An ontology-based distributed whiteboard to determine legal responses to online cyber attacks
Wingfield, Thomas C.
Michael, James B.
MetadataShow full item record
Purpose – This paper aims to assist investigators and attorneys addressing the legal aspects of cyber incidents, and allow them to determine the legality of a response to cyber attacks by using the Worldwide web securely. Design/methodology/approach – Develop a decision support legal whiteboard that graphically constructs legal arguments as a decision tree. The tree is constructed using a tree of questions and appending legal documents to substantiate the answers that are known to hold in anticipated legal challenges. Findings – The tool allows participating group of attorneys to meet in cyberspace in real time and construct a legal argument graphically by using a decision tree. They can construct sub-parts of the tree from their own legal domains. Because diverse legal domains use different nomenclatures, this tool provides the user the capability to index and search legal documents using a complex international legal ontology that goes beyond the traditional LexisNexis-like legal databases. This ontology itself can be created using the tool from distributed locations. Originality/value – This tool has been fine-tuned through numerous interviews with attorneys teaching and practicing in the area of cyber crime, cyber espionage, and military operations in cyberspace. It can be used to guide forensic experts and law enforcement personnel during their active responses and off-line examinations.
The article of record as published may be located at http://dx.doi.org/10.1108/10662240610710969
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Drew, Sasha K.; Heinen, Charles W. (Monterey, CA; Naval Postgraduate School, 2022-03);Deception methods have been applied to the traditional domains of war (air, land, sea, and space). In the newest domain of cyber, deception can be studied to see how it can be best used. Cyberspace operations are an essential ...
Wingfield, Thomas C.; Michael, James B.; Wijesekera, Duminda (Naval Postgraduate School, 2005-06);Cyber intrusions are rarely met with the most effective possible response, less for technical than legal reasons. Different rogue actors (terrorists, criminals, spies, etc.) are governed by overlapping but separate domestic ...
Nissen, Mark E. (Monterey, California. Naval Postgraduate School, 2010); NPS-IS-10-006Knowledge is key to sustainable competitive advantage, but different kinds of knowledge affect competitive advantage differently, and they exhibit qualitatively different dynamic properties and behaviors. This places ...