Difference between revisions of "Applicability of the Additional Protocols to Computer Network Attacks"

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Applicability of the Additional Protocols to Computer Network Attacks== ==Full Citation== Knut Dörmann, ''Applicability of the Additional Protocols to Computer Network Attacks'' (2004...)
 
Line 5: Line 5:
 
Knut Dörmann, ''Applicability of the Additional Protocols to Computer Network Attacks'' (2004)  [http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Web'']
 
Knut Dörmann, ''Applicability of the Additional Protocols to Computer Network Attacks'' (2004)  [http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/68LG92/$File/ApplicabilityofIHLtoCNA.pdf ''Web'']
  
[ BibTeX]   
+
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Dormann:2004&f=wikibiblio.bib BibTeX]   
  
 
==Categorization==
 
==Categorization==

Revision as of 15:44, 19 May 2010

Applicability of the Additional Protocols to Computer Network Attacks

Full Citation

Knut Dörmann, Applicability of the Additional Protocols to Computer Network Attacks (2004) Web

BibTeX

Categorization

Issues: Laws of War/Cyberwar

Key Words

See the article itself for any key words as a starting point

Synopsis

This could be an abstract from the article.

Policy Relevance

Policy and Legal Implications, relevant law.

Case Examples

Additional Notes and Highlights

* Outline key points of interest

* Include quotes if relevant/useful
* Consider how these themes relate to other cases, broader thematic areas, etc