Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
88513 Ergebnisse
Sortierung:
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: Journal of conflict & security law, Band 5, Heft 2, S. 157-175
ISSN: 1467-7962
In: International law [14]
In: Cambridge Studies in international and comparative law [92]
In: Cambridge studies in international and comparative law 92
The world in which we live and fight -- Computer network attacks as a use of force in international law -- Armed attack and response in the digital age -- The applicability of the laws of armed conflict to computer network attacks -- Participants in conflict: combatant status, direct participation and computer network attack -- Targeting and precautions in attack -- Measures of special protection -- Means and methods of warfare.
In: International law studies 76
In: Emerging technologies, ethics and international affairs
Shipping list no: 2012-0024-P. ; Includes bibliographical references and index. ; Combating terrorists : legal challenges in the Post-9/11 World / Nicholas Rostow -- Mission impossible? international law, and the changing character of war / John F. Murphy -- Cyber attacks as "Force" under UN Charter Article 2(4) / Matthew C. Waxman -- Low-intensity computer network attack and self-defense / Sean Watts -- Cyber operations and the Jus in Bello : key issues / Michael N. Schmitt -- Who may be held? military detention through the Habeas Lens / Robert M. Chesney -- The changing character of the participants in war : civilianization of warfighting and the concept of "direct participation in hostilities" / Charles Garraway -- Direct participation in hostilities and the interoperability of the law of armed conflict and human rights law / Françoise J. Hampson -- Use of unmanned systems to combat terrorism / Raul A. "Pete" Pedrozo -- New technology and the law of armed conflict / Darren M. Stewart -- The law of armed conflict in asymmetric urban armed conflict / David E. Graham -- Lawfare today . and tomorrow / Charles J. Dunlap, Jr. -- The age of lawfare / Dale Stephens -- Warning civilians prior to attack under international law : theory and practice / Pnina Sharvit Baruch and Noam Neuman -- The changing character of public legal scrutiny of operations / Rob McLaughlin -- Litigating how we fight / Ashley S. Deeks -- Asymmetric warfare : how to respond? / Wolff Heintschel von Heinegg -- Concluding remarks : LOAC and attempts to abuse or subvert it / Yoram Dinstein. ; Mode of access: Internet.
BASE
In: Ethics, National Security, and the Rule of Law Ser.
Cyber warfare has become more pervasive and more complex in recent years. It is difficult to regulate, as it holds an ambiguous position within the laws of war. This book investigates the legal and ethical ramifications of cyber war, considering which sets of laws apply to it, and how it fits into traditional ideas of armed conflict.
In: Cambridge studies in international and comparative law
In: Cambridge studies in international and comparative law
Shipping list no.: 2004-0041-P. ; Includes bibliographical references and index. ; CNE and CNA in the network-centric battlespace : challenges for operators and lawyers / Arthur K. Cebrowski -- Technology and law : the evolution of digital warfare / David Tubbs, Perry G. Luzwick, Walter Gary Sharp, Sr.-- A different kettle of fish : computer network attack / Roger W. Barnett -- Information operations, information warfare, and computer network attack : their relationship to national security in the information age / Daniel T. Kuehl -- International law, cybernetics, and cyberspace / Anthony D'Amato -- Computer network attack as a use of force under Article 2(4) of the United Nations Charter / Daniel B. Silver -- Computer network attacks and self-defense / Yoram Dinstein -- Self-defense against computer network attack under international law / Horace B. Robertson, Jr.-- Computer networks, proportionality, and military operations / James H. Doyle, Jr.-- Some thoughts on computer network attack and the international law of armed conflict / Louise Doswald-Beck -- Wired warfare : computer network attack and the jus in bello / Michael N. Schmitt -- Proportionality, cyberwar, and the law of war / Ruth G. Wedgwood -- Neutrality and information warfare / George K. Walker -- Information operations in the space law arena : science fiction becomes reality / Douglas S. Anderson and Christopher R. Dooley -- Fourth dimensional intelligence : thoughts on espionage, law, and cyberspace / David M. Crane -- Computer network attacks by terrorists : some legal dimensions / John F. Murphy -- Meeting the challenge of cyberterrorism : defining the military role in a democracy / Charles J. Dunlap, Jr.-- "Weapons like to lightning" US information operations and US treaty obligations / Jeffrey H. Smith and Gordon N. Lederman -- International law of armed conflict and computer network attack : developing the rules of engagement / Brian T. O'Donnell and James C. Kraska .-- Responding to attacks on critical computer infrastructure : what targets? what rules of engagement? / James P. Terry -- Is it time for a treaty on information warfare? / Phillip A. Johnson. ; Mode of access: Internet.
BASE