Government to Government: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 15: | Line 15: | ||
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Review||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf''] | |Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Review||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf''] | ||
|- | |- | ||
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent | |Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Repors||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf''] | ||
|- | |- | ||
|Department of Defense||||1999||[[An Assessment of International Legal Issues in Information Operations]]||Government Report||Moderate:Law||[http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf '' Pdf''] | |Department of Defense||||1999||[[An Assessment of International Legal Issues in Information Operations]]||Government Report||Moderate:Law||[http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf '' Pdf''] |
Revision as of 15:47, 20 August 2010
TOC-> Issues-> Espionage->Government to Government
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Anderson, Ross J. | 2008 | Security Engineering | Book | Moderate:Technology; Moderate:Cryptography | N/A | |
Brown, Davis | 2006 | A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict | Law Review | Moderate:Law | ||
Center for Strategic and International Studies | 2008 | Securing Cyberspace for the 44th Presidency | Independent Repors | Low:Policy | ||
Department of Defense | 1999 | An Assessment of International Legal Issues in Information Operations | Government Report | Moderate:Law | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Hollis, Duncan B. | 2007 | Why States Need an International Law for Information Operations | Law Review | Moderate:Law | ||
Sklerov, Matthew J. | 2009 | Solving the Dilemma of State Responses to Cyberattacks | Law Review | Moderate:Law; Low:Technology | ||
Todd, Graham H. | 2009 | Armed Attack in Cyberspace | Law Review | Moderate:Law |
- Subcategories: None