TOC-> Approaches->International Law (including Laws of War)
Author 1
|
Author 2
|
Year
|
Title
|
Source
|
Expertise
|
Full Text
|
Beard, Jack M. |
|
2009 |
Law and War in the Virtual Era |
Law Journal |
Low:Law |
Pdf
|
Brown, Davis |
|
2006 |
A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict |
Law Journal |
Moderate:Law |
Pdf
|
Department of Defense |
|
1999 |
An Assessment of International Legal Issues in Information Operations |
Government Report |
Moderate:Law |
Pdf
|
Dörmann, Knut |
|
2004 |
Applicability of the Additional Protocols to Computer Network Attacks |
Independent Reports |
Low:Law |
Pdf
|
Dunlap, Charles J. Jr. |
|
2009 |
Towards a Cyberspace Legal Regime in the Twenty-First Century |
Speech |
None |
N/A
|
Hollis, Duncan B. |
|
2007 |
Why States Need an International Law for Information Operations |
Law Review |
Moderate:Law |
Pdf
|
Nye, Joseph |
|
2010 |
Cyber Power |
Book Excerpt |
Low:Technology; Low:Policy |
Pdf
|
Schmitt, Michael N., et. al |
|
2004 |
Computers and War |
Conference Paper |
Moderate:Law |
Pdf
|
Schmitt, Michael N. |
|
1999 |
Computer Network Attack and the Use of Force in International Law |
Law Journal |
High:Law |
Pdf
|
Schmitt, Michael N. |
|
2002 |
Wired Warfare |
|
None |
|
Sklerov, Matthew J. |
|
2009 |
Solving the Dilemma of State Responses to Cyberattacks |
|
None |
|
Todd, Graham H. |
|
2009 |
Armed Attack in Cyberspace |
|
None |
|
Watts, Sean |
|
2010 |
Combatant Status and Computer Network Attack |
|
None |
|
Jump to Table of Contents