Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
103908 Ergebnisse
Sortierung:
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: Journal of conflict and security law, Band 5, Heft 12, S. 157-176
ISSN: 1467-7954
In: Journal of conflict & security law, Band 5, Heft 2, S. 157-175
ISSN: 1467-7962
In: Harvard international law journal, Band 37, Heft 1, S. 272
ISSN: 0017-8063
In: International law [14]
In: Cambridge Studies in international and comparative law [92]
In: Cambridge studies in international and comparative law 92
The world in which we live and fight -- Computer network attacks as a use of force in international law -- Armed attack and response in the digital age -- The applicability of the laws of armed conflict to computer network attacks -- Participants in conflict: combatant status, direct participation and computer network attack -- Targeting and precautions in attack -- Measures of special protection -- Means and methods of warfare.
In: International law studies 76
In: Emerging technologies, ethics and international affairs
Introduction -- Information ethics -- Technology, violence and law -- Cyber attacks and international law on the use of force and non-intervention -- The 2007 cyber attacks against Estonia -- Stuxnet -- Russian interference in the 2016 us presidential election -- Information ethics and international law on the use of force -- Conclusion
Shipping list no: 2012-0024-P. ; Includes bibliographical references and index. ; Combating terrorists : legal challenges in the Post-9/11 World / Nicholas Rostow -- Mission impossible? international law, and the changing character of war / John F. Murphy -- Cyber attacks as "Force" under UN Charter Article 2(4) / Matthew C. Waxman -- Low-intensity computer network attack and self-defense / Sean Watts -- Cyber operations and the Jus in Bello : key issues / Michael N. Schmitt -- Who may be held? military detention through the Habeas Lens / Robert M. Chesney -- The changing character of the participants in war : civilianization of warfighting and the concept of "direct participation in hostilities" / Charles Garraway -- Direct participation in hostilities and the interoperability of the law of armed conflict and human rights law / Françoise J. Hampson -- Use of unmanned systems to combat terrorism / Raul A. "Pete" Pedrozo -- New technology and the law of armed conflict / Darren M. Stewart -- The law of armed conflict in asymmetric urban armed conflict / David E. Graham -- Lawfare today . and tomorrow / Charles J. Dunlap, Jr. -- The age of lawfare / Dale Stephens -- Warning civilians prior to attack under international law : theory and practice / Pnina Sharvit Baruch and Noam Neuman -- The changing character of public legal scrutiny of operations / Rob McLaughlin -- Litigating how we fight / Ashley S. Deeks -- Asymmetric warfare : how to respond? / Wolff Heintschel von Heinegg -- Concluding remarks : LOAC and attempts to abuse or subvert it / Yoram Dinstein. ; Mode of access: Internet.
BASE
In: Ethics, National Security, and the Rule of Law Ser.
Cyber warfare has become more pervasive and more complex in recent years. It is difficult to regulate, as it holds an ambiguous position within the laws of war. This book investigates the legal and ethical ramifications of cyber war, considering which sets of laws apply to it, and how it fits into traditional ideas of armed conflict.
In: Cambridge studies in international and comparative law