International Cooperation: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]] | Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]] | ||
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | {| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;" | ||
Line 24: | Line 22: | ||
|- | |- | ||
|Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf ''Pdf''] | |Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf ''Pdf''] | ||
|- | |||
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf''] | |||
|- | |- | ||
|White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] | |White House||||2009||[[Cyberspace Policy Review]]||Government Report||None||[http://www.cyber.st.dhs.gov/docs/Cyberspace_Policy_Review_final.pdf ''Pdf''] |
Revision as of 12:19, 11 August 2010
TOC-> Approaches->International Cooperation
Barkham, Jason (2001) Information Warfare and International Law on the Use of Force
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Clarke, Richard A. | Knake, Robert | 2010 | Cyber War | Book | None | N/A |
Department of Homeland Security | 2003 | The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets | Government Report | None | ||
Kramer, Franklin D., et. al | 2009 | Cyberpower and National Security | Book | None | N/A | |
Moore, Tyler | Clayton, Richard | 2009 | The Impact of Incentives on Notice and Take-down | Book Chapter | Moderate:Technology; Low:Law | |
Schmitt, Michael N. | 2002 | Wired Warfare | Journal Article | Moderate:Law | ||
White House | 2009 | Cyberspace Policy Review | Government Report | None |
- Subcategories: None