Requirement for discussion board: Response and respond to at least

 Requirement for discussion board: 

Response and respond to at least one other post, offering one or two paragraphs of additional insight and details. This could be additional support for their point of view, or it could be arguing a counterpoint. 

Discussion Board of other student is below:

# – Is a cyberattack ever morally justified in response to an enemy conventional attack?

For the discussion topic on ethical considerations for cyber operations, I chose to answer questions 1 and 5.  According to Dipert (2010), cyber warfare and conventional warfare share commonality based on the uncertainty of the outcome of an attack, as well as any side effects that may occur as a result (p 385).  He also believes that the evidence you have to justify an attack should be weighed against the moral conditions for going to war in the first place (p 400).  Therefore, I believe a cyber-attack is morally justified in response to a conventional attack, especially if the war outcome is devasting and the cyber-attack is used prevent further destruction from happening.  My reason is based on Dipert’s (2010) description of cyber tactics in warfare using an electromagnetic force to disrupt a target’s radio communications, machinery, and infrastructure (p 397).  In conventional warfare the attacker is probably already known, and the evidence needed to justify deploying a cyber-attack is likely valid.  My decision to deploy a cyber-attack would be based on what might happen as a result of not stopping the attack.

# – Once a war (cyber- or conventional) has begun what kinds of cyberattacks are morally justified?

Dipert (2010) says that we should think about proportionality and likelihood of success when considering to what extent a cyber-attack is morally justified once a war has begun (p 392).  Based on this theory, proportionality means that however you decide to respond to a conflict, your response should be less harsh than what was inflicted on you (Pope, p 29).  Therefore, under the proportionality criteria the saying ‘eye for an eye’ may not be justified in response to war because it would suggest that I am trying to enforce equal treatment on target solely in retaliation.  I understand why proportionality should be considered in this case because, if not, it could lead to unnecessary casualties and economies being without resources, like food, housing, and utilities for a long period of time.  However, once the war has begun, the kinds of cyber-attacks that could be deployed morally would really depends on the severity or likelihood that the situation will only get worse if nothing is done to stop it.  For instance, I think dismantling electronic devices to prevent communication and machinery to keep it from functioning as it normally would, would be a morally justified cyber-attack.  I would consider taking down any resources that keep an enemy in power.  While I would also be concerned with noncombatant immunity and ensuring that innocent people do not endure inhumane conditions (Pope, 15), I would likely be less concerned with noncombatant immunity of a target if no other options existed for a cyber-attack to be morally justified. 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

My Topic for this paper is VP shunt I have attached the rubric Nursing Assignment Help

My Topic for this paper is VP shunt  I have attached the rubric  Follow these guidelines when completing this assignment. Speak with your faculty member if you have questions. Choose a therapeutic modality or healthcare technology. Examples of a therapeutic modality include Extracorporeal Membrane Oxygenation, Automatic rotating pronation beds, right

This assignment is the same for weeks 5-8 but the

  This assignment is the same for weeks 5-8 but the roles will shift through your group as different folks present. Each person will present once and each person will be the facilitator once. Note these responsibilities on the forms you turn in to the instructor. Prior to Week Five:

Measurement, Data Display, and Data-Based Decisions

This assignment is the second component of your Assessment, Intervention Support, and Related Systems project. Before proceeding with the assignment, please review the activities in the Unit 1 studies to refresh your memory on the functions, dimensions, and procedures of measurement and graphic display of behavioral data in applied behavior

Please respond to the following: Using the textbook, Strayer Library,

  Please respond to the following: Using the textbook, Strayer Library, and the Bachelor of Business Administration Library Guide, examine and explain two sources of outside equity financing and two sources of debt financing, that are available to entrepreneurs. Next, describe the source or sources you would use if you

Crime analysis is one of the most effective tools available

  Crime analysis is one of the most effective tools available to support law enforcement agencies today. Data collection is worthless unless it is easily understood and has relevance to the case. Analysis of information provides the indicators of what one has and what is missing. The analysis ultimately organizes

Please submit your chapters 1-3 drafts. Before submitting, you should

  Please submit your chapters 1-3 drafts. Before submitting, you should review Chapter 2 to ensure that it aligns with Chapter 1 and 3. Are all of the variables in your research questions discussed in Chapter 2? Do you have literature in Chapter 2 that supports/justifies your research questions? Use

APA format 175 – 265 words Must Cite at least

APA format 175 – 265 words Must Cite at least one peer-reviewed reference Respond to the following: Discuss the importance of an organization’s mission, vision, values, and strategies. 1.How should these elements shape the organizational culture and develop culture for change? Share your response in a minimum of 175 words,

Context The focus of this discussion is on understanding the

  Context The focus of this discussion is on understanding the differences between economies of scale and economies of scope. What are the key differences? Use these concepts to determine whether gains from economies of scale or gains from economies of scope were the principal reason behind a merger or acquisition.

This short paper will explore the benefits of having technologies/systems

  This short paper will explore the benefits of having technologies/systems in place to provide more in-depth information that will help drive decision making.  The information that is gathered every day in healthcare drives patient care and the improvement of the quality of care. Each staff member within a healthcare

WOMEN DURING THE 1800’S

 CHOSEN GROUP IS WOMEN DURING THE 1800’S •Describing the events that you will discuss in your Final Project. •Locating the sources that you need for your Final Project. •Determining the direction of your project by writing a thesis statement. To complete the worksheet, address the following points: •Pick a group.

If the GDP of Mexico doubles, and the GDP of the US triples at the

Typos corrected: fun and games in Q3 were interchanged by mistake in several places that are noted now for your reference. (10 marks) Think of the simple gravity model. Suppose there are two countries: the US and Mexico. Mexico’s GDP is 25 while the US’s GDP is 50. The distance

1 – How could mixed methods research be used with

1 – How could mixed methods research be used with your research study? 2 – What is the advantage of using mixed methods research? What is a disadvantage? 3 – Do you believe mixed methods research is better than qualitative or quantitative research? Why or why not?4 – why is

I need a PowerPoint done that reflects off of my

I need a PowerPoint done that reflects off of my Dissertation Proposal. It need to be 5 slides for Chapter 1, 5 slides for Chapter 2, and 5 slides for Chapter 3. Milestone 7: Dissertation Proposal Presentation and Defense Work with your dissertation chair to determine any specific instructions or

Certificate IV in Training and Assessment in TAFE Australia

Description The course is TAE40116 certificate IV in Training and Assessment in TAFE Australia The coursework to be completed is the last part of the course focused in: Planning assessment activities and process (TAEASS401) Design and develop assessment tools (TAEASS502) Assess competence (TAEASS402) Participate in assessment validation (TAEASS403) The format