NORMS IN CYBERSPACE:PROSPECTS AND PROBLEMS

POL 370F

PROF. BENJAMIN BARTLETT

MIAMI UNIVERSITY

NORMS FOR WHOM?

TWO OBVIOUS WAYS TO DESIGN NORMS INCYBERSPACE

  1. Limit behaviors.
      • Example:cyberexploitationisOK, but cyber attacks arenot.
  2. Limittargets.
      • Example:government/military targets are legitimate,private firms, individuals are not.

POSSIBLE OBSTACLES TO CYBER NORMS

  1. Powerful states find cyber operations too useful.
  2. Difficult tofindaproprietythatworksforallstates.
    • Evenifstates agree that there should be norms, they often disagree onwhat thosenormsshouldbe.
  3. Thenatureofcyberspacemakesithardtoknowifnormsarebeingupheld, which weakenscollective expectations.

POWERFUL STATES FIND CYBER OPERATIONS TOOUSEFUL

DIFFICULT TO HAVE PROPRIETY THAT WORKS FORALL STATES

NATURE OF CYBERSPACE MAKES IT HARD TOKNOW IF NORMS ARE BEING UPHELD

WHATKINDSOFCYBER NORMS AREWEMOSTLIKELYTOSEE?

  1. Useful to (or at least not detrimental to) the great powers.
  2. Based on widely-agreed principles (probably international law).
    • Alternatively, might see norms that only apply to certain types of states.
  3. Restrict easily-observed behaviors.
    • Cyberattacksamorelikelytarget than cyber exploitation.

CONCLUSION