Cyberwar: Difference between revisions
(New page: Dunlap, Charles J. Jr. Towards a Cyberspace Legal Regime in the Twenty-First Century) |
No edit summary |
||
Line 1: | Line 1: | ||
Dunlap, Charles J. Jr. [[Towards a Cyberspace Legal Regime in the Twenty-First Century]] | Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]] | ||
Beard, Jack M. (2009) [[Law and War in the Virtual Era]] | |||
Brown, Davis (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]] | |||
Department of Defense Office of General Counsel (1999) [[An Assessment of International Legal Issues in Information Operations]] | |||
Dörmann, Knut (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]] | |||
Dunlap, Charles J. Jr. (2009) [[Towards a Cyberspace Legal Regime in the Twenty-First Century]] | |||
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]] | |||
Schmitt, Michael N. (1999) [[Computer Network Attack and the Use of Force in International Law]] | |||
Schmitt, Michael N. (2002) [[Wired Warfare]] | |||
Schmit, Michael N., et. al (2004) [[Computers and War]] | |||
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]] | |||
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]] | |||
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]] |
Revision as of 09:04, 27 May 2010
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Beard, Jack M. (2009) Law and War in the Virtual Era
Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict
Department of Defense Office of General Counsel (1999) An Assessment of International Legal Issues in Information Operations
Dörmann, Knut (2004) Applicability of the Additional Protocols to Computer Network Attacks
Dunlap, Charles J. Jr. (2009) Towards a Cyberspace Legal Regime in the Twenty-First Century
Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations
Schmitt, Michael N. (1999) Computer Network Attack and the Use of Force in International Law
Schmitt, Michael N. (2002) Wired Warfare
Schmit, Michael N., et. al (2004) Computers and War
Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks
Todd, Graham H. (2009) Armed Attack in Cyberspace
Watts, Sean (2010) Combatant Status and Computer Network Attack