SlideShare a Scribd company logo
1 of 7
6
APPLYING GENEVA CONVENTION STRATEGIES
TOWARDS ACCOMPLISHING CYBER PEACE
December 17, 2017
INTRODUCTION
The emergence of technology and its steady advancement has
greatly impacted aspects of individuals, business, and
institutional activities. The discovery technology has been felt
in different aspects of the economy one notable impact is
cyberspace – "a notional environment under which
communication occurs with the use of computer networks and
systems." [footnoteRef:1] Cyberspace, which is as a result of
the internet, an element of technology, has seen information
sharing take place, millions of money being transacted over
computer networks, business deals struck and much more. All
these benefits of cyberspace have attracted criminal, known in
the cyber world as cybercriminals, who have, and continue to
negatively impact the use of the internet in a variety of creative
and innovative ways. There also have been rising cases of cyber
warfare between countries that have been causing major worries
among global cybersecurity professionals. In an attempt to
minimize and solve the issues cyber threats and cybercrimes,
several studies have been conducted to discover and create ways
of curbing the problem. However, a majority of these studies
have failed to acknowledge that the problem has gone
global.[footnoteRef:2] However, no studies have been
conducted on how to settle for cyber peace by incorporating
Geneva convention to creating a treaty specifically for
cyberspace. Therefore, the paper will explore how to achieve
peace in the cyberspace by exploring the possibilities of treaties
on cyberspace by Geneva convention. [1: David Smahel and
Kristian Daneback, "Editorial: Researching Bright And Dark
Sides Of The Cyberspace," Cyberpsychology: Journal of
Psychosocial Research on Cyberspace 7, no. 3 (2013).] [2:
Filippo PARODI, "The Concept Of Cybercrime And Online
Threats Analysis," International Journal of Information Security
and Cybercrime 2, no. 1 (2013): 59-66.]
Statement of the Problem
The growth of cyberspace due to the effect of globalization has
turned cybercrime and cyber attacks to one of the major talked
about concerns across the globe. Cybercrimes has evolved to
become a form of terrorism with major security agencies and
institutions such as Homeland Security being victims of the
attack. With such agencies with an immeasurable amount of
security system and responsible for the safety of people and
resources being non-immune to such attacks puts enterprises
and individuals at a greater risk. Consequently, cyberspace has
seen countries attack each other over computer networks. The
severity of the problem has proven other measures such as
confronting cyber attackers ineffective thus the need to change
the strategies employed to solve the problem. The worst part is
that close to 74% of global business expected to be hacked each
year with estimations of economic losses amounting to
cybercrimes totaling to $3 trillion by the year
2020.[footnoteRef:3] [3: Aidan Courtney, "Law, Economics,
And Cyberspace: The Effects Of Cyberspace On The Economic
Analysis Of Law," SCRIPT-ed (2004): 505-509.]
Purpose of the Research
The proposed research study will generate relevant strategies,
ideas, solutions and suggestions pertaining to cybercrimes and
the Geneva convention that can be applicable in solving the
problem through advocating for peace on computer networks
and systems across the globe. Additionally, the project will act
an informational and an educational tool that can be referenced
by key players in cyberspace in assessing the severity and
adversities of the problem at hand.
Objectives of the Study
The main objective of the researcher shall be to apply the
Geneva convention strategies towards facilitating peace in
cyberspace. The researcher shall analyze how a possibility of a
treaty specifically cyberspace can facilitate peace across major
nations.
THEORETICAL ORIENTATION
The Geneva convention currently consists of four treating with
additional protocols (three) that create the standards for the
treatment of international law for humanitarian in regard to the
treatment of war. The Geneva conventions were established
after the world war II where the negotiations highlighted the
rights of prisoners of war times, and established protection
mechanisms for the wounded and civilians found in a war-zone
and around. Primarily, the Geneva convention addresses war
and its effects on countries and provides guidelines and policies
for the treatment of war among member countries and non-
combats.[footnoteRef:4] Having been formed at around 1949,
after the second world war, it does not outline or highlight the
policies of the new form of war known as cyberwar that its
adversities are even extending to civilians and businesses. [4:
Angela Bennett, The Geneva Convention (New York: The
History Press, 2013).]
As a result of this, there have been cries for an international
treaty that specifically regulates cyber operations between
countries. In 2007, Israel and the United States jointly
developed a worm known as Stuxnet that would destroy crucial
centrifuges to the nuclear program by Iran. The event redefined
cyberattacks and gave it a new perception even though it was a
success. The attack, which was named as an ideal example of
cyberwar[footnoteRef:5] Demonstrated that such kinds of
attacks were better alternative solutions where aggressive
actions were not recommendable. Researchers have
acknowledged that in any warfare there have to be casualties,
and this form of cyber warfare introduced by the United States
and Israel on Iran is no exception that if there are no measures
aimed at protecting civilians, a lot of damages could happen. [5:
Tamlin Magee, "Does The World Need A Geneva Convention
For Cyber Warfare?", Techworld, last modified 2017, accessed
December 14, 2017, https://www.techworld.com/security/does-
world-need-geneva-convention-for-cyber-warfare-3656996/.]
The recent RSA conference, a group of professional security
personnel across the world who converged to critically discuss
cybersecurity[footnoteRef:6] Agree unanimously the growth of
cybercrime and the increasing possibilities of cyber warfare
worldwide calls for a digital Geneva convention. The
conference acknowledged that the Fourth Geneva Convention
has for a long time protected civilians during wars but since war
has taken a new direction, there is the need for digital Geneva
convention particular for non-state attacks in times of peace.5
Just as there are mechanisms for active involvement outlined by
the fourth Geneva convention for protection of civilians such as
red cross, there is also the need for mechanisms for assistance
by technology companies during cyberwars. [6: Mette Eilstrup-
Sangiovanni, "Why The World Needs An International
Cyberwar Convention," Philosophy & Technology (2017).]
Conceptual Framework
A conceptual framework is a tool used in a research study to
draw distinctions and necessitate ideas for the study. Therefore,
the conceptual framework for the proposed study will be useful
in drawing distinct concepts and ideas on how to employ
Geneva convention in attaining cyber peace. To accomplish this,
the researcher will need to separate between dependent and
independent variables. An independent variable[footnoteRef:7]
Is one which is manipulated by the researcher whereas a
dependent variable is influenced by the independent variable.
For instance, the independent variable for the study will be the
digital Geneva convention on cyber warfare while the
independent variable will be cyber peace. [7: Mark Chang,
Principles Of Scientific Methods (Boca Raton, Fla.: CRC Press,
Taylor et Francis, 2015).]
RESEARCH METHODOLOGY
Research Strategy
The researcher will adopt an applied strategy rather than a new
strategy because there are a number of sources that have
covered a similar area of started especially on Geneva
convention but have not specified their findings to the aspect of
peace. Therefore, the paper will take a form of new research by
focusing on cyber peace but with existing formulae of research
studies.
Research Methods
To extensively satisfy the objective of the proposed study, the
researcher will employ the use of both quantitative and
qualitative approaches in gathering data. Applying both
approaches is advantageous to the researcher and the reliability
of the results since the outcomes will adopt both comprehensive
descriptions and accurate, quantifiable data in the form of
statistics and numbers to meet the standards of a scientific
research study. [footnoteRef:8] [8: "Methodology Of Science
And General-Scientific Methods Of Research," European
Researcher 105, no. 4 (2016).]
Data Collection Method and Tools
The researcher will use an interviewing method aside from
reviewing records, figures, statistics, and reports on the same.
The interview method will be adopted to identify emotions,
ideas, thoughts, and opinions of the participants during data
gathering process. The tool that will be used to collect data will
include a structured questionnaire. The researcher will use a
structured questionnaire to avoid respondent deviating7 from
the point of discussion. Also, the researcher will ask additional
questions other than the ones included in the questionnaire to
get additional contributions of the participants.
Sample Selection and the Research Process
The sample selection method for the proposed research will be
the purposive method where the examiner will develop a sample
for the research. The purposive sample selection method is a
technique under the non-probability sampling methods where
samples are selected from a population on the basis of their
knowledge, experiences, and relationships with the subject
matter under study.6 The research process will involve the
examiner engaging the participants in informed consent before
subjecting them to the questionnaire. The interviewing process
is planned to last between 10 to 15 minutes, and the participants
will have the freedom to express their thoughts, opinions, ideas,
and so on as it pertains to the subject matter under
investigation.
Bibliography
Bennett, Angela. The Geneva Convention. New York: The
History Press, 2013.
Chang, Mark. Principles Of Scientific Methods. Boca Raton,
Fla.: CRC Press, Taylor et Francis, 2015.
Courtney, Aidan. "Law, Economics And Cyberspace: The
Effects Of Cyberspace On The Economic Analysis Of Law."
SCRIPT-ed (2004): 505-509.
Eilstrup-Sangiovanni, Mette. "Why The World Needs An
International Cyberwar Convention." Philosophy &
Technology (2017).
Magee, Tamlin. "Does The World Need A Geneva Convention
For Cyber Warfare?". Techworld. Last modified 2017. Accessed
December 14, 2017. https://www.techworld.com/security/does-
world-need-geneva-convention-for-cyber-warfare-3656996/.
"Methodology Of Science And General-Scientific Methods Of
Research." European Researcher 105, no. 4 (2016).
PARODI, Filippo. "The Concept Of Cybercrime And Online
Threats Analysis." International Journal of Information Security
and Cybercrime 2, no. 1 (2013): 59-66.
Smahel, David, and Kristian Daneback. "Editorial: Researching
Bright And Dark Sides Of The Cyberspace." Cyberpsychology:
Journal of Psychosocial Research on Cyberspace 7, no. 3
(2013).

More Related Content

Similar to 6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx

A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfKatie Naple
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...kevig
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...kevig
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensicsIJNSA Journal
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks  REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
 
The mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismThe mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismNicholas Ayres
 
Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmartheijes
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
 

Similar to 6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx (20)

A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...
 
High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...High Accuracy Location Information Extraction From Social Network Texts Using...
High Accuracy Location Information Extraction From Social Network Texts Using...
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks  REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
 
The mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismThe mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorism
 
Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmar
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 

More from alinainglis

· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docxalinainglis
 
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docxalinainglis
 
· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docxalinainglis
 
· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docxalinainglis
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docxalinainglis
 
· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docxalinainglis
 
· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docxalinainglis
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docxalinainglis
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docxalinainglis
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docxalinainglis
 
· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docxalinainglis
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docxalinainglis
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docxalinainglis
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docxalinainglis
 
· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docxalinainglis
 
· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docxalinainglis
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docxalinainglis
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docxalinainglis
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docxalinainglis
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docxalinainglis
 

More from alinainglis (20)

· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx
 
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
 
· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx
 
· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx
 
· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx
 
· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docx
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx
 
· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx
 
· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx
 
· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx

  • 1. 6 APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPLISHING CYBER PEACE December 17, 2017 INTRODUCTION The emergence of technology and its steady advancement has greatly impacted aspects of individuals, business, and institutional activities. The discovery technology has been felt in different aspects of the economy one notable impact is cyberspace – "a notional environment under which communication occurs with the use of computer networks and systems." [footnoteRef:1] Cyberspace, which is as a result of the internet, an element of technology, has seen information sharing take place, millions of money being transacted over computer networks, business deals struck and much more. All these benefits of cyberspace have attracted criminal, known in the cyber world as cybercriminals, who have, and continue to negatively impact the use of the internet in a variety of creative and innovative ways. There also have been rising cases of cyber warfare between countries that have been causing major worries among global cybersecurity professionals. In an attempt to minimize and solve the issues cyber threats and cybercrimes, several studies have been conducted to discover and create ways of curbing the problem. However, a majority of these studies
  • 2. have failed to acknowledge that the problem has gone global.[footnoteRef:2] However, no studies have been conducted on how to settle for cyber peace by incorporating Geneva convention to creating a treaty specifically for cyberspace. Therefore, the paper will explore how to achieve peace in the cyberspace by exploring the possibilities of treaties on cyberspace by Geneva convention. [1: David Smahel and Kristian Daneback, "Editorial: Researching Bright And Dark Sides Of The Cyberspace," Cyberpsychology: Journal of Psychosocial Research on Cyberspace 7, no. 3 (2013).] [2: Filippo PARODI, "The Concept Of Cybercrime And Online Threats Analysis," International Journal of Information Security and Cybercrime 2, no. 1 (2013): 59-66.] Statement of the Problem The growth of cyberspace due to the effect of globalization has turned cybercrime and cyber attacks to one of the major talked about concerns across the globe. Cybercrimes has evolved to become a form of terrorism with major security agencies and institutions such as Homeland Security being victims of the attack. With such agencies with an immeasurable amount of security system and responsible for the safety of people and resources being non-immune to such attacks puts enterprises and individuals at a greater risk. Consequently, cyberspace has seen countries attack each other over computer networks. The severity of the problem has proven other measures such as confronting cyber attackers ineffective thus the need to change the strategies employed to solve the problem. The worst part is that close to 74% of global business expected to be hacked each year with estimations of economic losses amounting to cybercrimes totaling to $3 trillion by the year 2020.[footnoteRef:3] [3: Aidan Courtney, "Law, Economics, And Cyberspace: The Effects Of Cyberspace On The Economic Analysis Of Law," SCRIPT-ed (2004): 505-509.] Purpose of the Research
  • 3. The proposed research study will generate relevant strategies, ideas, solutions and suggestions pertaining to cybercrimes and the Geneva convention that can be applicable in solving the problem through advocating for peace on computer networks and systems across the globe. Additionally, the project will act an informational and an educational tool that can be referenced by key players in cyberspace in assessing the severity and adversities of the problem at hand. Objectives of the Study The main objective of the researcher shall be to apply the Geneva convention strategies towards facilitating peace in cyberspace. The researcher shall analyze how a possibility of a treaty specifically cyberspace can facilitate peace across major nations. THEORETICAL ORIENTATION The Geneva convention currently consists of four treating with additional protocols (three) that create the standards for the treatment of international law for humanitarian in regard to the treatment of war. The Geneva conventions were established after the world war II where the negotiations highlighted the rights of prisoners of war times, and established protection mechanisms for the wounded and civilians found in a war-zone and around. Primarily, the Geneva convention addresses war and its effects on countries and provides guidelines and policies for the treatment of war among member countries and non- combats.[footnoteRef:4] Having been formed at around 1949, after the second world war, it does not outline or highlight the policies of the new form of war known as cyberwar that its adversities are even extending to civilians and businesses. [4: Angela Bennett, The Geneva Convention (New York: The History Press, 2013).] As a result of this, there have been cries for an international treaty that specifically regulates cyber operations between countries. In 2007, Israel and the United States jointly developed a worm known as Stuxnet that would destroy crucial
  • 4. centrifuges to the nuclear program by Iran. The event redefined cyberattacks and gave it a new perception even though it was a success. The attack, which was named as an ideal example of cyberwar[footnoteRef:5] Demonstrated that such kinds of attacks were better alternative solutions where aggressive actions were not recommendable. Researchers have acknowledged that in any warfare there have to be casualties, and this form of cyber warfare introduced by the United States and Israel on Iran is no exception that if there are no measures aimed at protecting civilians, a lot of damages could happen. [5: Tamlin Magee, "Does The World Need A Geneva Convention For Cyber Warfare?", Techworld, last modified 2017, accessed December 14, 2017, https://www.techworld.com/security/does- world-need-geneva-convention-for-cyber-warfare-3656996/.] The recent RSA conference, a group of professional security personnel across the world who converged to critically discuss cybersecurity[footnoteRef:6] Agree unanimously the growth of cybercrime and the increasing possibilities of cyber warfare worldwide calls for a digital Geneva convention. The conference acknowledged that the Fourth Geneva Convention has for a long time protected civilians during wars but since war has taken a new direction, there is the need for digital Geneva convention particular for non-state attacks in times of peace.5 Just as there are mechanisms for active involvement outlined by the fourth Geneva convention for protection of civilians such as red cross, there is also the need for mechanisms for assistance by technology companies during cyberwars. [6: Mette Eilstrup- Sangiovanni, "Why The World Needs An International Cyberwar Convention," Philosophy & Technology (2017).] Conceptual Framework A conceptual framework is a tool used in a research study to draw distinctions and necessitate ideas for the study. Therefore, the conceptual framework for the proposed study will be useful in drawing distinct concepts and ideas on how to employ
  • 5. Geneva convention in attaining cyber peace. To accomplish this, the researcher will need to separate between dependent and independent variables. An independent variable[footnoteRef:7] Is one which is manipulated by the researcher whereas a dependent variable is influenced by the independent variable. For instance, the independent variable for the study will be the digital Geneva convention on cyber warfare while the independent variable will be cyber peace. [7: Mark Chang, Principles Of Scientific Methods (Boca Raton, Fla.: CRC Press, Taylor et Francis, 2015).] RESEARCH METHODOLOGY Research Strategy The researcher will adopt an applied strategy rather than a new strategy because there are a number of sources that have covered a similar area of started especially on Geneva convention but have not specified their findings to the aspect of peace. Therefore, the paper will take a form of new research by focusing on cyber peace but with existing formulae of research studies. Research Methods To extensively satisfy the objective of the proposed study, the researcher will employ the use of both quantitative and qualitative approaches in gathering data. Applying both approaches is advantageous to the researcher and the reliability of the results since the outcomes will adopt both comprehensive descriptions and accurate, quantifiable data in the form of statistics and numbers to meet the standards of a scientific research study. [footnoteRef:8] [8: "Methodology Of Science And General-Scientific Methods Of Research," European Researcher 105, no. 4 (2016).] Data Collection Method and Tools The researcher will use an interviewing method aside from reviewing records, figures, statistics, and reports on the same. The interview method will be adopted to identify emotions,
  • 6. ideas, thoughts, and opinions of the participants during data gathering process. The tool that will be used to collect data will include a structured questionnaire. The researcher will use a structured questionnaire to avoid respondent deviating7 from the point of discussion. Also, the researcher will ask additional questions other than the ones included in the questionnaire to get additional contributions of the participants. Sample Selection and the Research Process The sample selection method for the proposed research will be the purposive method where the examiner will develop a sample for the research. The purposive sample selection method is a technique under the non-probability sampling methods where samples are selected from a population on the basis of their knowledge, experiences, and relationships with the subject matter under study.6 The research process will involve the examiner engaging the participants in informed consent before subjecting them to the questionnaire. The interviewing process is planned to last between 10 to 15 minutes, and the participants will have the freedom to express their thoughts, opinions, ideas, and so on as it pertains to the subject matter under investigation. Bibliography Bennett, Angela. The Geneva Convention. New York: The History Press, 2013. Chang, Mark. Principles Of Scientific Methods. Boca Raton, Fla.: CRC Press, Taylor et Francis, 2015. Courtney, Aidan. "Law, Economics And Cyberspace: The Effects Of Cyberspace On The Economic Analysis Of Law." SCRIPT-ed (2004): 505-509. Eilstrup-Sangiovanni, Mette. "Why The World Needs An International Cyberwar Convention." Philosophy & Technology (2017). Magee, Tamlin. "Does The World Need A Geneva Convention For Cyber Warfare?". Techworld. Last modified 2017. Accessed December 14, 2017. https://www.techworld.com/security/does-
  • 7. world-need-geneva-convention-for-cyber-warfare-3656996/. "Methodology Of Science And General-Scientific Methods Of Research." European Researcher 105, no. 4 (2016). PARODI, Filippo. "The Concept Of Cybercrime And Online Threats Analysis." International Journal of Information Security and Cybercrime 2, no. 1 (2013): 59-66. Smahel, David, and Kristian Daneback. "Editorial: Researching Bright And Dark Sides Of The Cyberspace." Cyberpsychology: Journal of Psychosocial Research on Cyberspace 7, no. 3 (2013).