사이버안전 관련 국제규범의 정립을 위한 연구
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 박노형 | - |
dc.date.accessioned | 2021-12-31T23:40:53Z | - |
dc.date.available | 2021-12-31T23:40:53Z | - |
dc.date.created | 2021-08-31 | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 1226-6159 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/133905 | - |
dc.description.abstract | In recent years, several efforts to combat threats posed in cyberspace have been made globally and states have been increasing their efforts to prepare for future cyber attack. In this regard, this article examine how to address cyber security issues throughout introduction of international legal regimes. There is a broad range of hostile or malicious action in cyberspace such as cyber war, cyber espionage and cyber crime. Imprecision in terminology hampers serious discussion of these issues. Part I examines how these blurring concept of cyber conflicts can be clarified to derive legal countermeasures against concurrent phenomenon. Cyber war can be defined as the use of force to cause damage, destruction or casualties for military purpose targeting an opponent state. Provided that cyber war using cyber weapons constitutes international armed conflict, principles of the U.N. Charter and International Humanitarian Law are applicable to cyber war. Regarding protection of private and civilian facilities which does not fall within the scope of military objective, international cooperation system must be implemented for cyber security throughout introduction of related international organizations. Contrary to the cyber war, cyber espionage is difficult to be regulated by international norms. Although it may be interpreted as electronic preparation of battlefield, it is neither plausible to investigate all of the spy action nor apply the law of armed conflict. Cyber crime, intended cyber attack by individuals, is technically differentiated with cyber war. The identity of those who engage in these crimes, however, can be indeterminate, and these activities overlap with cyber war at some extent. Part II explore into several cyber security strategy, especially one of the U.S., to create and secure international agenda for cyber defense. This part first examines whether cyber deterrence strategy would work based on a state's public discussion. The paper further analyze the blue print of the international treaty on the use of cyber weapons reflecting fundamental characters of cyber threats. The author finally derive the necessity of international agreements to prohibit cyber attacks towards civilian and non-governmental facilities. | - |
dc.language | Korean | - |
dc.language.iso | ko | - |
dc.publisher | 안암법학회 | - |
dc.title | 사이버안전 관련 국제규범의 정립을 위한 연구 | - |
dc.title.alternative | Establishment of International Norms for Cyber Security | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | 박노형 | - |
dc.identifier.bibliographicCitation | 안암법학, no.37, pp.795 - 822 | - |
dc.relation.isPartOf | 안암법학 | - |
dc.citation.title | 안암법학 | - |
dc.citation.number | 37 | - |
dc.citation.startPage | 795 | - |
dc.citation.endPage | 822 | - |
dc.type.rims | ART | - |
dc.identifier.kciid | ART001631741 | - |
dc.description.journalClass | 2 | - |
dc.description.journalRegisteredClass | kci | - |
dc.subject.keywordAuthor | 사이버안전(Cyber Security) | - |
dc.subject.keywordAuthor | 사이버전쟁(Cyber War) | - |
dc.subject.keywordAuthor | 사이버첩보(Cyber Espionage) | - |
dc.subject.keywordAuthor | 사이버범죄(Cyber Crime) | - |
dc.subject.keywordAuthor | 사이버안전 국제기구(Cyber Security International Organization) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.