This is my senior thesis for undergraduate. I am hoping to ground the paper in international relations. Cyber activity is the thing I am analyzing and its role in the context of international relations. Also i was hoping to analyze three cases, two being Stuxnet and Duqu. Sources can range between two to five. Would greatly appreciate a reference sheet in Chicago style. Thank you.
Topic question: What are the legal requirements in international relations of governments for cyber-attacks?
Description:
The overarching theme I wish to focus my thesis on is terrorism in the form of cyberwarfare This is fine but drop the terrorism part- some cyberattacks may be terrorist, some are not so keep the focus on cyberattacks to avoid getting sidetracked into the whole terrorism debate. The reason I chose to research this topic over others is because more and more governments are beginning to transition their data and other sensitive information onto digital platforms (e.g. online databases) which can be compromised- so do you just want to look at cyberattacks on information databases or cyberattacks in general- for instance, these could be on infrastructure, on weapons, or even on corporations (like the Sony attack).
In particular, I wish to focus on how the change in the scope of power from hard power to soft power has also shifted in the process of military attacks to cyberattack- cyberattacks would also fall under hard power depending on the target of the attack. As of now, there is a gray area as to how cyber-attacks fit into the framework of humanitarian law- better to think of it how it fits into the legal framework for war. In order for cyber-attacks to be viewed in the same light as armed attacks it is necessary for cyber-attacks to fit into the same framework of humanitarian law that armed attacks are- why? Not really necessary- unless you make the case.
Currently there are existing documents identifying governments responsibilities in conducting? military strikes- unsure what this means? Do you mean obligations?. Therefore, I wish to develop an analytical-descriptive method based on these existing documents to identify governments responsibilities for their cyberattacks. Cyber-attacks, like armed attacks, impact humanity in a variety of ways- potentially, yes. Cyberattacks can target a large variety of sectors within a government- so one thing to decide on is what kind of cyberattacks you’re interested in- maybe pick two that target different types of entities- government or civilian. The damage done by these attacks can also vary substantially. To limit this scope I will create two baskets of cyberattacks: one which warrants legitimate defense, to the same degree that a government would take in an armed attack situation, and one which does not.
Either way- Definitely identify some cases of cyberattacks so that you ground your paper in something concrete- Stuxnet is an important case, Russian attacks in Estonia in the mid 2000s are also important as is U.S. cyberattacks on Russian powergrids.
And read Joseph Nye’s work on cyberdetterence and Susan Hennesey to get started on an understanding of the issues.
Sources:
International Relations:
State actors:
Cases:
Regions:
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more
Recent Comments