International Law (including Laws of War): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Law (including Laws of War)]]'' | ''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Law (including Laws of War)]]'' | ||
Beard, Jack M. | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
|- | |||
Brown, Davis | ! style="background-color: #efefef;" | Author 1 | ||
! style="background-color: #efefef;" | Author 2 | |||
Department of Defense Office of General Counsel | ! style="background-color: #efefef;" | Year | ||
! style="background-color: #efefef;" | Title | |||
Dörmann, Knut | ! style="background-color: #efefef;" | Source | ||
! style="background-color: #efefef;" | Expertise | |||
Dunlap, Charles J. Jr. | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
Hollis, Duncan B. | |Beard, Jack M.||2009||[[Law and War in the Virtual Era]]||||None|| | ||
|- | |||
Nye, Joseph | |Brown, Davis||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||||None|| | ||
|- | |||
Schmitt, Michael N., et. al | |Department of Defense Office of General Counsel||1999||[[An Assessment of International Legal Issues in Information Operations]]||||None|| | ||
|- | |||
Schmitt, Michael N. | |Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||||None|| | ||
|- | |||
Schmitt, Michael N. | |Dunlap, Charles J. Jr.||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None|| | ||
|- | |||
Sklerov, Matthew J. | |Hollis, Duncan B.||2007||[[Why States Need an International Law for Information Operations]]||||None|| | ||
|- | |||
Todd, Graham H. | |Nye, Joseph||2010||[[Cyber Power]]||||None|| | ||
|- | |||
Watts, Sean | |Schmitt, Michael N., et. al||2004||[[Computers and War]]||||None|| | ||
|- | |||
|Schmitt, Michael N.||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None|| | |||
|- | |||
|Schmitt, Michael N.||2002||[[Wired Warfare]]||||None|| | |||
|- | |||
|Sklerov, Matthew J.||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||||None|| | |||
|- | |||
|Todd, Graham H.||2009||[[Armed Attack in Cyberspace]]||||None|| | |||
|- | |||
|Watts, Sean||2010||[[Combatant Status and Computer Network Attack]] | |||
|} | |||
*'''''Subcategories:''''' ''None'' | *'''''Subcategories:''''' ''None'' | ||
''[[Table of Contents | Jump to Table of Contents]]'' | ''[[Table of Contents | Jump to Table of Contents]]'' |
Revision as of 14:11, 10 August 2010
TOC-> Approaches->International Law (including Laws of War)
- Subcategories: None