|
|
| Line 23: |
Line 23: |
| |Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf ''Pdf''] | | |Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf ''Pdf''] |
| |- | | |- |
| |Nye, Joseph||||2010||[[Cyber Power]]||||None|| | | |Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf' |
| |- | | |- |
| |Schmitt, Michael N., et. al||||2004||[[Computers and War]]||||None|| | | |Schmitt, Michael N., et. al||||2004||[[Computers and War]]||||None|| |
TOC-> Approaches->International Law (including Laws of War)
| Author 1
|
Author 2
|
Year
|
Title
|
Source
|
Expertise
|
Full Text
|
| Beard, Jack M. |
|
2009 |
Law and War in the Virtual Era |
Law Journal |
Low:Law |
Pdf
|
| Brown, Davis |
|
2006 |
A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict |
Law Journal |
Moderate:Law |
Pdf
|
| Department of Defense |
|
1999 |
An Assessment of International Legal Issues in Information Operations |
Government Report |
Moderate:Law |
Pdf
|
| Dörmann, Knut |
|
2004 |
Applicability of the Additional Protocols to Computer Network Attacks |
Independent Reports |
Low:Law |
Pdf
|
| Dunlap, Charles J. Jr. |
|
2009 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Speech |
None |
N/A
|
| Hollis, Duncan B. |
|
2007 |
Why States Need an International Law for Information Operations |
Law Review |
Moderate:Law |
Pdf
|
| Nye, Joseph |
|
2010 |
Cyber Power |
Book Excerpt |
Low:Technology; Low:Policy |
[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf Pdf'
|
| Schmitt, Michael N., et. al |
|
2004 |
Computers and War |
|
None |
|
| Schmitt, Michael N. |
|
1999 |
Computer Network Attack and the Use of Force in International Law |
|
None |
|
| Schmitt, Michael N. |
|
2002 |
Wired Warfare |
|
None |
|
| Sklerov, Matthew J. |
|
2009 |
Solving the Dilemma of State Responses to Cyberattacks |
|
None |
|
| Todd, Graham H. |
|
2009 |
Armed Attack in Cyberspace |
|
None |
|
| Watts, Sean |
|
2010 |
Combatant Status and Computer Network Attack |
|
None |
|
Jump to Table of Contents