The Resource Cyber-Attacks and the Exploitable Imperfections of International Law
Cyber-Attacks and the Exploitable Imperfections of International Law
Resource Information
The item Cyber-Attacks and the Exploitable Imperfections of International Law represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Cyber-Attacks and the Exploitable Imperfections of International Law represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- Cyber-Attacks and the Exploitable Imperfections of International Law reveals elements of existing jus ad bellum and jus in bello regimes that are unable to accommodate the threats posed by cyber-attacks. It maps out legal gaps, deficiencies, and uncertainties, which international actors may seek to exploit to their political benefit
- Language
- eng
- Extent
- 1 online resource
- Contents
-
- Introduction
- Theoretical framework
- Cyber-threat
- Cyber-space
- Cyber-strikes and jus ad bellum
- Humanitarian law perspective
- Cyber-terrorism
- Role of international organizations
- Conclusion
- Isbn
- 9789004298330
- Label
- Cyber-Attacks and the Exploitable Imperfections of International Law
- Title
- Cyber-Attacks and the Exploitable Imperfections of International Law
- Subject
-
- Cyberspace
- Cyberspace operations (International law)
- Cyberspace operations (Military science)
- Cyberspace operations (Military science)
- Cyberwarfare
- Information and communication technology
- Information warfare (International law)
- International humanitarian law
- LAW -- International
- North Atlantic Treaty Organization
- Theses
- Use of force
- Information warfare (International law)
- Language
- eng
- Summary
- Cyber-Attacks and the Exploitable Imperfections of International Law reveals elements of existing jus ad bellum and jus in bello regimes that are unable to accommodate the threats posed by cyber-attacks. It maps out legal gaps, deficiencies, and uncertainties, which international actors may seek to exploit to their political benefit
- Cataloging source
- IDEBK
- http://library.link/vocab/creatorName
- Radziwill, Yaroslav
- Dewey number
- 341.6
- Index
- index present
- LC call number
- KZ6718
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/subjectName
-
- Information warfare (International law)
- Cyberspace operations (Military science)
- LAW
- Cyberspace operations (Military science)
- Information warfare (International law)
- North Atlantic Treaty Organization
- Cyberspace
- Cyberwarfare
- Use of force
- Information and communication technology
- International humanitarian law
- Theses
- Label
- Cyber-Attacks and the Exploitable Imperfections of International Law
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- Theoretical framework -- Cyber-threat -- Cyber-space -- Cyber-strikes and jus ad bellum -- Humanitarian law perspective -- Cyber-terrorism -- Role of international organizations -- Conclusion
- Control code
- 915154489
- Dimensions
- unknown
- Extent
- 1 online resource
- Form of item
- online
- Isbn
- 9789004298330
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1163/9789004298309
- http://library.link/vocab/ext/overdrive/overdriveId
- 817015
- Specific material designation
- remote
- System control number
- (OCoLC)915154489
- Label
- Cyber-Attacks and the Exploitable Imperfections of International Law
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- Theoretical framework -- Cyber-threat -- Cyber-space -- Cyber-strikes and jus ad bellum -- Humanitarian law perspective -- Cyber-terrorism -- Role of international organizations -- Conclusion
- Control code
- 915154489
- Dimensions
- unknown
- Extent
- 1 online resource
- Form of item
- online
- Isbn
- 9789004298330
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1163/9789004298309
- http://library.link/vocab/ext/overdrive/overdriveId
- 817015
- Specific material designation
- remote
- System control number
- (OCoLC)915154489
Subject
- Cyberspace
- Cyberspace operations (International law)
- Cyberspace operations (Military science)
- Cyberspace operations (Military science)
- Cyberwarfare
- Information and communication technology
- Information warfare (International law)
- International humanitarian law
- LAW -- International
- North Atlantic Treaty Organization
- Theses
- Use of force
- Information warfare (International law)
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Cyber-Attacks-and-the-Exploitable-Imperfections/RYrkH7XWNsQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Cyber-Attacks-and-the-Exploitable-Imperfections/RYrkH7XWNsQ/">Cyber-Attacks and the Exploitable Imperfections of International Law</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Cyber-Attacks and the Exploitable Imperfections of International Law
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Cyber-Attacks-and-the-Exploitable-Imperfections/RYrkH7XWNsQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Cyber-Attacks-and-the-Exploitable-Imperfections/RYrkH7XWNsQ/">Cyber-Attacks and the Exploitable Imperfections of International Law</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>