Devi V A R A P R A S A D Romala | Andhra University (original) (raw)

Papers by Devi V A R A P R A S A D Romala

Research paper thumbnail of Cyber Conflict and Laws of War: An Analytical Study on Jus ad Bellum

NTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS, 2019

Cyberspace war involves conflict between parties that share information using technical methods a... more Cyberspace war involves conflict between parties that share information using technical methods and human-based operations. There are advantages to attacking, destroying, disabling, or usurping computer networks, or accessing knowledge that rivals do not want to disclose. Information and Communication Technology is used for strategic purposes, such as command, control and logistics. With the aid of GPS technology integrated belligerent systems will increase the destructive effects and decrease collateral damage. Military forces are linked by a network that provides shared knowledge and a view of the battlefield.

Research paper thumbnail of Judiciary Legislative Function: Quo Vadis

International Journal of Law Management and Humanities,, 2021

The judiciary defends the Constitution and citizens' rights from the unconstitutional acts of the... more The judiciary defends the Constitution and citizens' rights from the unconstitutional acts of the legislature and the executive. In a case where a particular law has become obsolete or is inadequate to meet the needs of the moment, the judiciary gives a sense to the current provision of a statute to address the issue. It is three government wings have specified powers and tasks for executive, legal and judiciary authorities, but there are instances in which the judiciary must fill the void created by the failure of the other two wings. It is the use of legal authority to define and implement what is advantageous to society in general and individuals in general. The Judicial activism in India affected almost every dimension of life, and it has been more than legal, or written in black and white, in the process. There are objections that the judgment violates the separation of powers principle. This research paper critically analyses the diverse aspects of the issue which includes separation of power in India, the judicial function, the power of judicial review, judicial activism and judicial overreach.

Research paper thumbnail of Cyber conflict and jus in Bello international humanitarian law on cyber attacks

International Journal of Law, 2021

The purpose of this research paper is to examine the provisions of International Humanitarian Law... more The purpose of this research paper is to examine the provisions of International Humanitarian Law on cyber operations in the context of International Armed Conflicts. This paper will discuss the legal application of the substantive rules restricting warfare to military conflicts involving cyber operations under the Additional Protocol I of the Geneva Convention. The purpose of this paper is to investigate the degree to which cyber operations that don't constitute an attack are governed by the provisions of Additional Protocol I and whether they are considered to be an attack. In this research paper, the definition for an attack should be interpreted strictly as referring only to cyber operations which lead to death and injury, to individuals or the harm or destruction of artefacts, while international humanitarian law applies to cyber warfare. The implications of this consequence-based interpretation of an 'attack' concept are that most significant safeguards protecting civilians and their artefacts do not apply to cyber operations under Additional Protocol I of the Geneva Convention. This research paper is limited to only Jus in Bello and does not discuss the Jus ad Bellum or the actions of individuals (e.g., groups of hackers). The technological aspects of cyber warfare will be discussed, as required. This paper deals with identifying cyber operations as attacks in international armed disputes and excludes issues like conflict attribution and classification.

Research paper thumbnail of Cyber Conflict and Laws of War: An Analytical Study on Jus ad Bellum

NTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS, 2019

Cyberspace war involves conflict between parties that share information using technical methods a... more Cyberspace war involves conflict between parties that share information using technical methods and human-based operations. There are advantages to attacking, destroying, disabling, or usurping computer networks, or accessing knowledge that rivals do not want to disclose. Information and Communication Technology is used for strategic purposes, such as command, control and logistics. With the aid of GPS technology integrated belligerent systems will increase the destructive effects and decrease collateral damage. Military forces are linked by a network that provides shared knowledge and a view of the battlefield.

Research paper thumbnail of Judiciary Legislative Function: Quo Vadis

International Journal of Law Management and Humanities,, 2021

The judiciary defends the Constitution and citizens' rights from the unconstitutional acts of the... more The judiciary defends the Constitution and citizens' rights from the unconstitutional acts of the legislature and the executive. In a case where a particular law has become obsolete or is inadequate to meet the needs of the moment, the judiciary gives a sense to the current provision of a statute to address the issue. It is three government wings have specified powers and tasks for executive, legal and judiciary authorities, but there are instances in which the judiciary must fill the void created by the failure of the other two wings. It is the use of legal authority to define and implement what is advantageous to society in general and individuals in general. The Judicial activism in India affected almost every dimension of life, and it has been more than legal, or written in black and white, in the process. There are objections that the judgment violates the separation of powers principle. This research paper critically analyses the diverse aspects of the issue which includes separation of power in India, the judicial function, the power of judicial review, judicial activism and judicial overreach.

Research paper thumbnail of Cyber conflict and jus in Bello international humanitarian law on cyber attacks

International Journal of Law, 2021

The purpose of this research paper is to examine the provisions of International Humanitarian Law... more The purpose of this research paper is to examine the provisions of International Humanitarian Law on cyber operations in the context of International Armed Conflicts. This paper will discuss the legal application of the substantive rules restricting warfare to military conflicts involving cyber operations under the Additional Protocol I of the Geneva Convention. The purpose of this paper is to investigate the degree to which cyber operations that don't constitute an attack are governed by the provisions of Additional Protocol I and whether they are considered to be an attack. In this research paper, the definition for an attack should be interpreted strictly as referring only to cyber operations which lead to death and injury, to individuals or the harm or destruction of artefacts, while international humanitarian law applies to cyber warfare. The implications of this consequence-based interpretation of an 'attack' concept are that most significant safeguards protecting civilians and their artefacts do not apply to cyber operations under Additional Protocol I of the Geneva Convention. This research paper is limited to only Jus in Bello and does not discuss the Jus ad Bellum or the actions of individuals (e.g., groups of hackers). The technological aspects of cyber warfare will be discussed, as required. This paper deals with identifying cyber operations as attacks in international armed disputes and excludes issues like conflict attribution and classification.