International Law (including Laws of War): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 35: | Line 35: | ||
|Todd, Graham H.||||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf''] | |Todd, Graham H.||||2009||[[Armed Attack in Cyberspace]]||Law Review||Moderate:Law||[http://www.afjag.af.mil/shared/media/document/AFD-091026-024.pdf ''Pdf''] | ||
|- | |- | ||
|Watts, Sean||||2010||[[Combatant Status and Computer Network Attack]]|||| | |Watts, Sean||||2010||[[Combatant Status and Computer Network Attack]]||Law Review||Moderate:Law||[http://www.vjil.org/wp-content/uploads/2010/01/VJIL-50.2-Watts.pdf ''Pdf''] | ||
|} | |} | ||
Revision as of 14:57, 10 August 2010
TOC-> Approaches->International Law (including Laws of War)
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Beard, Jack M. | 2009 | Law and War in the Virtual Era | Law Journal | Low:Law | ||
Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Journal | Moderate:Law | ||
Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
Dörmann, Knut | 2004 | Applicability of the Additional Protocols to Computer Network Attacks | Independent Reports | Low:Law | ||
Dunlap, Charles J. Jr. | 2009 | Towards a Cyberspace Legal Regime in the Twenty-First Century | Speech | None | N/A | |
Hollis, Duncan B. | 2007 | Why States Need an International Law for Information Operations | Law Review | Moderate:Law | ||
Nye, Joseph | 2010 | Cyber Power | Book Excerpt | Low:Technology; Low:Policy | ||
Schmitt, Michael N., et. al | 2004 | Computers and War | Conference Paper | Moderate:Law | ||
Schmitt, Michael N. | 1999 | Computer Network Attack and the Use of Force in International Law | Law Journal | High:Law | ||
Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law | ||
Watts, Sean | 2010 | Combatant Status and Computer Network Attack | Law Review | Moderate:Law |
- Subcategories: None