Despite major innovations in the construction and management of the Internet—or perhaps because of the obvious success of distributed governance—the international community is now on the verge of a new challenge: how to frame the relationship between international law and cyberspace.
One analyst observes that there is a “simple choice” between a “[m]ore global law and a less global internet” (Kohl 2007, 28–30). Another reminds us that the most “important point” is that “all ground occupied by international law is shared by others who are not lawyers….” (Lowe 2007, 290).
Our purpose here is to develop empirically-based views of key approaches to international law as part of the emergent order in the cyber domain—in terms of theory, policy, and practice.
Here, we introduce six research projects. Each is distinctive in its own right, with different implications for cyberpolitics and cyberpolicy. Each of the six are applications of analytics developed for the Science of Security and Privacy Program introduced in the section on the critical imperative of POLICY ANALYTICS.
Complexity of International Law for Cyber Operations
Detailed review of the complexity of international law for cyber operations, focusing on Tallinn Manual 2.0. It is an application of the methods on analytics for policy first introduced in as a critical imperative, and highlight the methodological approach and results. As such, it is part of the proof of concept application of analytics developed for our project of Science of Security and Privacy Program introduced in the critical imperative of POLICY ANALYTICS. (continued here)
European Union, General Data Protection Regulation (GDPR)
A computational analysis of the structure of the General Data Protection Regulation (GDPR) of the European Union. A path breaking initiative in international relations GDPR focuses on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA) (continued here)
Council of Europe, Convention on Cybercrime
Analysis of the structure and organization of the Convention on Cybercrime is the first international treaty on crimes that are committed via the Internet and includes violations of network security. It contains a set of active procedures enabling the search of computer systems and networks. This project is part of the proof of concept application of analytics developed for our project of Science of Security and Privacy Program introduced in the critical imperative of POLICY ANALYTICS. (continued here)
Bilateral & Multilateral Cyber Accords
This data-based review and analysis of bilateral and multilateral cyber accords is designed to provide an added perspective on legal obligations for the cyber domain. It is intended to provide a baseline and context of the policy ecosystem thereof. (continued here)
US DoD Law of War Manual
Structural, organizational, and representation of the US Law of War Manual based on the methods developed as a case for proof of concept serves as extension of the applications for the methods developed in the project on Analytics for Policy of Cybersecurity of Cyber Physical Systems. (continued here)
National Cyber Policies
As a comparison of national policies for cyberspace consists of a data-based review and analysis of state policies pertaining to the cyber domain, this initiative is designed to provide an added perspective on national approaches to cyber policy. It adds complexity to complex a baseline and context of the national cyber policy ecosystem. (continued here)