Computers and War: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 3: Line 3:
==Full Citation==
==Full Citation==


Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, ''Computers and War: The Legal Battlespace'' Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law, June 25-27, 2004.  [http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf  ''Web'']
Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, ''Computers and War: The Legal Battlespace,'' Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law, June 25-27, 2004.  [http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf  ''Web'']
 
Article in Journal: John Maynard Smith, “The Origin of Altruism,” ''Nature'' 393 (1998): 639.
 
Article for Conference: Yanpei Chen, et al. "What's New About Cloud Computing Security?" Technical Report for the University of California at Berkeley, Electrical Engineering and Computer Sciences Department, January 20, 2010. 


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Schmitt_et_al:2004&f=wikibiblio.bib BibTeX]
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Schmitt_et_al:2004&f=wikibiblio.bib BibTeX]


==Categorization==
==Categorization==

Revision as of 14:18, 19 May 2010

Computers and War: The Legal Battlespace

Full Citation

Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, Computers and War: The Legal Battlespace, Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law, June 25-27, 2004. Web

BibTeX

Categorization

Issues: Laws of War/Cyberwar

Key Words

See the article itself for any key words as a starting point

Synopsis

This article briefly addresses the legal issues surrounding computer use in classic kinetic-based warfare. Attention then turns to the most significant phenomenon for humanitarian law, namely the employment of information technology during network-centric, four-dimensional operations, which increasingly characterize twentieth-first century conflict.

Policy Relevance

Policy and Legal Implications, relevant law.

Case Examples

Additional Notes and Highlights

* Outline key points of interest

* Include quotes if relevant/useful
* Consider how these themes relate to other cases, broader thematic areas, etc