Responsibility: all participants, including policymakers and program designers, are responsible for the security of information systems and networks.
Response: Participants should act in a timely and cooperative manner to prevent, detect and respond to security incidents. Where permissible, this may involve cross-border information sharing and cooperation.
Ethical standards and conducts: Pa
orders (violations of higher law)
“London Agreement” SMJ (Subject Matter Jurisdiction) Art 6:
- Crimes against Peace
War of aggression
- War Crimes
Plunder, destruction of cities, deportation/slave labor
- Crimes against Humanity
ICTY (International Criminal Tribunal for the former Yugoslavia)
- 1992 – Special Rapporteur: CHR
devastating effects on other people. If real names are used on the internet, we will become more responsible for what we say.
-인터넷 실명제에 대한 반대의견
I am against the internet real-name system. This can expose me to hackers and other dangers of the internet. We do not have very secure online security systems yet. So the number of online criminal activities may increase.
criminal and political violence
Loss of control over their borders
Declining levels of GDP per capita
Rising ethnic, religious, linguistic, and cultural hostilities
Use of terror against their own citizens
Collapsed health system
Basic food shortage, leading to starvation
Basic differences among civilizations
also emerging as a serious social problem. Especially, mass media has a great influence on teenagers. According to Park (2009), mass communication is largely responsible for teenage crimes. For example, movies with violent scenes on television encourage teenagers to do copycat crimes. As a result, when they keep watching the violent scenes in the long term, they get insensitive to criminal acts.