
Cyber-Attack Regulation: Issues and Advances in International Law
- 1 University of Exeter
* Author to whom correspondence should be addressed.
Abstract
With the development of network technology, cyber-attacks and cyber wars are likely to become new forms of warfare that endanger world peace. The current international law has difficulties in the definition of national sovereignty, the identification of national responsibility and the exercise of the right of self-defense when cyber-attacks occur. The international community needs to supplement and improve the existing rule system as soon as possible and impose stronger legal constraints on transnational cyber-attacks. Some measures can be taken to solve this problem. Firstly, countries around the world should be promoted to reach a consensus on the legal concept of “cyber sovereignty”. Secondly, the applicable conditions of the current law need to be clarified. That is to say, the national responsibility for cyber-attacks and a clearer interpretation of “threat or use of force” and “armed attack” should be clarified. Meanwhile, the circumstances and methods of exercising the right of self-defense should be clarified when a cyber-attack is encountered. Thirdly, new rules of international law and relevant international soft laws should be created to solved these problems.
Keywords
cyber-attack, cyberwarfare, cybercrime, law of war, international law
[1]. David E. S. (2012). Obama Order Sped Up Wave of Cyberattacks Against Iran, New York Times. Retrieved from https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?smid=url-share.
[2]. Charles J. (2010). Stuxnet: Cyber warfare’s game-changer, Part One. SC Media. Retrieved from https://www.scmagazine.com/news/cybercrime/stuxnet-cyber-warfares-game-changer-part-one.
[3]. James G. (2020). Vice Chairman Discusses Weapons of Mass Destruction at Symposium. Defense News, Retrieved from https://www.defense.gov/Explore/News/Article/Article/2351492/vice-chairman-discusses-weapons-ofmass-destruction-at-symposium/.
[4]. Huang J.J. (2020). The Right to Self-Defense of Cyber War from the Perspective of International Law, Tianjin University of Finance and Economics.
[5]. Vienna Convention on the Law of Treaties, 1969.
[6]. Declaration on Principles of International Law concerning Friendly Relations and Cooperation among States in accordance with the Charter of the United Nations, 1970.
[7]. Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction, 1972.
[8]. Protocol on Blinding Laser Weapons (Protocol IV to the 1980 Convention), 1995.
[9]. Zhu Y.X. (2011). Analysis of “Use of Force” Constituted by Computer Network Attack, Journal of Xi’an Politics Institute, 24:100-105.
[10]. Summaries of Judgments, Advisory Opinions and Orders of the International Court of Justice (1992-1996), 94-104. Retrieved from https://legal.un.org/icjsummaries/documents/english/st_leg_serf1_add1.pdf.
[11]. Jens D.O. Kevin G., Claire F. (2015). Cyberwar Law and Ethics for Virtual Conflicts, Oxford University Press, New York.
[12]. Huang S.Q. (2019). The Regulation of International Law on Cyber Warfare, South China University of Technology.
[13]. Nie J.J. (2019). Research on the Regulation of Cyber War by International Law, Yantai University.
[14]. Li Y., Yuan L.L. (2021). The Situation, Motivation and Future Trend of Sino-US Strategic Game in Cyberspace, Journal of Zhengzhou University: Philosophy and Social Sciences Edition, 6: 27-33.
[15]. Song G.S., Zheng Z. (2023). International Legal Regulation of Militarized Cyber Attacks: Reflection and Response, Journal of Guangxi Administrative Cadre Institute of Politics and Law, 38: 46-54.
[16]. Zhang H. (2022). The Legal Approach of Applying the Prohibition of the Use of Force Doctrine in Cyberspace, China Legal Science, 2: 283-304.
Cite this article
Cai,H. (2023). Cyber-Attack Regulation: Issues and Advances in International Law. Lecture Notes in Education Psychology and Public Media,19,7-14.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 4th International Conference on Educational Innovation and Philosophical Inquiries
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).