Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
86166 Ergebnisse
Sortierung:
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: Journal of conflict and security law, Band 5, Heft 12, S. 157-176
ISSN: 1467-7954
In: Journal of conflict & security law, Band 5, Heft 2, S. 157-175
ISSN: 1467-7962
In: International law [14]
In: Harvard international law journal, Band 37, Heft 1, S. 272
ISSN: 0017-8063
In: International law studies 76
In: Cambridge Studies in international and comparative law [92]
In: Cambridge studies in international and comparative law 92
The world in which we live and fight -- Computer network attacks as a use of force in international law -- Armed attack and response in the digital age -- The applicability of the laws of armed conflict to computer network attacks -- Participants in conflict: combatant status, direct participation and computer network attack -- Targeting and precautions in attack -- Measures of special protection -- Means and methods of warfare.
In: Emerging technologies, ethics and international affairs
In: Ethics, National Security, and the Rule of Law Ser.
Cyber warfare has become more pervasive and more complex in recent years. It is difficult to regulate, as it holds an ambiguous position within the laws of war. This book investigates the legal and ethical ramifications of cyber war, considering which sets of laws apply to it, and how it fits into traditional ideas of armed conflict.
In: Cambridge studies in international and comparative law
In: Cambridge studies in international and comparative law