An ontology-based distributed whiteboard to determine legal responses to online cyber attacks

Download
Author
Peng, Leisheng
Wijesekera, Duminda
Wingfield, Thomas C.
Michael, James B.
Date
2006Metadata
Show full item recordAbstract
Purpose – This paper aims to assist investigators and attorneys addressing the legal aspects of
cyber incidents, and allow them to determine the legality of a response to cyber attacks by using the
Worldwide web securely.
Design/methodology/approach – Develop a decision support legal whiteboard that graphically
constructs legal arguments as a decision tree. The tree is constructed using a tree of questions and
appending legal documents to substantiate the answers that are known to hold in anticipated legal
challenges.
Findings – The tool allows participating group of attorneys to meet in cyberspace in real time and
construct a legal argument graphically by using a decision tree. They can construct sub-parts of the
tree from their own legal domains. Because diverse legal domains use different nomenclatures, this
tool provides the user the capability to index and search legal documents using a complex
international legal ontology that goes beyond the traditional LexisNexis-like legal databases. This
ontology itself can be created using the tool from distributed locations.
Originality/value – This tool has been fine-tuned through numerous interviews with attorneys
teaching and practicing in the area of cyber crime, cyber espionage, and military operations in
cyberspace. It can be used to guide forensic experts and law enforcement personnel during their active
responses and off-line examinations.
Description
The article of record as published may be located at http://dx.doi.org/10.1108/10662240610710969
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
TESTING DECEPTION WITH A COMMERCIAL TOOL SIMULATING CYBERSPACE
Drew, Sasha K.; Heinen, Charles W. (Monterey, CA; Naval Postgraduate School, 2022-03);Deception methods have been applied to the traditional domains of war (air, land, sea, and space). In the newest domain of cyber, deception can be studied to see how it can be best used. Cyberspace operations are an essential ... -
Optimizing Lawful Responses to Cyber Intrusions
Wingfield, Thomas C.; Michael, James B.; Wijesekera, Duminda (Naval Postgraduate School, 2005-06);Cyber intrusions are rarely met with the most effective possible response, less for technical than legal reasons. Different rogue actors (terrorists, criminals, spies, etc.) are governed by overlapping but separate domestic ... -
CyberKM: harnessing dynamic knowledge for competitive advantage through cyberspace
Nissen, Mark E. (Monterey, California. Naval Postgraduate School, 2010); NPS-IS-10-006Knowledge is key to sustainable competitive advantage, but different kinds of knowledge affect competitive advantage differently, and they exhibit qualitatively different dynamic properties and behaviors. This places ...