001454144 000__ 04236cam\a2200553\i\4500 001454144 001__ 1454144 001454144 003__ OCoLC 001454144 005__ 20230314003503.0 001454144 006__ m\\\\\o\\d\\\\\\\\ 001454144 007__ cr\cn\nnnunnun 001454144 008__ 230123s2023\\\\si\a\\\\ob\\\\001\0\eng\d 001454144 019__ $$a1360514988$$a1361716859$$a1365332480 001454144 020__ $$a9789811981326$$q(electronic bk.) 001454144 020__ $$a9811981329$$q(electronic bk.) 001454144 020__ $$z9789811981319 001454144 020__ $$z9811981310 001454144 0247_ $$a10.1007/978-981-19-8132-6$$2doi 001454144 035__ $$aSP(OCoLC)1363840702 001454144 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dAU@$$dYDX$$dEBLCP$$dUKMGB$$dSFB 001454144 049__ $$aISEA 001454144 050_4 $$aQA76.9.A25 001454144 08204 $$a005.8$$223/eng/20230123 001454144 1001_ $$aThomas, A. Jean,$$eauthor. 001454144 24514 $$aThe open world, hackbacks and global justice /$$cA. Jean Thomas. 001454144 264_1 $$aSingapore :$$bPalgrave Macmillan,$$c[2023] 001454144 264_4 $$c©2023 001454144 300__ $$a1 online resource (xv, 354 pages) :$$billustrations 001454144 336__ $$atext$$btxt$$2rdacontent 001454144 337__ $$acomputer$$bc$$2rdamedia 001454144 338__ $$aonline resource$$bcr$$2rdacarrier 001454144 347__ $$atext file$$bPDF$$2rda 001454144 504__ $$aIncludes bibliographical references and index. 001454144 5050_ $$a1. Introduction -- Part I. Open World Skepticism and Attainable Ends -- 2. The Open World Ethos -- 3. Skepticism, Self-Defense/Help and Global Justice -- 4. Capabilities, Entitlements and VRN -- 5. Aggravating Factors, Freedom and Retaliation -- Part II. Domestic and International Hack-Backs -- 6. Surveillance and Disruption -- 7. Exceeding Authorized Access Under the CFAA -- 8. Amplifying American Power in Cyberspace -- 9. Capabilities, Populism and Presidential Leadership. . 001454144 506__ $$aAccess limited to authorized users. 001454144 520__ $$aThis book explores the current impasse that global regulators face in the digital sphere. Computer technology has advanced human civilization tenfold, but the freedom to interact with others in cyberspace has made individuals, discrete communities, organizations and governments more vulnerable to abuse. In consequence, political decision-makers are seriously considering granting limited legal immunity to victims who decide to 'hack- back.' Many victims frustrated by the slow pace of law enforcement in cyberspace have chosen to 'take the law into their own hands,' retaliating against those who have stolen valuable data and damaged network operations. Political deliberations about limited immunity for hackbacks usually ignore global justice and moral justifications for 'active defense' policies. Typically, cyber security policies balance deterrence against two different understandings of morality and the 'good life' : fairness or welfare. This book proposes a third moral rationale for cyber security policies : capability theory, developed principally by Amartya Sen and Martha Nussbaum. Properly formulated, a capability-based defense of retaliatory hackbacks can minimize attribution and cyber-escalation risks, deter bad behavior by casual computer users, disingenuous security experts, big tech companies, criminals and rogue governments, and satisfy calls for more retributive and distributive justice in the 'open world'. This book will appeal to legal theorists, political philosophers, social activists, investors, international relations scholars and businesspeople in the tech community. A. Jean Thomas is a lawyer and former programmer who has taught at two law schools. She has a BA from Swarthmore College, JD from University of Connecticut Law School and LL.M and S.J.D. from Harvard Law School. 001454144 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 23, 2023). 001454144 650_0 $$aComputer security$$xMoral and ethical aspects. 001454144 650_0 $$aComputer security$$xGovernment policy. 001454144 650_0 $$aHacking$$xMoral and ethical aspects. 001454144 655_0 $$aElectronic books. 001454144 77608 $$iPrinted edition$$z9789811981319 001454144 77608 $$iPrinted edition$$z9789811981333 001454144 77608 $$iPrinted edition$$z9789811981340 001454144 852__ $$bebk 001454144 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-8132-6$$zOnline Access$$91397441.1 001454144 909CO $$ooai:library.usi.edu:1454144$$pGLOBAL_SET 001454144 980__ $$aBIB 001454144 980__ $$aEBOOK 001454144 982__ $$aEbook 001454144 983__ $$aOnline 001454144 994__ $$a92$$bISE