Applicability of the Additional Protocols to Computer Network Attacks: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 17: | Line 17: | ||
==Synopsis== | ==Synopsis== | ||
Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols. From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004 | |||
==Policy Relevance== | ==Policy Relevance== |
Revision as of 11:52, 19 May 2010
Applicability of the Additional Protocols to Computer Network Attacks
Full Citation
Knut Dörmann, Applicability of the Additional Protocols to Computer Network Attacks (2004) Web
Categorization
Issues: Laws of War/Cyberwar
Key Words
See the article itself for any key words as a starting point
Synopsis
Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols. From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004
Policy Relevance
Policy and Legal Implications, relevant law.
Case Examples
Additional Notes and Highlights
* Outline key points of interest
* Include quotes if relevant/useful * Consider how these themes relate to other cases, broader thematic areas, etc