Jimma University Open access Institutional Repository

Application of international humanitarian law to cyber warfare: critical analysis

Show simple item record

dc.contributor.author Yiheyis K/Mariyam
dc.date.accessioned 2020-12-15T12:57:21Z
dc.date.available 2020-12-15T12:57:21Z
dc.date.issued 2018-06
dc.identifier.uri http://10.140.5.162//handle/123456789/3774
dc.description.abstract Contemporarily it is axiomatic that individuals, organizations and states rely on the cyber space and its tools for their everyday activities ranging from sending an email to controlling critical system and infrastructure. Alongside such extensive utilization there arises a great risk that such systems and infrastructures may became the target of malicious cyber-attacks by the adversary during armed conflict. This raises a question whether and, if so, how the existing rules of IHL apply to cyber warfare cases. In this respect there is a general consensus that cyber-attacks that amount to or carried out in the context of an armed conflict are subjected to the existing rules and principles of IHL. The controversy lies on how to transpose the existing rules of IHL to a warfare conducted in cyberspace through cyber means and methods, if they are meant to achieve the objective of protecting victims of armed conflict. By following a consequence based interpretation of armed conflict and attack this paper argues that for the most part the existing rules of IHL seems to provide sufficient protection to victims of armed conflict. However, given the unique features of the cyber space there are some problems that require the evolvement of the existing rules of IHL. en_US
dc.language.iso en en_US
dc.title Application of international humanitarian law to cyber warfare: critical analysis en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IR


Browse

My Account