Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
16905 Ergebnisse
Sortierung:
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: International Law 14
In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors
In: International law [14]
In: Cambridge Studies in international and comparative law [92]
In: Cambridge studies in international and comparative law 92
The world in which we live and fight -- Computer network attacks as a use of force in international law -- Armed attack and response in the digital age -- The applicability of the laws of armed conflict to computer network attacks -- Participants in conflict: combatant status, direct participation and computer network attack -- Targeting and precautions in attack -- Measures of special protection -- Means and methods of warfare.
In: International law studies 76
In: Emerging technologies, ethics and international affairs
In: Ethics, National Security, and the Rule of Law Ser.
Cyber warfare has become more pervasive and more complex in recent years. It is difficult to regulate, as it holds an ambiguous position within the laws of war. This book investigates the legal and ethical ramifications of cyber war, considering which sets of laws apply to it, and how it fits into traditional ideas of armed conflict.
In: Cambridge studies in international and comparative law
In: Cambridge studies in international and comparative law
In: Oxford scholarship online
Fifteen years into the era of 'cyber warfare,' are we any closer to understanding the role a major cyberattack would play in international relations - or to preventing one? Uniquely spanning disciplines and enriched by the insights of a leading practitioner, Rethinking Cyber Warfare provides a fresh understanding of the role that digital disruption plays in contemporary international security.
In: International law studies series 87