International Law (including Laws of War): Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
! style="background-color: #efefef;" class="unsortable" | Full Text   
! style="background-color: #efefef;" class="unsortable" | Full Text   
|-
|-
|Beard, Jack M.||2009||[[Law and War in the Virtual Era]]||||None||
|Beard, Jack M.||||2009||[[Law and War in the Virtual Era]]||||None||
|-
|-
|Brown, Davis||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||||None||
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||||None||
|-
|-
|Department of Defense Office of General Counsel||1999||[[An Assessment of International Legal Issues in Information Operations]]||||None||
|Department of Defense Office of General Counsel||||1999||[[An Assessment of International Legal Issues in Information Operations]]||||None||
|-
|-
|Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||||None||
|Dörmann, Knut||||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||||None||
|-
|-
|Dunlap, Charles J. Jr.||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None||
|Dunlap, Charles J. Jr.||||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None||
|-
|-
|Hollis, Duncan B.||2007||[[Why States Need an International Law for Information Operations]]||||None||
|Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||||None||
|-
|-
|Nye, Joseph||2010||[[Cyber Power]]||||None||
|Nye, Joseph||||2010||[[Cyber Power]]||||None||
|-
|-
|Schmitt, Michael N., et. al||2004||[[Computers and War]]||||None||
|Schmitt, Michael N., et. al||||2004||[[Computers and War]]||||None||
|-
|-
|Schmitt, Michael N.||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None||
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None||
|-
|-
|Schmitt, Michael N.||2002||[[Wired Warfare]]||||None||
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||||None||
|-
|-
|Sklerov, Matthew J.||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||||None||
|Sklerov, Matthew J.||||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||||None||
|-
|-
|Todd, Graham H.||2009||[[Armed Attack in Cyberspace]]||||None||
|Todd, Graham H.||||2009||[[Armed Attack in Cyberspace]]||||None||
|-
|-
|Watts, Sean||2010||[[Combatant Status and Computer Network Attack]]||||None||
|Watts, Sean||||2010||[[Combatant Status and Computer Network Attack]]||||None||
|}
|}



Revision as of 14:13, 10 August 2010

TOC-> Approaches->International Law (including Laws of War)

Author 1 Author 2 Year Title Source Expertise Full Text
Beard, Jack M. 2009 Law and War in the Virtual Era None
Brown, Davis 2006 A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict None
Department of Defense Office of General Counsel 1999 An Assessment of International Legal Issues in Information Operations None
Dörmann, Knut 2004 Applicability of the Additional Protocols to Computer Network Attacks None
Dunlap, Charles J. Jr. 2009 Towards a Cyberspace Legal Regime in the Twenty-First Century None
Hollis, Duncan B. 2007 Why States Need an International Law for Information Operations None
Nye, Joseph 2010 Cyber Power None
Schmitt, Michael N., et. al 2004 Computers and War None
Schmitt, Michael N. 1999 Computer Network Attack and the Use of Force in International Law None
Schmitt, Michael N. 2002 Wired Warfare None
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks None
Todd, Graham H. 2009 Armed Attack in Cyberspace None
Watts, Sean 2010 Combatant Status and Computer Network Attack None
  • Subcategories: None

Jump to Table of Contents