International Law (including Laws of War): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 19: | Line 19: | ||
|Dörmann, Knut||||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||Independent Reports||Low:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Pdf''] | |Dörmann, Knut||||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||Independent Reports||Low:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Pdf''] | ||
|- | |- | ||
|Dunlap, Charles J. Jr.||||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None|| | |Dunlap, Charles J. Jr.||||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||Speech||None||N/A | ||
|- | |- | ||
|Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||||None|| | |Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||||None|| |
Revision as of 14:34, 10 August 2010
TOC-> Approaches->International Law (including Laws of War)
- Subcategories: None