|
|
| Line 25: |
Line 25: |
| |Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf''] | | |Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf''] |
| |- | | |- |
| |Schmitt, Michael N., et. al||||2004||[[Computers and War]]||||None|| | | |Schmitt, Michael N., et. al||||2004||[[Computers and War]]||Conference Paper||Moderate:Law||[http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf ''Pdf''] |
| |- | | |- |
| |Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None|| | | |Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None|| |
TOC-> Approaches->International Law (including Laws of War)
| Author 1
|
Author 2
|
Year
|
Title
|
Source
|
Expertise
|
Full Text
|
| Beard, Jack M. |
|
2009 |
Law and War in the Virtual Era |
Law Journal |
Low:Law |
Pdf
|
| Brown, Davis |
|
2006 |
A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict |
Law Journal |
Moderate:Law |
Pdf
|
| Department of Defense |
|
1999 |
An Assessment of International Legal Issues in Information Operations |
Government Report |
Moderate:Law |
Pdf
|
| Dörmann, Knut |
|
2004 |
Applicability of the Additional Protocols to Computer Network Attacks |
Independent Reports |
Low:Law |
Pdf
|
| Dunlap, Charles J. Jr. |
|
2009 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Speech |
None |
N/A
|
| Hollis, Duncan B. |
|
2007 |
Why States Need an International Law for Information Operations |
Law Review |
Moderate:Law |
Pdf
|
| Nye, Joseph |
|
2010 |
Cyber Power |
Book Excerpt |
Low:Technology; Low:Policy |
Pdf
|
| Schmitt, Michael N., et. al |
|
2004 |
Computers and War |
Conference Paper |
Moderate:Law |
Pdf
|
| Schmitt, Michael N. |
|
1999 |
Computer Network Attack and the Use of Force in International Law |
|
None |
|
| Schmitt, Michael N. |
|
2002 |
Wired Warfare |
|
None |
|
| Sklerov, Matthew J. |
|
2009 |
Solving the Dilemma of State Responses to Cyberattacks |
|
None |
|
| Todd, Graham H. |
|
2009 |
Armed Attack in Cyberspace |
|
None |
|
| Watts, Sean |
|
2010 |
Combatant Status and Computer Network Attack |
|
None |
|
Jump to Table of Contents