The Open World, Hackbacks and Global Justice


Book Description

This book explores the current impasse that global regulators face in the digital sphere. Computer technology has advanced human civilization tenfold, but the freedom to interact with others in cyberspace has made individuals, discrete communities, organizations and governments more vulnerable to abuse. In consequence, political decision-makers are seriously considering granting limited legal immunity to victims who decide to ‘hack- back.’ Many victims frustrated by the slow pace of law enforcement in cyberspace have chosen to ‘take the law into their own hands,’ retaliating against those who have stolen valuable data and damaged network operations. Political deliberations about limited immunity for hackbacks usually ignore global justice and moral justifications for ‘active defense’ policies. Typically, cyber security policies balance deterrence against two different understandings of morality and the ‘good life’ : fairness or welfare. This book proposes a third moral rationale for cyber security policies : capability theory, developed principally by Amartya Sen and Martha Nussbaum. Properly formulated, a capability-based defense of retaliatory hackbacks can minimize attribution and cyber-escalation risks, deter bad behavior by casual computer users, disingenuous security experts, big tech companies, criminals and rogue governments, and satisfy calls for more retributive and distributive justice in the ‘open world’. This book will appeal to legal theorists, political philosophers, social activists, investors, international relations scholars and businesspeople in the tech community.




Legislative Calendar


Book Description







Stakeholder Perspectives on ICANN


Book Description







The Normative Order of the Internet


Book Description

There is order on the internet, but how has this order emerged and what challenges will threaten and shape its future? This study shows how a legitimate order of norms has emerged online, through both national and international legal systems. It establishes the emergence of a normative order of the internet, an order which explains and justifies processes of online rule and regulation. This order integrates norms at three different levels (regional, national, international), of two types (privately and publicly authored), and of different character (from ius cogens to technical standards). Matthias C. Kettemann assesses their internal coherence, their consonance with other order norms and their consistency with the order's finality. The normative order of the internet is based on and produces a liquefied system characterized by self-learning normativity. In light of the importance of the socio-communicative online space, this is a book for anyone interested in understanding the contemporary development of the internet. This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations.




Research Handbook on Human Rights and Digital Technology


Book Description

In a digitally connected world, the question of how to respect, protect and implement human rights has become unavoidable. This contemporary Research Handbook offers new insights into well-established debates by framing them in terms of human rights. It examines the issues posed by the management of key Internet resources, the governance of its architecture, the role of different stakeholders, the legitimacy of rule making and rule-enforcement, and the exercise of international public authority over users. Highly interdisciplinary, its contributions draw on law, political science, international relations and even computer science and science and technology studies.




Critical Infrastructure Protection


Book Description

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.