This title explores, from an interdisciplinary legal and policy perspective, the multiple challenges that counterinsurgency operations pose today to the rule of law - international, humanitarian, human rights, criminal, and domestic. Addressing the considerable challenges for the future of armed conflict, each chapter explores the premise that in counterinsurgency operations, international humanitarian law, human rights law, international law more generally, and domestic national security laws do not provide adequate legal and policy coverage and guidance for multiple reasons.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
International humanitarian law (IHL) protects persons and property affected by armed conflicts. Focusing on the controversies that impact IHL in practice, this much-anticipated book from leading expert Marco Sassòli discusses when IHL applies, its substantive rules, how to ensure its respect and whether the traditional distinction between international and non-international armed conflicts remains relevant. Sassòli draws on a depth of practical experience to provide invaluable insight and comprehensive guidance on the rules protecting certain categories of persons (for example, civilians, wounded, etc.) during conflict and the rules governing different types of conduct (for example, occupation, naval warfare, etc.). The book examines how these rules interact with other branches of international law, such as human rights and international criminal law, and how the rules are applied to non-State armed groups. Cross-cutting issues, including terrorism, autonomous weapons, cyber warfare, gender and cultural heritage, are also addressed, providing readers with a well-rounded view of IHL and associated concerns. Structured in a clear and accessible way, this book will be the turn-to resource for scholars, lawyers, civil servants and other actors directly involved in the sphere of IHL. It will also be the essential text for forthcoming generations of students, giving them a solid understanding of both the rules relating to IHL and how they are implemented in practice
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This book is the outcome of a research project directed by Natalino Ronzitti, to explore the current status and future prospects of international humanitarian law of air warfare. This is achieved through the analysis of international customary law, the conventional provisions in force and the most recent State practice. As the most recent conflicts suggest, air warfare has known an exponential growth. However, even a rapid analysis of the international humanitarian law applicable to air warfare shows a defective and fragmentary situation. This book will fill the current gap that exists in lega
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
1. Introduction to global information warfare -- 2. From information warfare to information operations and cyber warfare -- 3. War stories from the digital battlefield -- 4. Pre 9/11 -- 5. Effect of 9/11 and US Homeland Security (DHS) -- 6. Nation-state defensive and offensive information warfare capabilities : North America -- 7. Nation-state defensive and offensive information warfare capabilities : Middle East nation-states -- 8. Nation-state defensive and offensive information warfare capabilities : Asia Pacific region -- 9. Nation-state defensive and offensive information warfare capabilities : Europe -- 10. Nation-state defensive and offensive information warfare capabilities : the Russian Federation -- 11. International organizations' defensive and offensive information warfare capabilities -- 12. Nonstate actors -- 13. The history of technology -- 14. Corporate and national resilience -- 15. Awareness -- 16. The Tallinn manual -- 17. A look at the future : the crystal ball.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
War 2.0: Irregular Warfare in the Information Age argues that two intimately connected grassroots trends-the rise of insurgencies and the rise of the web-are putting modern armies under huge pressure to adapt new forms of counterinsurgency to new forms of social war.
"Cyberterrorism in the 21st century is now one of the greatest threats to global security and information. It transcends national borders (and by extension national legal systems), making it difficult for individual countries to formulate a cohesive defence plan against it. The world has yet to see any serious acts of cyberterrorism targeting multiple countries at once, but there's a need for countries to develop legal precedents to deal with this should it happen. This book investigates cyberterrorism in terms of the conventions and legislation developed in response to the growing need to protect the digital infrastructure and information of citizens, companies and governments. It looks at the challenges faced by international organisations in first defining then responding to and curbing cyberterrorism. Following this is analysis of legal provisions, with case studies of enforcement and of jurisdiction of these provisions. Unique in the way that all aspects of cyberterrorism are considered, from initial infringement to eventual prosecution, this book provides recommendations and guidance to law-based post-graduates and professionals working on digital crime, and to those interested in national and international legal legislation against it."--Publisher's website.
This title is part of UC Press's Voices Revived program, which commemorates University of California Press's mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1959
Verfügbarkeit an Ihrem Standort wird überprüft
Dieses Buch ist auch in Ihrer Bibliothek verfügbar:
"This book examines the shape, sources and dangers of information warfare (IW) as it pertains to military, diplomatic and civilian stakeholders. Cyber warfare and information warfare are different beasts. Both concern information, but where the former does so exclusively in its digitized and operationalized form, the latter does so in a much broader sense: with IW, information itself is the weapon. The present work aims to help scholars, analysts, and policymakers understand information warfare within the context of cyber conflict. Specifically, the chapters in the volume address the shape of influence campaigns waged across digital infrastructure and in the psychology of democratic populations in recent years by belligerent state actors, from the Russian Federation to the Islamic Republic of Iran. In marshalling evidence on the shape and evolution of information warfare as a broad-scoped phenomenon aimed at societies writ large, the authors in this book present timely empirical investigations into the global landscape of influence operations, legal and strategic analyses of their role in international politics, and insightful examinations of the potential for democratic process to overcome pervasive foreign manipulation. This book will be of much interest to students of cyber-security, national security, strategic studies, defence studies and International Relations in general."--