{"id":"https://openalex.org/W3183278417","doi":"https://doi.org/10.23919/cycon51939.2021.9468290","title":"Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone","display_name":"Limiting Viral Spread: Automated Cyber Operations and the Principles of Distinction and Discrimination in the Grey Zone","publication_year":2021,"publication_date":"2021-05-25","ids":{"openalex":"https://openalex.org/W3183278417","doi":"https://doi.org/10.23919/cycon51939.2021.9468290","mag":"3183278417"},"language":"en","primary_location":{"id":"doi:10.23919/cycon51939.2021.9468290","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9468290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108757606","display_name":"Monica Kaminska","orcid":null},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]},{"id":"https://openalex.org/I2801375708","display_name":"Hague Institute for Global Justice","ror":"https://ror.org/0363anr51","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I2801375708"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Monica Kaminska","raw_affiliation_strings":["The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University,The Hague,The Netherlands","The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University,The Hague,The Netherlands","institution_ids":["https://openalex.org/I2801375708","https://openalex.org/I121797337"]},{"raw_affiliation_string":"The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands","institution_ids":["https://openalex.org/I2801375708","https://openalex.org/I121797337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059361701","display_name":"Dennis Broeders","orcid":"https://orcid.org/0000-0002-8827-2814"},"institutions":[{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]},{"id":"https://openalex.org/I2801375708","display_name":"Hague Institute for Global Justice","ror":"https://ror.org/0363anr51","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I2801375708"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Dennis Broeders","raw_affiliation_strings":["Global Security and Technology, The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University,The Hague,The Netherlands","Global Security and Technology, The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Global Security and Technology, The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University,The Hague,The Netherlands","institution_ids":["https://openalex.org/I2801375708","https://openalex.org/I121797337"]},{"raw_affiliation_string":"Global Security and Technology, The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands","institution_ids":["https://openalex.org/I2801375708","https://openalex.org/I121797337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044312875","display_name":"F\u00e1bio Cristiano","orcid":"https://orcid.org/0000-0002-0951-9648"},"institutions":[{"id":"https://openalex.org/I2801375708","display_name":"Hague Institute for Global Justice","ror":"https://ror.org/0363anr51","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I2801375708"]},{"id":"https://openalex.org/I121797337","display_name":"Leiden University","ror":"https://ror.org/027bh9e22","country_code":"NL","type":"education","lineage":["https://openalex.org/I121797337"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Fabio Cristiano","raw_affiliation_strings":["The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University,The Hague,The Netherlands","The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University,The Hague,The Netherlands","institution_ids":["https://openalex.org/I2801375708","https://openalex.org/I121797337"]},{"raw_affiliation_string":"The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands","institution_ids":["https://openalex.org/I2801375708","https://openalex.org/I121797337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108757606"],"corresponding_institution_ids":["https://openalex.org/I121797337","https://openalex.org/I2801375708"],"apc_list":null,"apc_paid":null,"fwci":8.8356,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.9743082,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"59","last_page":"72"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10749","display_name":"International Law and Human Rights","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12752","display_name":"Global Peace and Security Dynamics","score":0.9754999876022339,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6903780698776245},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6792104840278625},{"id":"https://openalex.org/keywords/norm","display_name":"Norm (philosophy)","score":0.6228268146514893},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.5743070840835571},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.4890314042568207},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4729342758655548},{"id":"https://openalex.org/keywords/international-humanitarian-law","display_name":"International humanitarian law","score":0.45980823040008545},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.3899877369403839},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.34341615438461304},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3183223009109497},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.307376503944397},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.23288977146148682},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23039650917053223},{"id":"https://openalex.org/keywords/international-law","display_name":"International law","score":0.2102496325969696},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.14326560497283936}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6903780698776245},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6792104840278625},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.6228268146514893},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.5743070840835571},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.4890314042568207},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4729342758655548},{"id":"https://openalex.org/C2778573023","wikidata":"https://www.wikidata.org/wiki/Q381148","display_name":"International humanitarian law","level":3,"score":0.45980823040008545},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.3899877369403839},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34341615438461304},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3183223009109497},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.307376503944397},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.23288977146148682},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23039650917053223},{"id":"https://openalex.org/C55447825","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"International law","level":2,"score":0.2102496325969696},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.14326560497283936},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon51939.2021.9468290","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon51939.2021.9468290","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 13th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions"},{"id":"https://metadata.un.org/sdg/10","score":0.44999998807907104,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W3133713757"],"abstract_inverted_index":{"The":[0,157],"fact":[1],"that":[2,66,93,129,142,160],"States":[3,143,203,264],"resort":[4],"to":[5,97,115,126,150,197,212,241],"automated":[6,31,127],"cyber":[7,146,209],"operations":[8,32,92,128,147,210],"like":[9],"NotPetya,":[10],"which":[11,263],"spread":[12,96],"virally":[13],"and":[14,63,77,79,83,91,113,175,226,239],"have":[15,33],"indiscriminate":[16],"effects,":[17],"raises":[18],"the":[19,23,38,41,45,59,74,108,132,135,139,162,170,173,176,179,186,190,193,200,217,228,244,249],"question":[20],"of":[21,25,40,43,47,61,111,134,137,164,172,178,189,208,224,232],"how":[22],"use":[24,42,136,177],"these":[26],"might":[27,94],"be":[28,89],"regulated.":[29],"As":[30],"thus":[34],"far":[35],"fallen":[36],"below":[37,131],"threshold":[39,133],"force,":[44],"letter":[46],"international":[48],"humanitarian":[49],"law":[50],"(IHL)":[51],"does":[52,181],"not":[53,88,182],"provide":[54],"such":[55],"regulation.":[56],"In":[57,195],"IHL,":[58],"principles":[60,110],"distinction":[62,112,168],"discrimination":[64,114],"hold":[65],"attacks":[67],"should":[68,144,204],"in":[69,161],"their":[70,213],"targeting":[71],"distinguish":[72],"between":[73,80,169],"civilian":[75,81,99],"population":[76],"combatants,":[78],"objects":[82,100],"military":[84],"objectives.":[85],"Attacks":[86],"must":[87],"indiscriminate,":[90],"foreseeably":[95],"affect":[98],"are":[101],"prohibited.":[102],"This":[103,251],"paper":[104,158,218],"draws":[105],"inspiration":[106],"from":[107,153],"legal":[109],"suggest":[116],"a":[117,167,206,221,255,260],"non-binding":[118],"norm":[119,140],"for":[120],"responsible":[121,202],"State":[122],"behaviour":[123],"with":[124,199,220,248],"regard":[125],"fall":[130],"force:":[138],"proposes":[141],"design":[145,187],"so":[148],"as":[149,216],"prevent":[151],"them":[152],"indiscriminately":[154],"inflicting":[155],"damage.":[156],"finds":[159],"case":[163],"automatedcyber":[165],"operations,":[166],"nature":[171],"operation":[174,180,234],"make":[183],"sense":[184],"because":[185],"(nature)":[188],"malware":[191],"defines":[192],"use.":[194],"order":[196],"conform":[198],"norm,":[201],"conduct":[205],"review":[207],"prior":[211],"execution.":[214],"Finally,":[215],"illustrates":[219],"comparative":[222],"analysis":[223,231],"NotPetya":[225],"Stuxnet,":[227],"post-incident":[229],"forensic":[230],"an":[233],"can":[235,252],"allow":[236],"third":[237],"parties":[238],"victims":[240],"determine":[242],"whether":[243],"operation's":[245],"designer":[246],"conformed":[247],"norm.":[250],"help":[253],"set":[254],"normative":[256],"benchmark":[257],"by":[258],"providing":[259],"basis":[261],"upon":[262],"may":[265],"call":[266],"out":[267],"unacceptable":[268],"behaviour.":[269]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
