Abstract

AbstractI examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle.Related ArticlesGlen, Carol. 2021. “Norm Entrepreneurship in Global Cybersecurity.” Politics & Policy 49(5): 1121–45. https://doi.org/10.1111/polp.12430.Glen, Carol M. 2014. “Internet Governance: Territorializing Cyberspace?” Politics & Policy 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full.Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. “China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of ‘Internet Sovereignty.’” Politics & Policy 45(3): 432–64. https://doi.org/10.1111/polp.12202.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.