Computers and War: Difference between revisions
No edit summary |
|||
Line 3: | Line 3: | ||
==Full Citation== | ==Full Citation== | ||
Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, ''Computers and War: The Legal Battlespace | Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, ''Computers and War: The Legal Battlespace.'' Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law, June 25-27, 2004. [http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Schmitt_et_al:2004&f=wikibiblio.bib BibTeX] | [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Schmitt_et_al:2004&f=wikibiblio.bib BibTeX] |
Revision as of 14:19, 19 May 2010
Computers and War: The Legal Battlespace
Full Citation
Michael N. Schmitt, Heather A. Harrison, Thomas C. Wingfield, Computers and War: The Legal Battlespace. Paper prepared for Informal High-Level Expert Meeting on Current Challenges to International Humanitarian Law, June 25-27, 2004. Web
Categorization
Issues: Laws of War/Cyberwar
Key Words
See the article itself for any key words as a starting point
Synopsis
This article briefly addresses the legal issues surrounding computer use in classic kinetic-based warfare. Attention then turns to the most significant phenomenon for humanitarian law, namely the employment of information technology during network-centric, four-dimensional operations, which increasingly characterize twentieth-first century conflict.
Policy Relevance
Policy and Legal Implications, relevant law.
Case Examples
Additional Notes and Highlights
* Outline key points of interest
* Include quotes if relevant/useful * Consider how these themes relate to other cases, broader thematic areas, etc