Difference between revisions of "International Law (including Laws of War)"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 1: Line 1:
 
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Law (including Laws of War)]]''
 
''[[Table of Contents | TOC->]][[Approaches | Approaches->]][[International Law (including Laws of War)]]''
  
Beard, Jack M. (2009) [[Law and War in the Virtual Era]]
+
{| class="wikitable sortable" border="1" cellpadding="1" cellspacing="0" style="border: 1px solid LightGrey;"
 
+
|-
Brown, Davis (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
+
! style="background-color: #efefef;" | Author 1
 
+
! style="background-color: #efefef;" | Author 2
Department of Defense Office of General Counsel (1999) [[An Assessment of International Legal Issues in Information Operations]]
+
! style="background-color: #efefef;" | Year
 
+
! style="background-color: #efefef;" | Title
Dörmann, Knut (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]
+
! style="background-color: #efefef;" | Source
 
+
! style="background-color: #efefef;" | Expertise
Dunlap, Charles J. Jr. (2009) [[Towards a Cyberspace Legal Regime in the Twenty-First Century]]
+
! style="background-color: #efefef;" class="unsortable" | Full Text 
 
+
|-
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]
+
|Beard, Jack M.||2009||[[Law and War in the Virtual Era]]||||None||
 
+
|-
Nye, Joseph (2010) [[Cyber Power]]
+
|Brown, Davis||2006||[[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]||||None||
 
+
|-
Schmitt, Michael N., et. al (2004) [[Computers and War]]  
+
|Department of Defense Office of General Counsel||1999||[[An Assessment of International Legal Issues in Information Operations]]||||None||
 
+
|-
Schmitt, Michael N. (1999) [[Computer Network Attack and the Use of Force in International Law]]  
+
|Dörmann, Knut||2004||[[Applicability of the Additional Protocols to Computer Network Attacks]]||||None||
 
+
|-
Schmitt, Michael N. (2002) [[Wired Warfare]]  
+
|Dunlap, Charles J. Jr.||2009||[[Towards a Cyberspace Legal Regime in the Twenty-First Century]]||||None||
 
+
|-
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]]  
+
|Hollis, Duncan B.||2007||[[Why States Need an International Law for Information Operations]]||||None||
 
+
|-
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]  
+
|Nye, Joseph||2010||[[Cyber Power]]||||None||
 
+
|-
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
+
|Schmitt, Michael N., et. al||2004||[[Computers and War]]||||None||
 +
|-
 +
|Schmitt, Michael N.||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None||
 +
|-
 +
|Schmitt, Michael N.||2002||[[Wired Warfare]]||||None||
 +
|-
 +
|Sklerov, Matthew J.||2009||[[Solving the Dilemma of State Responses to Cyberattacks]]||||None||
 +
|-
 +
|Todd, Graham H.||2009||[[Armed Attack in Cyberspace]]||||None||
 +
|-
 +
|Watts, Sean||2010||[[Combatant Status and Computer Network Attack]]
 +
|}
  
 
*'''''Subcategories:''''' ''None''
 
*'''''Subcategories:''''' ''None''
  
 
''[[Table of Contents | Jump to Table of Contents]]''
 
''[[Table of Contents | Jump to Table of Contents]]''

Revision as of 19:11, 10 August 2010