6
APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPLISHING CYBER PEACE
December 17, 2017
INTRODUCTION
The emergence of technology and its steady advancement has greatly impacted aspects of individuals, business, and institutional activities. The discovery technology has been felt in different aspects of the economy one notable impact is cyberspace – "a notional environment under which communication occurs with the use of computer networks and systems." [footnoteRef:1] Cyberspace, which is as a result of the internet, an element of technology, has seen information sharing take place, millions of money being transacted over computer networks, business deals struck and much more. All these benefits of cyberspace have attracted criminal, known in the cyber world as cybercriminals, who have, and continue to negatively impact the use of the internet in a variety of creative and innovative ways. There also have been rising cases of cyber warfare between countries that have been causing major worries among global cybersecurity professionals. In an attempt to minimize and solve the issues cyber threats and cybercrimes, several studies have been conducted to discover and create ways of curbing the problem. However, a majority of these studies have failed to acknowledge that the problem has gone global.[footnoteRef:2] However, no studies have been conducted on how to settle for cyber peace by incorporating Geneva convention to creating a treaty specifically for cyberspace. Therefore, the paper will explore how to achieve peace in the cyberspace by exploring the possibilities of treaties on cyberspace by Geneva convention. [1: David Smahel and Kristian Daneback, "Editorial: Researching Bright And Dark Sides Of The Cyberspace," Cyberpsychology: Journal of Psychosocial Research on Cyberspace 7, no. 3 (2013).] [2: Filippo PARODI, "The Concept Of Cybercrime And Online Threats Analysis," International Journal of Information Security and Cybercrime 2, no. 1 (2013): 59-66.]
Statement of the Problem
The growth of cyberspace due to the effect of globalization has turned cybercrime and cyber attacks to one of the major talked about concerns across the globe. Cybercrimes has evolved to become a form of terrorism with major security agencies and institutions such as Homeland Security being victims of the attack. With such agencies with an immeasurable amount of security system and responsible for the safety of people and resources being non-immune to such attacks puts enterprises and individuals at a greater risk. Consequently, cyberspace has seen countries attack each other over computer networks. The severity of the problem has proven other measures such as confronting cyber attackers ineffective thus the need to change the strategies employed to solve the problem. The worst part is that close to 74% of global business expected to be hacked each year with estimations of economic losses amounting to cybercrimes totaling to $3 trillion by the year.
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
6APPLYING GENEVA CONVENTION STRATEGIES TOWARDS ACCOMPL.docx
1. 6
APPLYING GENEVA CONVENTION STRATEGIES
TOWARDS ACCOMPLISHING CYBER PEACE
December 17, 2017
INTRODUCTION
The emergence of technology and its steady advancement has
greatly impacted aspects of individuals, business, and
institutional activities. The discovery technology has been felt
in different aspects of the economy one notable impact is
cyberspace – "a notional environment under which
communication occurs with the use of computer networks and
systems." [footnoteRef:1] Cyberspace, which is as a result of
the internet, an element of technology, has seen information
sharing take place, millions of money being transacted over
computer networks, business deals struck and much more. All
these benefits of cyberspace have attracted criminal, known in
the cyber world as cybercriminals, who have, and continue to
negatively impact the use of the internet in a variety of creative
and innovative ways. There also have been rising cases of cyber
warfare between countries that have been causing major worries
among global cybersecurity professionals. In an attempt to
minimize and solve the issues cyber threats and cybercrimes,
several studies have been conducted to discover and create ways
of curbing the problem. However, a majority of these studies
2. have failed to acknowledge that the problem has gone
global.[footnoteRef:2] However, no studies have been
conducted on how to settle for cyber peace by incorporating
Geneva convention to creating a treaty specifically for
cyberspace. Therefore, the paper will explore how to achieve
peace in the cyberspace by exploring the possibilities of treaties
on cyberspace by Geneva convention. [1: David Smahel and
Kristian Daneback, "Editorial: Researching Bright And Dark
Sides Of The Cyberspace," Cyberpsychology: Journal of
Psychosocial Research on Cyberspace 7, no. 3 (2013).] [2:
Filippo PARODI, "The Concept Of Cybercrime And Online
Threats Analysis," International Journal of Information Security
and Cybercrime 2, no. 1 (2013): 59-66.]
Statement of the Problem
The growth of cyberspace due to the effect of globalization has
turned cybercrime and cyber attacks to one of the major talked
about concerns across the globe. Cybercrimes has evolved to
become a form of terrorism with major security agencies and
institutions such as Homeland Security being victims of the
attack. With such agencies with an immeasurable amount of
security system and responsible for the safety of people and
resources being non-immune to such attacks puts enterprises
and individuals at a greater risk. Consequently, cyberspace has
seen countries attack each other over computer networks. The
severity of the problem has proven other measures such as
confronting cyber attackers ineffective thus the need to change
the strategies employed to solve the problem. The worst part is
that close to 74% of global business expected to be hacked each
year with estimations of economic losses amounting to
cybercrimes totaling to $3 trillion by the year
2020.[footnoteRef:3] [3: Aidan Courtney, "Law, Economics,
And Cyberspace: The Effects Of Cyberspace On The Economic
Analysis Of Law," SCRIPT-ed (2004): 505-509.]
Purpose of the Research
3. The proposed research study will generate relevant strategies,
ideas, solutions and suggestions pertaining to cybercrimes and
the Geneva convention that can be applicable in solving the
problem through advocating for peace on computer networks
and systems across the globe. Additionally, the project will act
an informational and an educational tool that can be referenced
by key players in cyberspace in assessing the severity and
adversities of the problem at hand.
Objectives of the Study
The main objective of the researcher shall be to apply the
Geneva convention strategies towards facilitating peace in
cyberspace. The researcher shall analyze how a possibility of a
treaty specifically cyberspace can facilitate peace across major
nations.
THEORETICAL ORIENTATION
The Geneva convention currently consists of four treating with
additional protocols (three) that create the standards for the
treatment of international law for humanitarian in regard to the
treatment of war. The Geneva conventions were established
after the world war II where the negotiations highlighted the
rights of prisoners of war times, and established protection
mechanisms for the wounded and civilians found in a war-zone
and around. Primarily, the Geneva convention addresses war
and its effects on countries and provides guidelines and policies
for the treatment of war among member countries and non-
combats.[footnoteRef:4] Having been formed at around 1949,
after the second world war, it does not outline or highlight the
policies of the new form of war known as cyberwar that its
adversities are even extending to civilians and businesses. [4:
Angela Bennett, The Geneva Convention (New York: The
History Press, 2013).]
As a result of this, there have been cries for an international
treaty that specifically regulates cyber operations between
countries. In 2007, Israel and the United States jointly
developed a worm known as Stuxnet that would destroy crucial
4. centrifuges to the nuclear program by Iran. The event redefined
cyberattacks and gave it a new perception even though it was a
success. The attack, which was named as an ideal example of
cyberwar[footnoteRef:5] Demonstrated that such kinds of
attacks were better alternative solutions where aggressive
actions were not recommendable. Researchers have
acknowledged that in any warfare there have to be casualties,
and this form of cyber warfare introduced by the United States
and Israel on Iran is no exception that if there are no measures
aimed at protecting civilians, a lot of damages could happen. [5:
Tamlin Magee, "Does The World Need A Geneva Convention
For Cyber Warfare?", Techworld, last modified 2017, accessed
December 14, 2017, https://www.techworld.com/security/does-
world-need-geneva-convention-for-cyber-warfare-3656996/.]
The recent RSA conference, a group of professional security
personnel across the world who converged to critically discuss
cybersecurity[footnoteRef:6] Agree unanimously the growth of
cybercrime and the increasing possibilities of cyber warfare
worldwide calls for a digital Geneva convention. The
conference acknowledged that the Fourth Geneva Convention
has for a long time protected civilians during wars but since war
has taken a new direction, there is the need for digital Geneva
convention particular for non-state attacks in times of peace.5
Just as there are mechanisms for active involvement outlined by
the fourth Geneva convention for protection of civilians such as
red cross, there is also the need for mechanisms for assistance
by technology companies during cyberwars. [6: Mette Eilstrup-
Sangiovanni, "Why The World Needs An International
Cyberwar Convention," Philosophy & Technology (2017).]
Conceptual Framework
A conceptual framework is a tool used in a research study to
draw distinctions and necessitate ideas for the study. Therefore,
the conceptual framework for the proposed study will be useful
in drawing distinct concepts and ideas on how to employ
5. Geneva convention in attaining cyber peace. To accomplish this,
the researcher will need to separate between dependent and
independent variables. An independent variable[footnoteRef:7]
Is one which is manipulated by the researcher whereas a
dependent variable is influenced by the independent variable.
For instance, the independent variable for the study will be the
digital Geneva convention on cyber warfare while the
independent variable will be cyber peace. [7: Mark Chang,
Principles Of Scientific Methods (Boca Raton, Fla.: CRC Press,
Taylor et Francis, 2015).]
RESEARCH METHODOLOGY
Research Strategy
The researcher will adopt an applied strategy rather than a new
strategy because there are a number of sources that have
covered a similar area of started especially on Geneva
convention but have not specified their findings to the aspect of
peace. Therefore, the paper will take a form of new research by
focusing on cyber peace but with existing formulae of research
studies.
Research Methods
To extensively satisfy the objective of the proposed study, the
researcher will employ the use of both quantitative and
qualitative approaches in gathering data. Applying both
approaches is advantageous to the researcher and the reliability
of the results since the outcomes will adopt both comprehensive
descriptions and accurate, quantifiable data in the form of
statistics and numbers to meet the standards of a scientific
research study. [footnoteRef:8] [8: "Methodology Of Science
And General-Scientific Methods Of Research," European
Researcher 105, no. 4 (2016).]
Data Collection Method and Tools
The researcher will use an interviewing method aside from
reviewing records, figures, statistics, and reports on the same.
The interview method will be adopted to identify emotions,
6. ideas, thoughts, and opinions of the participants during data
gathering process. The tool that will be used to collect data will
include a structured questionnaire. The researcher will use a
structured questionnaire to avoid respondent deviating7 from
the point of discussion. Also, the researcher will ask additional
questions other than the ones included in the questionnaire to
get additional contributions of the participants.
Sample Selection and the Research Process
The sample selection method for the proposed research will be
the purposive method where the examiner will develop a sample
for the research. The purposive sample selection method is a
technique under the non-probability sampling methods where
samples are selected from a population on the basis of their
knowledge, experiences, and relationships with the subject
matter under study.6 The research process will involve the
examiner engaging the participants in informed consent before
subjecting them to the questionnaire. The interviewing process
is planned to last between 10 to 15 minutes, and the participants
will have the freedom to express their thoughts, opinions, ideas,
and so on as it pertains to the subject matter under
investigation.
Bibliography
Bennett, Angela. The Geneva Convention. New York: The
History Press, 2013.
Chang, Mark. Principles Of Scientific Methods. Boca Raton,
Fla.: CRC Press, Taylor et Francis, 2015.
Courtney, Aidan. "Law, Economics And Cyberspace: The
Effects Of Cyberspace On The Economic Analysis Of Law."
SCRIPT-ed (2004): 505-509.
Eilstrup-Sangiovanni, Mette. "Why The World Needs An
International Cyberwar Convention." Philosophy &
Technology (2017).
Magee, Tamlin. "Does The World Need A Geneva Convention
For Cyber Warfare?". Techworld. Last modified 2017. Accessed
December 14, 2017. https://www.techworld.com/security/does-
7. world-need-geneva-convention-for-cyber-warfare-3656996/.
"Methodology Of Science And General-Scientific Methods Of
Research." European Researcher 105, no. 4 (2016).
PARODI, Filippo. "The Concept Of Cybercrime And Online
Threats Analysis." International Journal of Information Security
and Cybercrime 2, no. 1 (2013): 59-66.
Smahel, David, and Kristian Daneback. "Editorial: Researching
Bright And Dark Sides Of The Cyberspace." Cyberpsychology:
Journal of Psychosocial Research on Cyberspace 7, no. 3
(2013).