Abstract
Cyber intrusions may be characterized in one or more of three legal regimes: law enforcement, intelligence collection and military operations. Furthermore, most intrusions occur across a number of jurisdictional boundaries, building complex conflict-of-laws questions into such attacks. Applying a one-size-fits-all response, such as always terminating all interaction with the intruder or always responding in kind, can be an ineffective or even worse, illegal, response. In order to assist investigators and legal experts addressing the legal aspects of cyber incidents, we have developed a decision support tool that takes them through a series of questions that are akin to those posed by an attorney to a client seeking legal guidance. Our tool may be used by builders and users. Builders use the tool to construct trees of legal arguments applied to the incidents at hand with the documentation useful for building legal briefs. Users interact with the tool by answering a series of questions to obtain viable legal arguments with supporting documents.
Chapter PDF
References
K. Curran and L. Higgins, A legal information retrieval system, Journal of Information, Law and Technology, vol. 3, 2000.
S. Duguid, L. Edwards and J. Kingston, A web-based decision support system for divorce lawyers, Journal of Law, Computers and Technology, vol. 15, pp. 265–280, 2001.
A. Gangemi, A. Prisco, M. Sagri, G. Steve and D. Tiscornia, Some ontological tools to support legal regulatory compliance, Proceedings of the Workshop on Regulatory Ontologies and the Modeling of Complaint Regulations, Lecture Notes in Computer Science (Vol. 2889), Springer-Verlag, Berlin Heidelberg, Germany, pp. 607–620, 2003.
C. Hafner, Legal reasoning models, in International Encyclopedia of the Social and Behavioral Sciences, Elsevier, Amsterdam, The Netherlands, 2001.
C. Hafner and D. Berman, The role of context in case-based legal reasoning: Teleological, temporal and procedural, Artificial Intelligence and Law, vol. 10, pp. 19–64, 2002.
M. Hall, A. Stranieri and J. Zeleznikow, A strategy for evaluating web-based decision support systems, Proceedings of the Sixth East-European Conference on Advances in Data Information Systems, 2002.
P. Huygen, Use of Bayesian belief networks in legal reasoning, Proceedings of the Seventeenth British and Irish Legal Education Technology Association Conference, 2002.
E. Katsh and J. Rifkin, Online Dispute Resolution: Resolving Conflicts in Cyberspace, Jossey-Bass, San Francisco, California, 2001.
J. Michael, On the response policy of software decoys: Conducting software-based deception in the cyber battlespace, Proceedings of the Twenty-Sixth Computer Software and Applications Conference, pp. 957–962, 2002.
J. Michael and T. Wingfield, Lawful cyber decoy policy, in Security and Privacy in the Age of Uncertainty, D. Gritzalis, et al., (Eds.), Kluwer, Boston, Massachusetts, pp. 483–488, 2003.
A. Muntjewerff, Automated training of legal reasoning, Proceedings of the Ninth British and Irish Legal Education Technology Association Conference, pp. 51–58, 1994.
A. Muntjewerff, A. Jordaans, R. Huekstra and R. Leenes, Case analysis and storage environment (case), JURIX, 2002.
V. Randall, Online academic assistance for law students (academic.udayton.edu/legaled/online/).
A. Stranieri, J. Yearwood and J. Zeleznikow, Tools for placing legal decision support systems on the World-Wide Web, Proceedings of the Eighth International Conference on Artificial Intelligence and Law, pp. 206–214, 2001.
A. Stranieri and J. Zeleznikow, Tools for intelligent decision support system development in the legal domain, Proceedings of the Twelfth IEEE International Conference on Tools with Artificial Intelligence, pp. 186–189, 2000.
J. Zeleznikow, Using web-based legal decision support systems to improve access to justice, Journal of Information and Communication Technology Law, 2002.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Peng, L., Wingfield, T., Wijesekera, D., Prye, E., Jackson, R., Michael, J. (2006). Making Decisions about Legal Responses to Cyber Attacks. In: Pollitt, M., Shenoi, S. (eds) Advances in Digital Forensics. DigitalForensics 2005. IFIP — The International Federation for Information Processing, vol 194. Springer, Boston, MA. https://doi.org/10.1007/0-387-31163-7_23
Download citation
DOI: https://doi.org/10.1007/0-387-31163-7_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30012-2
Online ISBN: 978-0-387-31163-0
eBook Packages: Computer ScienceComputer Science (R0)