Cyberwar: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 17: | Line 17: | ||
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||Moderate:Law||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf''] | |Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||Moderate:Law||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf''] | ||
|- | |- | ||
|Beard, Jack M.||||2009||[[Law and War in the Virtual Era]]||Law | |Beard, Jack M.||||2009||[[Law and War in the Virtual Era]]||Law Review||Low:Law||[http://www.asil.org/ajil/July2009_1selectedpiece.pdf ''Pdf''] | ||
|- | |- | ||
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law | |Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Review||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf''] | ||
|- | |- | ||
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A | |Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A | ||
Line 41: | Line 41: | ||
|Rotenberg et. al.||||2010||[[The Cyber War Threat Has Been Grossly Exaggerated]]||Debate||None||[http://intelligencesquaredus.org/index.php/past-debates/cyber-war-threat-has-been-grossly-exaggerated/ ''Audio/Transcript''] | |Rotenberg et. al.||||2010||[[The Cyber War Threat Has Been Grossly Exaggerated]]||Debate||None||[http://intelligencesquaredus.org/index.php/past-debates/cyber-war-threat-has-been-grossly-exaggerated/ ''Audio/Transcript''] | ||
|- | |- | ||
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law | |Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law Review||High:Law||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993&Location=U2&doc=GetTRDoc.pdf ''Pdf''] | ||
|- | |- | ||
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf''] | |Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf''] |
Revision as of 15:23, 20 August 2010
Rotenberg et. al (2010) The Cyber War Threat Has Been Grossly Exaggerated
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Barkham, Jason | 2001 | Information Warfare and International Law on the Use of Force | Law Review | Moderate:Law | Pdf Alt Pdf | |
Beard, Jack M. | 2009 | Law and War in the Virtual Era | Law Review | Low:Law | ||
Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Review | Moderate:Law | ||
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Dörmann, Knut | 2004 | Applicability of the Additional Protocols to Computer Network Attacks | Independent Reports | Low:Law | ||
Dunlap, Charles J. Jr. | 2009 | Towards a Cyberspace Legal Regime in the Twenty-First Century | Speech | None | N/A | |
Hollis, Duncan B. | 2007 | Why States Need an International Law for Information Operations | Law Review | Moderate:Law | ||
Korns, Stephen W. | 2009 | Cyber Operations | Journal Article | Low:International Warfare | ||
Nye, Joseph | 2010 | Cyber Power | Book Excerpt | Low:Technology; Low:Policy | ||
Rotenberg et. al. | 2010 | The Cyber War Threat Has Been Grossly Exaggerated | Debate | None | Audio/Transcript | |
Schmitt, Michael N. | 1999 | Computer Network Attack and the Use of Force in International Law | Law Review | High:Law | ||
Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
Schmitt, Michael N., et. al | 2004 | Computers and War | Conf. Paper | Moderate:Law | ||
Schneier, Bruce | 2003 | Beyond Fear | Book | None | Scribd | |
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law | ||
Watts, Sean | 2010 | Combatant Status and Computer Network Attack | Law Review | Moderate:Law |
Subcategories: None