States: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Actors and Incentives | Actors and Incentives->]][[States]]'' | ''[[Table of Contents | TOC->]][[Threats and Actors | Threats and Actors->]][[Actors and Incentives | Actors and Incentives->]][[States]]'' | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 13: | Line 10: | ||
! style="background-color: #efefef;" | Expertise | ! style="background-color: #efefef;" | Expertise | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |||
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||Moderate:Law||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf''] | |||
|- | |- | ||
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Journal||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf''] | |Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Journal||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf''] |
Revision as of 12:32, 11 August 2010
TOC-> Threats and Actors-> Actors and Incentives->States
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Barkham, Jason | 2001 | Information Warfare and International Law on the Use of Force | Law Review | Moderate:Law | Pdf Alt Pdf | |
Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Journal | Moderate:Law | ||
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Department of Defense | 2005 | Strategy for Homeland Defense and Civil Support | Government Report | None | ||
Department of Homeland Security | 2009 | A Roadmap for Cybersecurity Research | Government Report | Low:Technology | ||
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Dörmann, Knut | 2004 | Applicability of the Additional Protocols to Computer Network Attacks | Independent Reports | Low:Law | ||
Dunlap, Charles J. Jr. | 2009 | Towards a Cyberspace Legal Regime in the Twenty-First Century | Speech | None | N/A | |
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Hollis, Duncan B. | 2007 | Why States Need an International Law for Information Operations | Law Review | Moderate:Law | ||
Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
National Cyber Defense Initiative | 2009 | National Cyber Defense Financial Services Workshop Report | Independent Report | Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance | ||
National Cyber Security Summit Task Force | 2004 | Information Security Governance | Government Report | Moderate:Executive Administration | ||
Nye, Joseph | 2010 | Cyber Power | Book Excerpt | Low:Technology; Low:Policy | ||
Schmitt, Michael N. | 1999 | Computer Network Attack and the Use of Force in International Law | Law Journal | High:Law | ||
Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
Schmitt, Michael N., et. al | 2004 | Computers and War | Conference Paper | Moderate:Law | ||
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law | ||
Watts, Sean | 2010 | Combatant Status and Computer Network Attack | Law Review | Moderate:Law |
- Subcategories: None