Applicability of the Additional Protocols to Computer Network Attacks: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
==Categorization== | ==Categorization== | ||
Issues: [[Laws of War/Cyberwar]] | * Issues: [[Laws of War/Cyberwar]] | ||
==Key Words== | ==Key Words== | ||
==Synopsis== | ==Synopsis== | ||
Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols. From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004 | Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols. From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004 | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
Revision as of 16:30, 21 May 2010
Applicability of the Additional Protocols to Computer Network Attacks
Full Citation
Knut Dörmann, Applicability of the Additional Protocols to Computer Network Attacks (2004) Web
Categorization
- Issues: Laws of War/Cyberwar
Key Words
Synopsis
Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols. From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004