International Law (including Laws of War): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
! style="background-color: #efefef;" class="unsortable" | Full Text | ! style="background-color: #efefef;" class="unsortable" | Full Text | ||
|- | |- | ||
|Beard, Jack M.||2009||[[Law and War in the Virtual Era]]||||None|| | |Beard, Jack M.||||2009||[[Law and War in the Virtual Era]]||||None|| | ||
|- | |- | ||
|Brown, Davis||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||||None|| | |Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||||None|| | ||
|- | |- | ||
|Department of Defense Office of General Counsel||1999||[[An Assessment of International Legal Issues in Information Operations]]||||None|| | |Department of Defense Office of General Counsel||||1999||[[An Assessment of International Legal Issues in Information Operations]]||||None|| | ||
|- | |- | ||
|Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||||None|| | |Dörmann, Knut||||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||||None|| | ||
|- | |- | ||
|Dunlap, Charles J. Jr.||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None|| | |Dunlap, Charles J. Jr.||||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None|| | ||
|- | |- | ||
|Hollis, Duncan B.||2007||[[Why States Need an International Law for Information Operations]]||||None|| | |Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||||None|| | ||
|- | |- | ||
|Nye, Joseph||2010||[[Cyber Power]]||||None|| | |Nye, Joseph||||2010||[[Cyber Power]]||||None|| | ||
|- | |- | ||
|Schmitt, Michael N., et. al||2004||[[Computers and War]]||||None|| | |Schmitt, Michael N., et. al||||2004||[[Computers and War]]||||None|| | ||
|- | |- | ||
|Schmitt, Michael N.||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None|| | |Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None|| | ||
|- | |- | ||
|Schmitt, Michael N.||2002||[[Wired Warfare]]||||None|| | |Schmitt, Michael N.||||2002||[[Wired Warfare]]||||None|| | ||
|- | |- | ||
|Sklerov, Matthew J.||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||||None|| | |Sklerov, Matthew J.||||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||||None|| | ||
|- | |- | ||
|Todd, Graham H.||2009||[[Armed Attack in Cyberspace]]||||None|| | |Todd, Graham H.||||2009||[[Armed Attack in Cyberspace]]||||None|| | ||
|- | |- | ||
|Watts, Sean||2010||[[Combatant Status and Computer Network Attack]]||||None|| | |Watts, Sean||||2010||[[Combatant Status and Computer Network Attack]]||||None|| | ||
|} | |} | ||
Revision as of 14:13, 10 August 2010
TOC-> Approaches->International Law (including Laws of War)
- Subcategories: None