International Law (including Laws of War): Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Law (including Laws of War)]]''
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Law (including Laws of War)]]''


Beard, Jack M. (2009) [[Law and War in the Virtual Era]]
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
|-
Brown, Davis (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
! style="background-color: #efefef;" | Author 1
 
! style="background-color: #efefef;" | Author 2
Department of Defense Office of General Counsel (1999) [[An Assessment of International Legal Issues in Information Operations]]
! style="background-color: #efefef;" | Year
 
! style="background-color: #efefef;" | Title
Dörmann, Knut (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]
! style="background-color: #efefef;" | Source
 
! style="background-color: #efefef;" | Expertise
Dunlap, Charles J. Jr. (2009) [[Towards a Cyberspace Legal Regime in the Twenty-First Century]]
! style="background-color: #efefef;" class="unsortable" | Full Text 
 
|-
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]
|Beard, Jack M.||2009||[[Law and War in the Virtual Era]]||||None||
 
|-
Nye, Joseph (2010) [[Cyber Power]]
|Brown, Davis||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||||None||
 
|-
Schmitt, Michael N., et. al (2004) [[Computers and War]]  
|Department of Defense Office of General Counsel||1999||[[An Assessment of International Legal Issues in Information Operations]]||||None||
 
|-
Schmitt, Michael N. (1999) [[Computer Network Attack and the Use of Force in International Law]]  
|Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||||None||
 
|-
Schmitt, Michael N. (2002) [[Wired Warfare]]  
|Dunlap, Charles J. Jr.||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None||
 
|-
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]]  
|Hollis, Duncan B.||2007||[[Why States Need an International Law for Information Operations]]||||None||
 
|-
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]  
|Nye, Joseph||2010||[[Cyber Power]]||||None||
 
|-
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
|Schmitt, Michael N., et. al||2004||[[Computers and War]]||||None||
|-
|Schmitt, Michael N.||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None||
|-
|Schmitt, Michael N.||2002||[[Wired Warfare]]||||None||
|-
|Sklerov, Matthew J.||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||||None||
|-
|Todd, Graham H.||2009||[[Armed Attack in Cyberspace]]||||None||
|-
|Watts, Sean||2010||[[Combatant Status and Computer Network Attack]]
|}


*'''''Subcategories:''''' ''None''
*'''''Subcategories:''''' ''None''


''[[Table of Contents | Jump to Table of Contents]]''
''[[Table of Contents | Jump to Table of Contents]]''

Revision as of 14:11, 10 August 2010

TOC-> Approaches->International Law (including Laws of War)

Author 1 Author 2 Year Title Source Expertise Full Text
Beard, Jack M. 2009 Law and War in the Virtual Era None
Brown, Davis 2006 A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict None
Department of Defense Office of General Counsel 1999 An Assessment of International Legal Issues in Information Operations None
Dörmann, Knut 2004 Applicability of the Additional Protocols to Computer Network Attacks None
Dunlap, Charles J. Jr. 2009 Towards a Cyberspace Legal Regime in the Twenty-First Century None
Hollis, Duncan B. 2007 Why States Need an International Law for Information Operations None
Nye, Joseph 2010 Cyber Power None
Schmitt, Michael N., et. al 2004 Computers and War None
Schmitt, Michael N. 1999 Computer Network Attack and the Use of Force in International Law None
Schmitt, Michael N. 2002 Wired Warfare None
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks None
Todd, Graham H. 2009 Armed Attack in Cyberspace None
Watts, Sean 2010 Combatant Status and Computer Network Attack
  • Subcategories: None

Jump to Table of Contents