Associate professor of law Military Academy General Mihailo Apostolski, Skopje and Adjunct Faculty Member, Ira A. Fulton School of Engineering, Arizona State University, ASU, U.S.
There is more than one reason why South-East European States should clarify their public positions on the applicability of sovereignty as a principle or as the rule of international law while addressing the growing ambiguity in cyberspace. The article argues that strategically and legally it is in the SEE States’ interest to step up and fill the vacuum in ever needed opinio iuris on the applicability of sovereignty in cyberspace, particularly after some leading NATO States took an opposing course on the issue. Explaining the evolution in cyberspace and how this affects the Westphalian concept of sovereignty under international law the article introduces the importance of the main thesis. It then provides the rationale for the argument and explains why it is in the SEE States interest to act and express their position on the applicability of sovereignty in cyberspace under international law.
REFERENCES(19)
1.
Barrinha A., Renard T., Power and diplomacy in the post-liberal cyberspace, „International Affairs” 2020, vol. 96, no. 3.
Biller J., Schmitt M., Un-caging the Bear? A Case Study in Cyber Opinio Juris and Unintended Consequences, https://www.ejiltalk.org/un-ca... [dostęp: 20.08.2021].
Broeders D., Busser E.D., Pawlak P., Three tales of attribution in cyberspace: Criminal law, international law and policy debates, https://eucyberdirect.eu/wp-co... [dostęp: 20.08.2021].
Efrony D., Shany Y., A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyber Operations and Subsequent State Practice, „American Journal of International Law” 2018, vol. 112.
Kadlčák R., 2nd Substantive session of the Open-ended Working Group on developments in the field of information and telecommunications in the context of international security of the First Committee of the General Assembly of the United Nations, https://www.nukib.cz/download/... [dostęp: 20.08.2021].
Perina A.H., Proceedings of the Annual Meeting, American Society of International Law, The Effectiveness of International Law, vol. 108, Cambridge 2014.
Schmitt M., Three International Law Rules for Responding Effectively to Hostile Cyber Operations, https://www.justsecurity.org/7... [dostęp: 20.08.2021].
Schondorf R., Israel’s perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations, https://www.ejiltalk.org/israe... [dostęp: 20.08.2021].
Waxman M.C., Cyber-Attacks and the Use of Force: Back to the Future of Article 2 (4), „The Yale Journal Of International Law” 2011, vol. 36. Wright J., Cyber and International Law in the 21st Century, https://www.gov.uk/government/... [dostęp: 20.08.2021].
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.