambiguous-by-necessity, accessed on the 20.06.2019.
- 7.
https://www.thecipherbrief.com/column_article/no-thing-cyber-deterrence-please-stop, accessed on the 20.06.2019.
- 8.
https://www.darpa.mil/program/cyber-grand-challenge, accessed on the 20.06.2019.
- 9.
https://www.justsecurity.org/42768/international-cyber-law-politicized-gges-failure-advance-cyber-norms/, accessed on the 20.06.2019.
References
Arquilla. 1999. Ethics and Information Warfare. In Strategic Appraisal: The Changing Role of Information in Warfare, ed. Zalmay Khalilzad and John Patrick White, 379–401. Santa Monica: RAND.
Arquilla, J., and Douglas A. Borer. 2007. Information Strategy and Warfare: A Guide to Theory and Practice. New York: Routledge.
Betz, D.J., and T. Stevens. 2013. Analogical Reasoning and Cyber Security. Security Dialogue 44 (2): 147–164. https://doi.org/10.1177/0967010613478323.
Cybersecurity Ventures. 2017. 2017 Cybercrime Report. https://cybersecurityventures.com/2015-wp/wp-content/uploads/2017/10/2017-Cybercrime-Report.pdf.
Denning, D.E. 2007. The Ethics of Cyber Conflict. In Information and Computer Ethics. Hoboken: Wiley.
Dipert, R. 2010. The Ethics of Cyberwarfare. Journal of Military Ethics 9 (4): 384–410.
Eriksson, Johan, and Giampiero Giacomello. 2006. The Information Revolution, Security, and International Relations: (IR)Relevant Theory? International Political Science Review 27 (3): 221–244. https://doi.org/10.1177/0192512106064462.
European Union. 2015. Cyber Diplomacy: Confidence-Building Measures – Think Tank. Brussels. http://www.europarl.europa.eu/thinktank/en/document.html?reference=EPRS_BRI(2015)571302.
Farwell, James P., and Rafal Rohozinski. 2011. Stuxnet and the Future of Cyber War. Survival 53 (1): 23–40. https://doi.org/10.1080/00396338.2011.555586.
Floridi, L. 2014. The Fourth Revolution, How the Infosphere Is Reshaping Human Reality. Oxford: Oxford University Press.
Floridi, Luciano, and Mariarosaria Taddeo, eds. 2014a. The Ethics of Information Warfare. New York: Springer.
———, eds. 2014b. The Ethics of Information Warfare, Law, Governance and Technology Series. Vol. 14. Heidelberg: Springer.
———. 2016. What Is Data Ethics? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374 (2083). https://doi.org/10.1098/rsta.2016.0360.
G7 Declaration. 2017. G7 Declaration on Responsible State Behavior in cybeRspace. Lucca. http://www.mofa.go.jp/files/000246367.pdf.
Harknett, Richard J., and O. Emily Goldman. 2016. The Search for Cyber Fundamental. Journal of Information Warfare 15 (2): 81–88.
Lin, Herbert. 2012. Cyber Conflict and International Humanitarian Law. International Review of the Red Cross 94 (886): 515–531. https://doi.org/10.1017/S1816383112000811.
Markets and Markets. 2015. Cyber Security Market by Solutions & Services – 2020. http://www.marketsandmarkets.com/Market-Reports/cyber-security-market-505.html?gclid=CNb6w7mt8MgCFQoEwwodZVQD-g.
Morgan, Patrick M. 2012. The State of Deterrence in International Politics Today. Contemporary Security Policy 33 (1): 85–107. https://doi.org/10.1080/13523260.2012.659589.
O’Connell, M.E. 2012. Cyber Security Without Cyber War. Journal of Conflict and Security Law 17 (2): 187–209. https://doi.org/10.1093/jcsl/krs017.
Schmitt, M. 2013. Cyberspace and International Law: The Penumbral Mist of Uncertainty. Harvard 126 (176): 176–180.
Steinhoff, Uwe. 2007. On the Ethics of War and Terrorism. Oxford/New York: Oxford University Press.
Taddeo, Mariarosaria. 2011. Information Warfare: A Philosophical Perspective. Philosophy & Technology 25 (1): 105–120. https://doi.org/10.1007/s13347-011-0040-9.
———. 2012a. An Analysis for a Just Cyber Warfare. In 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1–10. NATO CCD COE and IEEE Publication.
———. 2012b. Information Warfare: A Philosophical Perspective. Philosophy and Technology 25 (1): 105–120.
———. 2013. Cyber Security and Individual Rights, Striking the Right Balance. Philosophy & Technology 26 (4): 353–356. https://doi.org/10.1007/s13347-013-0140-9.
———. 2014a. Just Information Warfare. Topoi, April, 1–12. https://doi.org/10.1007/s11245-014-9245-8.
———. 2014b. The Struggle Between Liberties and Authorities in the Information Age. Science and Engineering Ethics. https://doi.org/10.1007/s11948-014-9586-0.
———. 2016. On the Risks of Relying on Analogies to Understand Cyber Conflicts. Minds and Machines 26 (4): 317–321. https://doi.org/10.1007/s11023-016-9408-z.
———. 2017. Cyber Conflicts and Political Power in Information Societies. Minds and Machines 27 (2): 265–268. https://doi.org/10.1007/s11023-017-9436-3.
———. 2018. How to Deter in Cyberspace. The European Centre of Excellence for Countering Hybrid Threats 2018 (6): 1–10.
Taddeo, Mariarosaria, and Elizabeth Buchanan. 2015. Information Societies, Ethical Enquiries. Philosophy & Technology 28 (1): 5–10. https://doi.org/10.1007/s13347-015-0193-z.
Taddeo, Mariarosaria, and Luciano Floridi. 2018a. Regulate Artificial Intelligence to Avert Cyber Arms Race. Nature 556 (7701): 296–298. https://doi.org/10.1038/d41586-018-04602-6.
———. 2018b. How AI Can Be a Force for Good. Science 361 (6404): 751–752. https://doi.org/10.1126/science.aat5991.
Wittgenstein, Ludwig. 2009. Philosophical Investigations, Rev. 4th edn. Chichester/Malden: Wiley-Blackwell.
Yang, Guang-Zhong, Pierre E. Jim Bellingham, Peer Fischer Dupont, Luciano Floridi, Robert Full, Neil Jacobstein, et al. 2018. The Grand Challenges of Science Robotics. Science Robotics 3 (14): eaar7650. https://doi.org/10.1126/scirobotics.aar7650.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Taddeo, M. (2020). Norms and Strategies for Stability in Cyberspace. In: Burr, C., Milano, S. (eds) The 2019 Yearbook of the Digital Ethics Lab. Digital Ethics Lab Yearbook. Springer, Cham. https://doi.org/10.1007/978-3-030-29145-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-29145-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29144-0
Online ISBN: 978-3-030-29145-7
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)