Difference between revisions of "Government to Government"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 1: Line 1:
 
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Espionage | Espionage->]][[Government to Government]]''
 
''[[Table of Contents | TOC->]][[Issues | Issues->]][[Espionage | Espionage->]][[Government to Government]]''
 
Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]
 
  
 
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]  
 
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]  
Line 16: Line 14:
 
|-
 
|-
 
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
 
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Moderate:Technology; Moderate:Cryptography||N/A
 +
|-
 +
|Brown, Davis||||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||Law Journal||Moderate:Law||[http://www.harvardilj.org/attach.php?id=59 ''Pdf'']
 
|-
 
|-
 
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']
 
|Center for Strategic and International Studies||||2008||[[Securing Cyberspace for the 44th Presidency]]||Independent Reports||Low:Policy||[http://www.cyber.st.dhs.gov/docs/081208_securingcyberspace_44.pdf ''Pdf'']

Revision as of 17:11, 11 August 2010

TOC-> Issues-> Espionage->Government to Government

Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Moderate:Technology; Moderate:Cryptography N/A
Brown, Davis 2006 A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict Law Journal Moderate:Law Pdf
Center for Strategic and International Studies 2008 Securing Cyberspace for the 44th Presidency Independent Reports Low:Policy Pdf
Department of Defense 1999 An Assessment of International Legal Issues in Information Operations Government Report Moderate:Law Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Sklerov, Matthew J. 2009 Solving the Dilemma of State Responses to Cyberattacks Law Review Moderate:Law; Low:Technology Pdf
Todd, Graham H. 2009 Armed Attack in Cyberspace Law Review Moderate:Law Pdf
  • Subcategories: None

Jump to Table of Contents