International Law (including Laws of War): Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 25: Line 25:
|Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf  ''Pdf'']  
|Hollis, Duncan B.||||2007||[[Why States Need an International Law for Information Operations]]||Law Review||Moderate:Law||[http://legacy.lclark.edu/org/lclr/objects/LCB_11_4_Art7_Hollis.pdf  ''Pdf'']  
|-
|-
|Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf'']
|Nye, Joseph||||2010||[[Cyber Power]]||Book Chapter||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf'']
|-
|-
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law Review||High:Law||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993&Location=U2&doc=GetTRDoc.pdf ''Pdf'']  
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law Review||High:Law||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993&Location=U2&doc=GetTRDoc.pdf ''Pdf'']  

Revision as of 16:28, 20 August 2010

TOC-> Approaches->International Law (including Laws of War)

Author 1 Author 2 Year Title Source Expertise Full Text
Barkham, Jason 2001 Information Warfare and International Law on the Use of Force Law Review Moderate:Law Pdf Alt Pdf
Beard, Jack M. 2009 Law and War in the Virtual Era Law Review Low:Law Pdf
Brown, Davis 2006 A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict Law Review Moderate:Law Pdf
Department of Defense 1999 An Assessment of International Legal Issues in Information Operations Government Report Moderate:Law Pdf
Dörmann, Knut 2004 Applicability of the Additional Protocols to Computer Network Attacks Independent Reports Low:Law Pdf
Dunlap, Charles J. Jr. 2009 Towards a Cyberspace Legal Regime in the Twenty-First Century Speech None N/A
Hollis, Duncan B. 2007 Why States Need an International Law for Information Operations Law Review Moderate:Law Pdf
Nye, Joseph 2010 Cyber Power Book Chapter Low:Technology; Low:Policy Pdf
Schmitt, Michael N. 1999 Computer Network Attack and the Use of Force in International Law Law Review High:Law Pdf
Schmitt, Michael N. 2002 Wired Warfare Journal Article Moderate:Law Pdf
Schmitt, Michael N., et. al 2004 Computers and War Conf. Paper Moderate:Law Pdf
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf
Watts, Sean 2010 Combatant Status and Computer Network Attack Law Review Moderate:Law Pdf
  • Subcategories: None

Jump to Table of Contents