Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
In: Emerging technologies, ethics and international affairs
In: New York University journal of international law & politics, Band 34, Heft 1, S. 57-113
ISSN: 0028-7873
In: Journal of conflict and security law, Band 5, Heft 12, S. 157-176
ISSN: 1467-7954
In: Journal of conflict & security law, Band 5, Heft 2, S. 157-175
ISSN: 1467-7962
In: Cambridge studies in international and comparative law 92
The world in which we live and fight -- Computer network attacks as a use of force in international law -- Armed attack and response in the digital age -- The applicability of the laws of armed conflict to computer network attacks -- Participants in conflict: combatant status, direct participation and computer network attack -- Targeting and precautions in attack -- Measures of special protection -- Means and methods of warfare.
In: Cambridge Studies in international and comparative law [92]
In: Harvard international law journal, Band 37, Heft 1, S. 272
ISSN: 0017-8063
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
Shipping list no: 2012-0024-P. ; Includes bibliographical references and index. ; Combating terrorists : legal challenges in the Post-9/11 World / Nicholas Rostow -- Mission impossible? international law, and the changing character of war / John F. Murphy -- Cyber attacks as "Force" under UN Charter Article 2(4) / Matthew C. Waxman -- Low-intensity computer network attack and self-defense / Sean Watts -- Cyber operations and the Jus in Bello : key issues / Michael N. Schmitt -- Who may be held? military detention through the Habeas Lens / Robert M. Chesney -- The changing character of the participants in war : civilianization of warfighting and the concept of "direct participation in hostilities" / Charles Garraway -- Direct participation in hostilities and the interoperability of the law of armed conflict and human rights law / Françoise J. Hampson -- Use of unmanned systems to combat terrorism / Raul A. "Pete" Pedrozo -- New technology and the law of armed conflict / Darren M. Stewart -- The law of armed conflict in asymmetric urban armed conflict / David E. Graham -- Lawfare today . and tomorrow / Charles J. Dunlap, Jr. -- The age of lawfare / Dale Stephens -- Warning civilians prior to attack under international law : theory and practice / Pnina Sharvit Baruch and Noam Neuman -- The changing character of public legal scrutiny of operations / Rob McLaughlin -- Litigating how we fight / Ashley S. Deeks -- Asymmetric warfare : how to respond? / Wolff Heintschel von Heinegg -- Concluding remarks : LOAC and attempts to abuse or subvert it / Yoram Dinstein. ; Mode of access: Internet.
BASE
In: International law studies 76
In: Cambridge studies in international and comparative law 92
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
In: Ethics, National Security, and the Rule of Law Ser.
Cyber warfare has become more pervasive and more complex in recent years. It is difficult to regulate, as it holds an ambiguous position within the laws of war. This book investigates the legal and ethical ramifications of cyber war, considering which sets of laws apply to it, and how it fits into traditional ideas of armed conflict.
In: Emerging technologies, ethics and international affairs
"Examining the thematic intersection of law, technology and violence, this book explores cyber attacks against states and current international law on the use of force. The theory of information ethics is used to critique the law's conception of violence and to develop an informational approach as an alternative way to think about cyber attacks. Cyber attacks against states constitute a new form of violence in the information age, and international law on the use of force is limited in its capacity to regulate them. This book draws on Luciano Floridi's theory of information ethics to critique the narrow conception of violence embodied in the law and to develop an alternative way to think about cyber attacks, violence, and the state. The author uses three case studies – the 2007 cyber attacks against Estonia, the Stuxnet incident involving Iran that was discovered in 2010, and the cyber attacks used as part of the Russian interference in the 2016 US presidential election – to demonstrate that an informational approach offers a means to reimagine the state as an entity and cyber attacks as a form of violence against it."--