Non-Zero-Sum Game Analysis the Controversy of Cyber Attacks Constitutes the Use of Force

Authors

  • Yuchen Han The University of New South Wales, Sydney, New South Wales, Australia Author

Keywords:

cybersecurity, international law, Cyber Sovereignty, Internet Freedom, zero-sum game

Abstract

This paper examines the evolving challenges of cyberattacks within the framework of international law, highlighting the inadequacy of traditional legal doctrines in addressing the complex dynamics of cyberspace governance. It analyzes the divergence between dominant international camps advocating either "Internet Freedom" or "Cyber Sovereignty", and the resulting zero-sum competition that hinders cooperative security efforts. Through case studies such as the NotPetya and Stuxnet attacks, the study underscores the limitations of existing legal instruments like the Tallinn Manual and explores the necessity of refining legal standards and attribution mechanisms. The paper further advocates for a shift from a zero-sum logic to a non-zero-sum model emphasizing institutional innovation, mutual trust-building, and integrated defense strategies. Practical recommendations include enhancing critical infrastructure defenses and establishing international confidence-building measures to foster sustainable cooperation in cyberspace governance.

References

1. H. Eslam and G. Tiwari, "Cyberspace: Reimagining Cybersecurity and Its Impact on State Sovereignty," in Cybercrime Unveiled: Technologies for Analysing Legal Complexity, Cham, Switzerland: Springer Nature, 2025, pp. 93–112, doi: 10.1007/978-3-031-80557-8_4.

2. A. Chander and H. Sun, "Sovereignty 2.0," Vand. J. Transnat'l L., vol. 55, pp. 283, 2022, doi: 10.2139/ssrn.3904949.

3. M. Saaida, "Digital Sovereignty," Sci. For All Publ., vol. 6, no. 1, pp. 1–12, 2023, doi: 10.14763/2020.4.1532.

4. A. Bogdanchikova, "The Prisoners' Dilemma of the Cyber Relations between the European Union and Russia," 2022.

5. M. Murniasari, "China's Cybersecurity Governance as Part of Foreign and Security Policy," Security Intell. Terrorism J., vol. 1, no. 2, pp. 94–107, 2024, doi: 10.70710/sitj.v1i2.23.

6. M. Jiang, "Chinese Cybersecurity Policies in the Age of Cyber Sovereignty," in Quo Vadis, Sovereignty? New Conceptual and Regulatory Boundaries in the Age of Digital China, Cham, Switzerland: Springer Nature, 2023, pp. 77–90, doi: 10.1007/978-3-031-41566-1_5.

7. Z. F. Rao, "Human-Centric Cybersecurity: Safeguarding Individuals in the Digital Age," 2024.

8. D. Broeders, F. Cristiano, M. Kaminska et al., "In search of digital sovereignty and strategic autonomy: Normative power Eu-rope to the test of its geopolitical ambitions," J. Common Mark. Stud., vol. 61, no. 5, pp. 1261–1280, 2023, doi: 10.1111/jcms.13462.

9. H. Huang, "Digital Diplomacy in Cyberspace Governance," in China’s Diplomacy and Int. Law, Singapore: Springer Nature, 2024, pp. 269–310, doi: 10.1007/978-981-97-1968-6_8.

10. C. Chen and B. Dong, "Digital forensics analysis based on cybercrime and the study of the rule of law in space governance," Open Comput. Sci., vol. 13, no. 1, p. 20220266, 2023, doi: 10.1515/comp-2022-0266.

11. D. Huang, "40 Years of China's International Governance in Cyberspace," in Research on the Rule of Law of China’s Cybersecurity: China’s Rule of Law in Cybersecurity Over the Past 40 Years, Singapore: Springer Nature, 2022, pp. 139–171, doi: 10.1007/978-981-16-8356-5_4.

12. J. Burton and G. Christou, "Bridging the gap between cyberwar and cyberpeace," Int. Aff., vol. 97, no. 6, pp. 1727–1747, 2021, doi: 10.1093/ia/iiab172.

13. S. Kim, "The Inter-network Politics of Cyber Security and Middle Power Diplomacy: A Korean Perspective," in Korea’s Middle Power Diplomacy: Between Power and Network, Cham, Switzerland: Springer Int. Publ., 2022, pp. 97–123, doi: 10.1007/978-3-030-76012-0_6.

14. T. Manuwa, "Analysis of the Impact of Cyber-Diplomacy on International Relations," J. Public Admin. Manag., vol. 2, no. 4, pp. 1–9, 2023.

Downloads

Published

14 June 2025

Issue

Section

Article

How to Cite

Han, Y. (2025). Non-Zero-Sum Game Analysis the Controversy of Cyber Attacks Constitutes the Use of Force. International Journal of Law, Policy & Society, 1(1), 27-35. http://pinnaclepubs.com/index.php/IJLPS/article/view/143