Espionage: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 25: | Line 25: | ||
|Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf ''Pdf''] | |Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf ''Pdf''] | ||
|- | |- | ||
|Nye, Joseph||||2010||[[Cyber Power]]||Book | |Nye, Joseph||||2010||[[Cyber Power]]||Book Chapter||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf''] | ||
|- | |- | ||
|Sklerov, Matthew J.|| ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||Law Review||Moderate:Law; Low:Technology||[http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf ''Pdf''] | |Sklerov, Matthew J.|| ||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||Law Review||Moderate:Law; Low:Technology||[http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf ''Pdf''] |
Revision as of 15:28, 20 August 2010
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Review | Moderate:Law | ||
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Reports | Low:Policy | ||
Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Deputy Chief of Staff for Intelligence | 2006 | Critical Infrastructure Threats and Terrorism | Government Report | Low:Organizational Analysis; Low:Risk Management | ||
Hollis, Duncan B. | 2007 | Why States Need an International Law for Information Operations | Law Review | Moderate:Law | ||
Nye, Joseph | 2010 | Cyber Power | Book Chapter | Low:Technology; Low:Policy | ||
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
Stohl, Michael | 2006 | Cyber Terrorism | Journal Article | None | Purchase | |
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law |