{"id":"https://openalex.org/W4384834189","doi":"https://doi.org/10.23919/cycon58705.2023.10182021","title":"Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts","display_name":"Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts","publication_year":2023,"publication_date":"2023-05-29","ids":{"openalex":"https://openalex.org/W4384834189","doi":"https://doi.org/10.23919/cycon58705.2023.10182021"},"language":"en","primary_location":{"id":"doi:10.23919/cycon58705.2023.10182021","is_oa":false,"landing_page_url":"http://dx.doi.org/10.23919/cycon58705.2023.10182021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092503363","display_name":"Marie Th\u00f8gersen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093470","display_name":"Royal Danish Defence College","ror":"https://ror.org/00h2bx184","country_code":"DK","type":"education","lineage":["https://openalex.org/I4210093470"]},{"id":"https://openalex.org/I124055696","display_name":"University of Copenhagen","ror":"https://ror.org/035b05819","country_code":"DK","type":"education","lineage":["https://openalex.org/I124055696"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Marie Th\u00f8gersen","raw_affiliation_strings":["University of Copenhagen,PhD Fellow, iCourts, Faculty of Law,Institute for Military Technology, Royal Danish Defence College,Copenhagen,Denmark","Institute for Military Technology, Royal Danish Defence College, PhD Fellow, iCourts, Faculty of Law, University of Copenhagen, Copenhagen, Denmark"],"affiliations":[{"raw_affiliation_string":"University of Copenhagen,PhD Fellow, iCourts, Faculty of Law,Institute for Military Technology, Royal Danish Defence College,Copenhagen,Denmark","institution_ids":["https://openalex.org/I4210093470"]},{"raw_affiliation_string":"Institute for Military Technology, Royal Danish Defence College, PhD Fellow, iCourts, Faculty of Law, University of Copenhagen, Copenhagen, Denmark","institution_ids":["https://openalex.org/I4210093470","https://openalex.org/I124055696"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5092503363"],"corresponding_institution_ids":["https://openalex.org/I124055696","https://openalex.org/I4210093470"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16906698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"39","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14282","display_name":"Security, Politics, and Digital Transformation","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.8222715854644775},{"id":"https://openalex.org/keywords/principle-of-legality","display_name":"Principle of legality","score":0.6878229379653931},{"id":"https://openalex.org/keywords/due-diligence","display_name":"Due diligence","score":0.626771092414856},{"id":"https://openalex.org/keywords/obligation","display_name":"Obligation","score":0.5984356999397278},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5831484198570251},{"id":"https://openalex.org/keywords/prima-facie","display_name":"Prima facie","score":0.5515598058700562},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.5344815254211426},{"id":"https://openalex.org/keywords/international-law","display_name":"International law","score":0.49096420407295227},{"id":"https://openalex.org/keywords/state-responsibility","display_name":"State responsibility","score":0.4848252534866333},{"id":"https://openalex.org/keywords/superpower","display_name":"Superpower","score":0.48407378792762756},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.46918630599975586},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4572886526584625},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.43441444635391235},{"id":"https://openalex.org/keywords/belligerent","display_name":"Belligerent","score":0.4326941967010498},{"id":"https://openalex.org/keywords/jurisdiction","display_name":"Jurisdiction","score":0.4211949110031128},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.4155806005001068},{"id":"https://openalex.org/keywords/customary-international-law","display_name":"Customary international law","score":0.4124298691749573},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.40419530868530273},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.2710973620414734},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.264676570892334},{"id":"https://openalex.org/keywords/public-international-law","display_name":"Public international law","score":0.2149222493171692},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15498387813568115},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.10508665442466736}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.8222715854644775},{"id":"https://openalex.org/C42027317","wikidata":"https://www.wikidata.org/wiki/Q2307054","display_name":"Principle of legality","level":2,"score":0.6878229379653931},{"id":"https://openalex.org/C2781016034","wikidata":"https://www.wikidata.org/wiki/Q794134","display_name":"Due diligence","level":2,"score":0.626771092414856},{"id":"https://openalex.org/C2778447849","wikidata":"https://www.wikidata.org/wiki/Q2648051","display_name":"Obligation","level":2,"score":0.5984356999397278},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5831484198570251},{"id":"https://openalex.org/C159717818","wikidata":"https://www.wikidata.org/wiki/Q837138","display_name":"Prima facie","level":2,"score":0.5515598058700562},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.5344815254211426},{"id":"https://openalex.org/C55447825","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"International law","level":2,"score":0.49096420407295227},{"id":"https://openalex.org/C2778042224","wikidata":"https://www.wikidata.org/wiki/Q163552","display_name":"State responsibility","level":3,"score":0.4848252534866333},{"id":"https://openalex.org/C2780219775","wikidata":"https://www.wikidata.org/wiki/Q1489259","display_name":"Superpower","level":3,"score":0.48407378792762756},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.46918630599975586},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4572886526584625},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.43441444635391235},{"id":"https://openalex.org/C2779112814","wikidata":"https://www.wikidata.org/wiki/Q2363432","display_name":"Belligerent","level":3,"score":0.4326941967010498},{"id":"https://openalex.org/C2776949292","wikidata":"https://www.wikidata.org/wiki/Q471855","display_name":"Jurisdiction","level":2,"score":0.4211949110031128},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.4155806005001068},{"id":"https://openalex.org/C2779921323","wikidata":"https://www.wikidata.org/wiki/Q1194894","display_name":"Customary international law","level":4,"score":0.4124298691749573},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.40419530868530273},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2710973620414734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.264676570892334},{"id":"https://openalex.org/C185436325","wikidata":"https://www.wikidata.org/wiki/Q4394526","display_name":"Public international law","level":3,"score":0.2149222493171692},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15498387813568115},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.10508665442466736},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/cycon58705.2023.10182021","is_oa":false,"landing_page_url":"http://dx.doi.org/10.23919/cycon58705.2023.10182021","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/d3a74548-7027-4b70-9062-7e457a5596c8","is_oa":false,"landing_page_url":"https://researchprofiles.ku.dk/da/publications/d3a74548-7027-4b70-9062-7e457a5596c8","pdf_url":null,"source":{"id":"https://openalex.org/S4306401983","display_name":"Research at the University of Copenhagen (University of Copenhagen)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I124055696","host_organization_name":"University of Copenhagen","host_organization_lineage":["https://openalex.org/I124055696"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Th\u00f8gersen , M 2023 , Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts . in T Jan\u010d\u00e1rkov\u00e1 , D Giovannelli , K Podi\u0146\u0161 & K Winther (eds) , 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) . IEEE , Tallinn , pp. 39-54 , International Conference on Cyber Conflict , 30/05/2023 . https://doi.org/10.23919/CyCon58705.2023.10182021","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4282968901","https://openalex.org/W2012125283","https://openalex.org/W4396519263","https://openalex.org/W2483279790","https://openalex.org/W2308386539","https://openalex.org/W2888832978","https://openalex.org/W3022056688","https://openalex.org/W3122994950","https://openalex.org/W1986963942","https://openalex.org/W2972471760"],"abstract_inverted_index":{"One":[0],"of":[1,6,11,24,37,44,57,63,95,105,121,127,130,156,195,201,215,222,231,235,246],"the":[2,9,14,22,34,38,41,55,72,89,93,100,118,128,131,137,148,176,190,193,199,211,216,224,229,232,237,244],"most":[3],"striking":[4],"aspects":[5],"cyberspace":[7,67],"is":[8],"diffusion":[10],"power":[12],"to":[13,31,164,169,210,228],"individual.":[15],"Even":[16],"a":[17,124,202],"single":[18],"person":[19],"can,":[20],"from":[21,248],"comfort":[23],"their":[25,152,167],"own":[26],"home,":[27],"cause":[28],"considerable":[29],"harm":[30],"States":[32,48,77,107,144,163],"on":[33,142,219,256],"other":[35,185],"side":[36],"globe.":[39],"Since":[40],"Russian":[42],"invasion":[43],"Ukraine,":[45,236],"both":[46],"belligerent":[47],"have":[49],"successfully":[50],"deployed":[51],"novel":[52],"techniques":[53],"for":[54,76,83,147,162,172,241],"mobilization":[56],"individuals":[58,109],"in":[59,66,192],"cyberspace.":[60],"The":[61,154],"absence":[62],"geographical":[64],"boundaries":[65],"triggers":[68],"important":[69,208],"questions":[70,259],"regarding":[71,260],"international":[73,102],"legal":[74,90,103,125,138,225,258],"implications":[75],"whose":[78],"territories":[79,168],"are":[80],"being":[81],"used":[82,171],"such":[84],"operations.":[85],"To":[86],"assess":[87],"how":[88,223],"framework":[91,226],"stands":[92],"test":[94],"reality,":[96],"this":[97,134],"article":[98,135,238],"examines":[99],"possible":[101],"obligations":[104,141],"non-participating":[106,242],"hosting":[108],"conducting":[110],"malicious":[111],"cyber":[112,173],"operations":[113,174],"against":[114],"Russia":[115],"orchestrated":[116],"by":[117],"IT":[119,132,233],"Army":[120,234],"Ukraine.":[122],"After":[123],"characterization":[126],"activities":[129,230],"Army,":[133],"scrutinizes":[136],"norms":[139],"conferring":[140],"territorial":[143],"and":[145,179,262],"accounts":[146],"prevailing":[149],"ambiguities":[150],"surrounding":[151],"application.":[153],"principle":[155],"due":[157,250],"diligence":[158,251],"entails":[159,207],"an":[160,196,205,220],"obligation":[161],"not":[165],"allow":[166],"be":[170,254],"affecting":[175],"rights":[177,214],"of,":[178],"producing":[180],"serious":[181],"adverse":[182],"consequences":[183],"for,":[184],"States.":[186],"Special":[187],"challenges":[188],"surround":[189],"assessment":[191],"context":[194],"armed":[197],"conflict;":[198],"status":[200],"State":[203],"as":[204],"aggressor":[206],"nuances":[209],"prima":[212],"facie":[213],"State.":[217],"Based":[218],"analysis":[221],"applies":[227],"concludes":[239],"that":[240],"States,":[243],"legality":[245],"refraining":[247],"exercising":[249],"will":[252],"often":[253],"contingent":[255],"contentious":[257],"countermeasures":[261],"self-defence.":[263]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
