Cyberwar: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Barkham, Jason ''(2001)'' [[Information Warfare and International Law on the Use of Force]] | Barkham, Jason ''(2001)'' [[Information Warfare and International Law on the Use of Force]] | ||
Beard, Jack M. (2009) [[Law and War in the Virtual Era]] | Beard, Jack M. ''(2009)'' [[Law and War in the Virtual Era]] | ||
Brown, Davis (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]] | Brown, Davis ''(2006)'' [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]] | ||
Department of Defense Office of General Counsel (1999) [[An Assessment of International Legal Issues in Information Operations]] | Department of Defense Office of General Counsel ''(1999)'' [[An Assessment of International Legal Issues in Information Operations]] | ||
Dörmann, Knut (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]] | Dörmann, Knut ''(2004)'' [[Applicability of the Additional Protocols to Computer Network Attacks]] | ||
Dunlap, Charles J. Jr. (2009) [[Towards a Cyberspace Legal Regime in the Twenty-First Century]] | Dunlap, Charles J. Jr. ''(2009)'' [[Towards a Cyberspace Legal Regime in the Twenty-First Century]] | ||
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]] | Hollis, Duncan B. ''(2007)'' [[Why States Need an International Law for Information Operations]] | ||
Schmitt, Michael N. (1999) [[Computer Network Attack and the Use of Force in International Law]] | Schmitt, Michael N. ''(1999)'' [[Computer Network Attack and the Use of Force in International Law]] | ||
Schmitt, Michael N. (2002) [[Wired Warfare]] | Schmitt, Michael N. ''(2002)'' [[Wired Warfare]] | ||
Schmit, Michael N., et. al (2004) [[Computers and War]] | Schmit, Michael N., et. al ''(2004)'' [[Computers and War]] | ||
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]] | Sklerov, Matthew J. ''(2009)'' [[Solving the Dilemma of State Responses to Cyberattacks]] | ||
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]] | Todd, Graham H. ''(2009)'' [[Armed Attack in Cyberspace]] | ||
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]] | Watts, Sean (2010) [[Combatant Status and Computer Network Attack]] |
Revision as of 09:11, 27 May 2010
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Beard, Jack M. (2009) Law and War in the Virtual Era
Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict
Department of Defense Office of General Counsel (1999) An Assessment of International Legal Issues in Information Operations
Dörmann, Knut (2004) Applicability of the Additional Protocols to Computer Network Attacks
Dunlap, Charles J. Jr. (2009) Towards a Cyberspace Legal Regime in the Twenty-First Century
Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations
Schmitt, Michael N. (1999) Computer Network Attack and the Use of Force in International Law
Schmitt, Michael N. (2002) Wired Warfare
Schmit, Michael N., et. al (2004) Computers and War
Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks
Todd, Graham H. (2009) Armed Attack in Cyberspace
Watts, Sean (2010) Combatant Status and Computer Network Attack