A Doctrinal Thesis

نویسندگان

  • Fred B. Schneider
  • Deirdre K. Mulligan
چکیده

authentication and identity on the Internet is not, in fact, a debate about the mechanisms per se but is a proxy for the debate about a doctrine of deterrence through accountability. This doctrine equates attacks with crimes and focuses on policy and structures to support forensics, identify perpetrators , and prosecute them. However , this doctrine has no teeth and will fail absent an effective means for retribution. Moreover, the doctrine depends on attribution of a machine's actions to individuals, requires international agreements about illegality, and presumes cross-border enforcement that depends on unprecedented levels of cooperation among nations. Other cybersecurity policy proposals currently under discussion derive from an analogy between computer malware and biological pathogens. The 2009 US National Leap Year Summit, for instance, discussed the creation of a Cyber-CDC, inspired by the existing Centers for Disease Control and Prevention (www.nitrd. gov/NCLYSummit.aspx). The dialogue, however, is again proceeding piecemeal and bottom-up, although it is easy to imagine that a higher-level view—a cyberspace analogy to public health—could serve as the rationale for a Cyber-CDC proposal. But why should anyone accept this specific analogy as a basis for a doctrine? Public health concerns inform people's behaviors as does religion, yet " patch and pray " aside, few would argue that an analogy with religion is a good since plenty of evidence indicates that technology alone can't lead us to a trustworthy cyberspace. New policy and new institutions are required. Today's policy discussions, however , are profoundly disturbing. The problem is not only the specific policy proposals, but the bigger picture—a potpourri of narrowly focused initiatives. If there is an over-arching policy framework, it's that new proposals be consistent with increasingly irrelevant norms, incentives, and mechanisms from the past century. Entrenched special interest groups and single-issue advocates flourish in such a retrograde framework, but the policy landscape resulting from such " bottom-up " policy design won't be pretty, nor will it be effective. Rather, it will exhibit the well-known deficiencies of any bottom-up system design: components that won't interact easily, have overlapping instead of independent functionality, and with inconsistent semantics. We must break out of the current dialogue and its focus on piecemeal solutions. New policy proposals need to be rationalized in terms of their support for a cy-bersecurity doctrine, which defines goals and means. • The goals state which system properties will be preserved, as well as which policies will be enforced, …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Insult in Context: Incorporating Speech Act Theory in Doctrinal Legal Analysis of Interpretative Discussions

In this article, I want to show that some doctrinal problems of legal interpretation and argumentation can be analysed in a more precise way than a standard doctrinal analysis, when we use insights from speech act theory and argumentation theory. Taking a discussion about the accusation of the criminal act insulting as a starting point, I will try to show that the doctrinal perspective on meani...

متن کامل

Building the Eagle’s Nest: Challenges in Basing the Air Expeditionary Force by Major Patrick J. Smith a Thesis Presented to the Faculty of the School of Advanced Airpower Studies for Completion of Graduation Requirements School of Advanced Airpower Studies

...................................................................................................................... vi LIST OF ILLUSTRATIONS.............................................................................................. ix INTRODUCTION............................................................................................................... 1 A LOOK AT THE AIR EXPEDITIONAR...

متن کامل

Experiential and Doctrinal Religious Knowledge Categorization in Parkinson's Disease: Behavioral and Brain Correlates

Recent studies suggest changes in religious cognition in a subgroup of patients with Parkinson's disease (PD e.g., Butler et al., 2011). It is unclear whether this deficit extends to both doctrinal and experiential categorization forms of religious cognition. Kapogiannis et al. (2009b) dissociated experiential and doctrinal religious knowledge to different neural networks using fMRI. We examine...

متن کامل

Doctrinal Categories, Legal Realism, and the Rule of Law

INTRODUCTION ....................................................................................... 1889 I. THE REALIST CONCEPTION OF LAW .................................................. 1891 II. THE ROLE OF DOCTRINE AND THE RULE OF LAW ........................... 1898 III. DOCTRINAL CATEGORIES, REALISTICALLY RECONSTRUCTED ........... 1905 IV. A CASE STUDY: ON PROPERTY AND PROPERTY INSTITUTI...

متن کامل

Empirical Doctrine

We can observe and measure how legal decision makers use formal legal authorities, but there is no way to empirically test the determinative capacity of legal doctrine itself. Yet discussions of empirical studies of judicial behavior sometimes conflate judges’ attention to legal rules with legal rules determining outcomes. Doctrinal determinacy is not the same thing as legal predictability. The...

متن کامل

Cultural development of strategic commanders and managers through the design of a model of training and excellence

The purpose of this study was to design a Pattern for training and excellence of a mechanism for cultural development of strategic commanders and managers. For this purpose, qualitative phenomenological research method was used. Targeted sample consisting of 10 commanders and strategic managers and researchers and faculty members specializing in excellence were selected as key informants. By ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2011