Proportionality in cyberwar and just war theory

被引:1
作者
Hjorthen, Fredrik D. D. [1 ,3 ]
Pattison, James [2 ]
机构
[1] Univ Oslo, Dept Polit Sci, Oslo, Norway
[2] Univ Manchester, Dept Polit, Manchester, England
[3] Boks 1097 Blindern, N-0317 Oslo, Norway
关键词
Cyberwar; just war theory; proportionality; ideal theory; non-ideal theory; ALLOCATION; NECESSITY; DEFENSE;
D O I
10.1080/16544951.2023.2179244
中图分类号
B82 [伦理学(道德学)];
学科分类号
摘要
Which harms and benefits should be viewed as relevant when considering whether to launch cyber-measures? In this article, we consider this question, which matters because it is central to determining whether cyber-measures should be launched. Several just war theorists hold a version of what we call the 'Restrictive View', according to which there are restrictions on the sorts of harms and benefits that should be included in proportionality assessments about the justifiability of going to war (whether cyber or kinetic). We discuss two such views - the Just Cause Restrictive View and Rights-based Restrictive View - and find both wanting. By contrast, we defend what we call the 'Permissive View'. This holds that all potential goods and bads should be included in proportionality decisions about cyber-measures, even those that appear to be trivial, and where the various harms and benefits are given different weights, according to their agent-relative and agent-neutral features. We argue further that accepting the Permissive View has broader implications for the ethical frameworks governing cyberwar, both in terms of whether cyberattack provide just cause for coercive responses, including kinetic warfare and cyber-responses, and whether cyber-measures should be governed by just war theory or a new theory for cyber-operations.
引用
收藏
页码:1 / 24
页数:24
相关论文
共 77 条
[1]   A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate [J].
Agrafiotis, Ioannis ;
Nurse, Jason R. C. ;
Goldsmith, Michael ;
Creese, Sadie ;
Upton, David .
JOURNAL OF CYBERSECURITY, 2018, 4 (01)
[2]  
Allhoff F., 2016, Binary bullets: The ethics of cyberwarfare
[3]  
[Anonymous], 2005, Ethics and International Affairs, V19, P1
[4]  
[Anonymous], 2021, NEW YORK TIMES
[5]  
[Anonymous], 2016, Into the Gray Zone: The Private Sector and Active Defense Against Cyber Threats, P6
[6]  
BBC, 2015, BBC NEWS 0103
[7]  
BBC, 2022, BBC NEWS 0224
[8]  
BBC, 2020, BBC NEWS 1203
[9]  
BBC, 2021, BBC NEWS 0608
[10]  
Bellaby Ross W., 2016, Journal of Military Ethics, V15, P299, DOI [DOI 10.1080/15027570.2017.1284463, 10.1080/15027570.2017.1284463]