Difference between revisions of "Cyberwar"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 17: Line 17:
 
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||Moderate:Law||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf'']
 
|Barkham, Jason||||2001||[[Information Warfare and International Law on the Use of Force]]||Law Review||Moderate:Law||[http://www1.law.nyu.edu/journals/jilp/issues/34/pdf/34_1_b.pdf ''Pdf''] [http://activeresponse.org/files/34_1_b.pdf ''Alt Pdf'']
 
|-
 
|-
|Beard, Jack M.||||2009||[[Law and War in the Virtual Era]]||Law Journal||Low:Law||[http://www.asil.org/ajil/July2009_1selectedpiece.pdf ''Pdf'']
+
|Beard, Jack M.||||2009||[[Law and War in the Virtual Era]]||Law Review||Low:Law||[http://www.asil.org/ajil/July2009_1selectedpiece.pdf ''Pdf'']
 
|-
 
|-
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Journal||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf'']
+
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Review||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf'']
 
|-
 
|-
 
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
 
|Clarke, Richard A.||Knake, Robert||2010||[[Cyber War]]||Book||None||N/A
Line 41: Line 41:
 
|Rotenberg et. al.||||2010||[[The Cyber War Threat Has Been Grossly Exaggerated]]||Debate||None||[http://intelligencesquaredus.org/index.php/past-debates/cyber-war-threat-has-been-grossly-exaggerated/ ''Audio/Transcript'']
 
|Rotenberg et. al.||||2010||[[The Cyber War Threat Has Been Grossly Exaggerated]]||Debate||None||[http://intelligencesquaredus.org/index.php/past-debates/cyber-war-threat-has-been-grossly-exaggerated/ ''Audio/Transcript'']
 
|-
 
|-
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law Journal||High:Law||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993&Location=U2&doc=GetTRDoc.pdf ''Pdf'']
+
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||Law Review||High:Law||[http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993&Location=U2&doc=GetTRDoc.pdf ''Pdf'']
 
|-
 
|-
 
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf'']
 
|Schmitt, Michael N.||||2002||[[Wired Warfare]]||Journal Article||Moderate:Law||[http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf ''Pdf'']

Revision as of 20:23, 20 August 2010

TOC-> Issues->Cyberwar

Rotenberg et. al (2010) The Cyber War Threat Has Been Grossly Exaggerated

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Barkham, Jason 2001 Information Warfare and International Law on the Use of Force Law Review Moderate:Law Pdf Alt Pdf
Beard, Jack M. 2009 Law and War in the Virtual Era Law Review Low:Law Pdf
Brown, Davis 2006 A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict Law Review Moderate:Law Pdf
Clarke, Richard A. Knake, Robert 2010 Cyber War Book None N/A
Department of Defense 1999 An Assessment of International Legal Issues in Information Operations Government Report Moderate:Law Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Deputy Chief of Staff for Intelligence 2006 Critical Infrastructure Threats and Terrorism Government Report Low:Organizational Analysis; Low:Risk Management Pdf
Dörmann, Knut 2004 Applicability of the Additional Protocols to Computer Network Attacks Independent Reports Low:Law Pdf
Dunlap, Charles J. Jr. 2009 Towards a Cyberspace Legal Regime in the Twenty-First Century Speech None N/A
Hollis, Duncan B. 2007 Why States Need an International Law for Information Operations Law Review Moderate:Law Pdf
Korns, Stephen W. 2009 Cyber Operations Journal Article Low:International Warfare Pdf
Nye, Joseph 2010 Cyber Power Book Excerpt Low:Technology; Low:Policy Pdf
Rotenberg et. al. 2010 The Cyber War Threat Has Been Grossly Exaggerated Debate None Audio/Transcript
Schmitt, Michael N. 1999 Computer Network Attack and the Use of Force in International Law Law Review High:Law Pdf
Schmitt, Michael N. 2002 Wired Warfare Journal Article Moderate:Law Pdf
Schmitt, Michael N., et. al 2004 Computers and War Conf. Paper Moderate:Law Pdf
Schneier, Bruce 2003 Beyond Fear Book None Scribd
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf
Watts, Sean 2010 Combatant Status and Computer Network Attack Law Review Moderate:Law Pdf

Subcategories: None

Jump to Annotated Bibliography