Difference between revisions of "Applicability of the Additional Protocols to Computer Network Attacks"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 9: Line 9:
 
==Categorization==
 
==Categorization==
  
Issues: [[Laws of War/Cyberwar]]
+
* Issues: [[Laws of War/Cyberwar]]
  
 
==Key Words==  
 
==Key Words==  
  
''See the article itself for any key words as a starting point''
 
  
 
==Synopsis==
 
==Synopsis==
  
 
Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols.  From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004
 
Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols.  From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004
 
==Policy Relevance==
 
 
''Policy and Legal Implications, relevant law.
 
 
==Case Examples==
 
  
 
==Additional Notes and Highlights==
 
==Additional Notes and Highlights==
 
'' * Outline key points of interest
 
* Include quotes if relevant/useful
 
* Consider how these themes relate to other cases, broader thematic areas, etc''
 

Revision as of 20:30, 21 May 2010

Applicability of the Additional Protocols to Computer Network Attacks

Full Citation

Knut Dörmann, Applicability of the Additional Protocols to Computer Network Attacks (2004) Web

BibTeX

Categorization

Key Words

Synopsis

Explores whether international humanitarian law (IHL) in general applies to computer network attacks (CNA) and what specific prohibitions or limitations on the use of computer network attacks follow from international humanitarian law, in particular from the Additional Protocols. From the International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, Stockholm, 17-19.11.2004

Additional Notes and Highlights