Difference between revisions of "International Law (including Laws of War)"

From Cybersecurity Wiki
Jump to: navigation, search
Line 8: Line 8:
  
 
Dörmann, Knut  (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]
 
Dörmann, Knut  (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]
 +
 +
Dunlap, Charles J. Jr. (2009) [[Towards a Cyberspace Legal Regime in the Twenty-First Century]]
  
 
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]   
 
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]   

Revision as of 14:40, 3 August 2010

TOC-> Approaches->International Law (including Laws of War)

Beard, Jack M. (2009) Law and War in the Virtual Era

Brown, Davis (2006) A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict

Department of Defense Office of General Counsel (1999) An Assessment of International Legal Issues in Information Operations

Dörmann, Knut (2004) Applicability of the Additional Protocols to Computer Network Attacks

Dunlap, Charles J. Jr. (2009) Towards a Cyberspace Legal Regime in the Twenty-First Century

Hollis, Duncan B. (2007) Why States Need an International Law for Information Operations

Nye, Joseph (2010) Cyber Power

Schmitt, Michael N., et. al (2004) Computers and War

Schmitt, Michael N. (1999) Computer Network Attack and the Use of Force in International Law

Schmitt, Michael N. (2002) Wired Warfare

Sklerov, Matthew J. (2009) Solving the Dilemma of State Responses to Cyberattacks

Todd, Graham H. (2009) Armed Attack in Cyberspace

Watts, Sean (2010) Combatant Status and Computer Network Attack

  • Subcategories: None

Jump to Table of Contents