When You Can’t Afford to Miss: Likelihood of Success and Discrimination in Cyberwarfare

Offense dominance in cyberspace is taken by many as a given. However, this is not a consensus position, with several scholars arguing that cyberattacks that produce meaningful kinetic effects on their prescribed targets are enormously costly and painstakingly slow. This poses an issue at the nexus o...

Full description

Saved in:  
Bibliographic Details
Main Author: Knight, Adam (Author)
Format: Electronic Article
Language:English
Check availability: HBZ Gateway
Journals Online & Print:
Drawer...
Fernleihe:Fernleihe für die Fachinformationsdienste
Published: Routledge, Taylor & Francis Group 2024
In: The review of faith & international affairs
Year: 2024, Volume: 22, Issue: 2, Pages: 61–72
Further subjects:B likelihood of success
B internet security
B cyberwar
B Just War
Online Access: Volltext (lizenzpflichtig)

MARC

LEADER 00000naa a22000002 4500
001 188880727X
003 DE-627
005 20240516055505.0
007 cr uuu---uuuuu
008 240516s2024 xx |||||o 00| ||eng c
024 7 |a 10.1080/15570274.2024.2335070  |2 doi 
035 |a (DE-627)188880727X 
035 |a (DE-599)KXP188880727X 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 0  |a 1  |2 ssgn 
100 1 |a Knight, Adam  |e VerfasserIn  |4 aut 
245 1 0 |a When You Can’t Afford to Miss: Likelihood of Success and Discrimination in Cyberwarfare 
264 1 |c 2024 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Offense dominance in cyberspace is taken by many as a given. However, this is not a consensus position, with several scholars arguing that cyberattacks that produce meaningful kinetic effects on their prescribed targets are enormously costly and painstakingly slow. This poses an issue at the nexus of Just War Theory’s likelihood of success and discrimination doctrines. Initiating (or escalating) a conflict should only occur if the initiator has a reasonable likelihood of success. That success may be made more likely by overlooking the requirement that weapons be able to discriminate between targets and non-targets, especially under circumstances in which time is of the essence. Furthermore, even if non-target systems are not destroyed, their infection can facilitate the discovery of a cyberweapon, inspiring copycat weapons and attacks. 
650 4 |a internet security 
650 4 |a cyberwar 
650 4 |a likelihood of success 
650 4 |a Just War 
773 0 8 |i Enthalten in  |t The review of faith & international affairs  |d Arlington, Va. : Routledge, Taylor & Francis Group, 2005  |g 22(2024), 2, Seite 61–72  |h Online-Ressource  |w (DE-627)662163788  |w (DE-600)2612695-3  |w (DE-576)346017173  |x 1931-7743  |7 nnns 
773 1 8 |g volume:22  |g year:2024  |g number:2  |g pages:61–72 
856 4 0 |u https://doi.org/10.1080/15570274.2024.2335070  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
912 |a NOMM 
935 |a mteo 
951 |a AR 
ELC |a 1 
ITA |a 1  |t 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4524036504 
LOK |0 003 DE-627 
LOK |0 004 188880727X 
LOK |0 005 20240516055505 
LOK |0 008 240516||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-Tue135)IxTheo#2024-05-15#34CFA4D6D19346782B2B92B535DB33F9011D5290 
LOK |0 040   |a DE-Tue135  |c DE-627  |d DE-Tue135 
LOK |0 092   |o n 
LOK |0 852   |a DE-Tue135 
LOK |0 852 1  |9 00 
LOK |0 935   |a ixzs  |a zota 
ORI |a TA-MARC-ixtheoa001.raw 
REL |a 1 
SUB |a REL