Applicability of the Additional Protocols to Computer Network Attacks: Difference between revisions
Jump to navigation
Jump to search
(New page: ==Applicability of the Additional Protocols to Computer Network Attacks== ==Full Citation== Knut Dörmann, ''Applicability of the Additional Protocols to Computer Network Attacks'' (2004...) |
No edit summary |
||
Line 5: | Line 5: | ||
Knut Dörmann, ''Applicability of the Additional Protocols to Computer Network Attacks'' (2004) [http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Web''] | Knut Dörmann, ''Applicability of the Additional Protocols to Computer Network Attacks'' (2004) [http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Web''] | ||
[ BibTeX] | [http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Dormann:2004&f=wikibiblio.bib BibTeX] | ||
==Categorization== | ==Categorization== |
Revision as of 11:44, 19 May 2010
Applicability of the Additional Protocols to Computer Network Attacks
Full Citation
Knut Dörmann, Applicability of the Additional Protocols to Computer Network Attacks (2004) Web
Categorization
Issues: Laws of War/Cyberwar
Key Words
See the article itself for any key words as a starting point
Synopsis
This could be an abstract from the article.
Policy Relevance
Policy and Legal Implications, relevant law.
Case Examples
Additional Notes and Highlights
* Outline key points of interest
* Include quotes if relevant/useful * Consider how these themes relate to other cases, broader thematic areas, etc