Duncan B. Hollis's research while affiliated with Temple University and other places

Publications (11)

Chapter
Election interference is one of the most widely discussed international phenomena of the last five years. Russian covert interference in the 2016 U.S. presidential election elevated the topic into a national priority, but that experience was far from an isolated one. Evidence of election interference by foreign states or their proxies has become a...
Chapter
This chapter surveys the most prominent existing regulatory mechanisms for combating foreign election interference today—international law, domestic law, and technical measures—and explains the gaps and challenges each faces. To supplement these responses, the chapter calls for democracies to develop and apply cybernorms—socially constructed shared...
Article
Evidence of election interference by foreign states or their proxies has become a regular feature of national elections and is likely to get worse in the near future. Information and communication technologies afford those who would interfere with new tools that can operate in ways previously unimaginable: Twitter bots, Facebook advertisements, clo...
Article
Accusations of bad state behaviour in cyberspace are proliferating, yet this increase in naming has not obviously produced much shame. Accused states uniformly deny the accusation or decline to comment, without changing behaviour. For international lawyers, the problem is compounded by the absence of international law in these charges. States are n...
Article
This essay explores the ethical and legal implications of prioritizing the militarization of cyberspace as part of a roundtable on “Competing Visions for Cyberspace.” Our essay uses an ideal type—a world that accepts warfighting as the prime directive for the construction and use of cyberspace—and examines the ethical and legal consequences that fo...
Article
On February 16, 2016, a U.S. court ordered Apple to circumvent the security features of an iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple refused. It argued that breaking encryption for one phone could not be done without undermining the security of encryption more generally. It made a public appeal for “e...

Citations

... The former began around 1995 shortly after the commercialization of the Internet and the popularization of the World Wide Web, and which came to a close around 2015 when a critical mass of developments signaled the next phase of digitalization cryptocurrencies such as Bitcoin and Ethereum based on Distributed Ledger Technologies such as blockchain as well as applications of machine learning, data science, the Internet of Things (e.g., smart grids), artificial intelligence, and decision and data visualization began to become beacons and facilitators for shaping its next phase (Sharda et al., 2020). A (related) marker and defining moment for the end of the first phase of digitalization can also be seen in the massive and unprecedented impact of social media on the business of government, for example, by enabling cleanly targeted and unchecked interferences of foreign powers on general elections and referendums of a nation, which signal the beginning of a radically new phase in the digitalization story of government including elements of cyber warfare widely visible since at least about 2015 (Hollis et al., 2017). ...
... Handlungsverhinderung auf der Softpower-Ebene könnte dagegen durch Naming-und-Shaming-, bzw. Accusation-Strategien, in internationalen Organisationen angestrebt werden, um einen Normbrecher durch das Offenlegen des Normbruchs durch potenzielle Reputationsverluste in Zukunft hiervon abzubringen(Finnemore und Hollis 2020). Ein Beispiel hierfür wären Anklageerhebungen gegen ausländische Hacker, mit rechtlicher Fundierung: Deren materielle Zwangswirkung ist oftmals eingeschränkt, jedoch können sie erhebliche Signalwirkungen auf normativer Ebene entfalten(Hinck und Maurer 2019).Im Folgenden wird erläutert, warum Proxies für eine empirische Anwendung dieser aufgezeigten Machtkonzeption im Rahmen aktueller Konflikte im Bereich des Cyberspace ein sinnvolles Konzept darstellen. ...
... Secondly, the issue of election interference has been put firmly on the agenda since the well-documented case of the 2016 US presidential elections (Ohlin 2020;Egloff 2020;Buchanan 2020;ODNI 2017). Embedded in the larger global debate about disinformation and information operations, election interference is an issue that has surfaced in an increasing number of countries (Schia and Gjesvik 2020;Hollis and Neutze 2021). Given the fact that elections determine the distribution of political power andin democratic statesare an expression of the political will of the people, many states are trying to find a way to address the issue internationally, including in the GGE and OEWG processes. ...
... Given such developments, attribution practices and processes are not only considered a practical-operational issue but have also become the focus of scholarly publications (exemplary, but not exhaustively, see [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]). The literature has covered the scope and limits of attribution processes, as well as the uncertainty existing at an international level regarding the judgements reached by individual stakeholders from the public and the private sector. ...
... Fourth, the public has a role to play in the development of norms regarding offensive weapons and cyberspace. The last decade has seen an intensifying public debate about cyberspace sovereignty, which many have characterized as a debate about the future of the Internet itself (Meyer, 2020;Hollis & Ohlin, 2018). To date, the Internet has operated according to a multistakeholder model that views cyberspace as a neutral domain that should remain free from overt militarization and restrictive national management. ...
... Настоящая статья рассматривает нормы как социальные конструкты, которые могут изменяться по мере развития объекта управления и при этом, отражают совпадающие ожидания акторов относительно объекта регулирования и одобряемых стандартов поведения. Цифровое пространство не отличается существенным образом от других объектов регулирования с точки зрения этапов жизненного цикла норм и проблематики их практической имплементации (Finnemore Hollis 2016). ...
... y; generate violations of good practices pursued by this type of application. Ethics has been an important factor in the design, implementation and use of social networks and AI as mentioned in(Taddeo, 2018) where projects have implemented regulations to define and explain when and how an AI system can make decisions and what would be their impact.(Finnemore, 2016) describes elements of ...