StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Emergency, Exception and New Technologies in International Relations - Essay Example

Cite this document
Summary
In his 2012 article titled “Cyber Conflict and International Humanitarian Law”, Herbert Lin highlights the vulnerability to cyber conflict which the globe is continually immersing itself into. This emergence is caused by the fact that Information Technology, IT, has become…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Emergency, Exception and New Technologies in International Relations
Read Text Preview

Extract of sample "Emergency, Exception and New Technologies in International Relations"

Download file to see previous pages

In it, malicious actions such as usurping, destroying, altering, disabling, or damaging them occur. These are collectively known as “cyber attacks.” Lin asserts that cyber conflict has attained a level where it is a humanitarian issue but it is still not fully addressed by existing interventions such as the Geneva Conventions and the UN Charter. This is because these interventions (instruments) are outdated in that cyberspace is a new technology as compared to their establishment time. As such, cyber conflicts are bound to affect organizations, people, groups, and territories in the near future.

Again, he asserts that the world is yet to experience a serious form of cyber conflict because no stringent countermeasures exist in preventing such (Lin, 2012). The increasing importance of IT, though very beneficial when applied, has dragged along a detrimental side to it. The fact that IT is universal (global) means that what is taught in one continent is the same thing that will be taught in another. As such, creating or attacking IT systems is possible from any point of the earth; adding up to cyber conflict.

Cyber conflict can be caused by two levels of hostilities: technology-based and people-based approaches. Technology-based hostility refers to cyber attack conducted using purely technological tools such as software, programs, or computer hardware. This includes gaining access to restricted systems, interfering with them using a payload, and gaining in one way from doing so. People-based cyber hostility occurs when people are tricked (through scam), bribed, or blackmailed to conduct the attack from inside the target IT systems.

Collectively, these forms of cyber attack/ hostility have led to the emergence of new countermeasures or frameworks. These are intended to protect IT systems from both vulnerabilities emerging from both offensive approaches. Lin presents two policies that can be implemented in preventing or minimizing vulnerability; defense

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Emergency, Exception and New Technologies in International Relations Essay”, n.d.)
Emergency, Exception and New Technologies in International Relations Essay. Retrieved from https://studentshare.org/social-science/1688988-emergency-exception-and-new-technologies-in-international-relations
(Emergency, Exception and New Technologies in International Relations Essay)
Emergency, Exception and New Technologies in International Relations Essay. https://studentshare.org/social-science/1688988-emergency-exception-and-new-technologies-in-international-relations.
“Emergency, Exception and New Technologies in International Relations Essay”, n.d. https://studentshare.org/social-science/1688988-emergency-exception-and-new-technologies-in-international-relations.
  • Cited: 0 times

CHECK THESE SAMPLES OF Emergency, Exception and New Technologies in International Relations

Does the Balance of Power Provide International Order

You can say yes for some extinct that the balance of power play important role in making the international order.... Now the time of essence demands that international order is created by force, and backed by the threat of force.... To give justification for hostility we be grateful to pray to the strength of the international system," the sacred soil of the homeland, the significant fortune of the country, the rule of international law, the magnetism of making the world safe for democracy, civilization, socialism or something similar" (A....
11 Pages (2750 words) Essay

Importance of an Aviation Safety Program

The second area of training and implementation is based on newer technologies that are now being used to provide individuals with new compliances and standards.... Each of the technologies is being used to provide more conducive results to safety while allowing communication and delivery within aviation to excel to new levels.... Since the standards and the consistency is based on the flights, many believe that new safety aviation programs are no longer required and are based on the implementation of marginal standards that have to be reached....
12 Pages (3000 words) Essay

What does it mean to securitise the environment

hellip; The author of the paper claims that approaches that consider the formation of security aspects in a discursive manner provide new perspectives in analyzing environmental security discourses, as well as their transformative potential.... Evidently, approaches that consider the formation of security aspects in a discursive manner provide new perspectives in analyzing environmental security discourses, as well as their transformative potential.... While the process continues to create new ideas for security, the notion has widely attracting reforms and contribution from the society....
9 Pages (2250 words) Essay

The Journey Towards Integrated Reporting in Australia

The main agenda of implementing this process is to understand mobilization activities, chain of relations, conflicts and resistance, which determined integrating reporting journey of Australia.... It discusses advances in reporting field because of purification processes, before introduction of international Integrated Reporting Committee (IIRC).... The report findings present four key factors that influenced evolution of integrated reporting, namely, critical events, actors, technologies and regulatory initiatives (Richards 16)....
6 Pages (1500 words) Essay

A New Strategy for Kodak

The second objective would be training its employees and all involved partners in production to adapt to new technologies of production so as to match the demands of cloud services.... The emergence of new (digital) imaging technologies and the entrance of more competitors in the photography sector saw the giant enterprise experience decreasing sales thus fewer profits and slow growth (Jones, 2011).... The following study “A new Strategy for Kodak” discusses the implementable new strategies for Kodak which would not only revive its stance in the imaging industry but also help it advance its business model to match the new era and the demands of cloud services....
5 Pages (1250 words) Assignment

An Idea of Cross-Training Employees

The paper "An Idea of Cross-Training Employees" primarily examines the interdisciplinary approach to training or cross-training the employees of different departments so that they are better equipped to handle emergency situations and contingencies.... hellip; To keep up with the pace of advancement and gain competitive advantage, it has become imperative to upgrade the existing skills and develop multi-skill through training programs....
8 Pages (2000 words) Research Paper

Storms Over the Urban Forest

Apart from providing protection and assistance during situations of need, it is the governments that can call such situations 'crises' and proceed to appeal to the international community for assistance.... Crises may be defines as emergency situations that arise due to human or natural activities and pose threats properties, human lives or may result in disruption of the day-to-day lives of affected communities on a large scale (N....
8 Pages (2000 words) Term Paper

The Director of Federal Emergency Management Agency: the Changes that James Lee Witt Introduced

Consequentially, the association had fallen among the group of incompetent emergency managing bodies who were endowed with the responsibility to respond to calamities and terrorism as well.... nbsp;… According to the paper, James Lee Witt was appointed by President Clinton as the Director of Federal emergency Management Agency (FEMA) in 1993 with the authority to directly interact with the President regarding controlling measures to be taken in order to cope up with various emergency situations such as natural disasters and even terrorist attacks....
11 Pages (2750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us