Computers and War: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Computers and War: The Legal Battlespace== ==Full Citation== Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, ''Computers and War: The Legal Battlespace''(2004). [http://...)
 
No edit summary
Line 3: Line 3:
==Full Citation==
==Full Citation==


Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, ''Computers and War: The Legal Battlespace''(2004).  [http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf  ''Web'']
Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, ''Computers and War: The Legal Battlespace'' Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law, June 25-27, 2004.  [http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf  ''Web'']


Article in Journal: John Maynard Smith, “The Origin of Altruism,” ''Nature'' 393 (1998): 639.
Article in Journal: John Maynard Smith, “The Origin of Altruism,” ''Nature'' 393 (1998): 639.

Revision as of 15:18, 19 May 2010

Computers and War: The Legal Battlespace

Full Citation

Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, Computers and War: The Legal Battlespace Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law, June 25-27, 2004. Web

Article in Journal: John Maynard Smith, “The Origin of Altruism,” Nature 393 (1998): 639.

Article for Conference: Yanpei Chen, et al. "What's New About Cloud Computing Security?" Technical Report for the University of California at Berkeley, Electrical Engineering and Computer Sciences Department, January 20, 2010.

BibTeX


Categorization

Issues: Laws of War/Cyberwar

Key Words

See the article itself for any key words as a starting point

Synopsis

This article briefly addresses the legal issues surrounding computer use in classic kinetic-based warfare. Attention then turns to the most significant phenomenon for humanitarian law, namely the employment of information technology during network-centric, four-dimensional operations, which increasingly characterize twentieth-first century conflict.

Policy Relevance

Policy and Legal Implications, relevant law.

Case Examples

Additional Notes and Highlights

* Outline key points of interest

* Include quotes if relevant/useful
* Consider how these themes relate to other cases, broader thematic areas, etc