Coverart for item
The Resource Cyber Warfare and the Laws of War

Cyber Warfare and the Laws of War

Label
Cyber Warfare and the Laws of War
Title
Cyber Warfare and the Laws of War
Creator
Subject
Language
eng
Summary
An analysis of the status of computer network attacks in international law
Member of
Cataloging source
EBLCP
http://library.link/vocab/creatorName
Harrison Dinniss, Heather
Dewey number
343.0999
Index
index present
LC call number
KZ6718 .D56 2012
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
Cambridge Studies in International and Comparative Law
Series volume
v. 92
http://library.link/vocab/subjectName
  • Information warfare (International law)
  • War (International law)
  • Cyberterrorism
  • LAW
  • Cyberterrorism
  • Information warfare (International law)
  • War (International law)
Label
Cyber Warfare and the Laws of War
Instantiates
Publication
Note
2.4. Generic IT support
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Cover; Cyber Warfare and the Laws of War; Series; Title; Copyright; Dedication; Contents; Acknowledgements; Table of cases; List of abbreviations; 1: The world in which we live and fight; 1. Computer network attacks; 2. Law and war in the internet age; 3. Societal trends generally; 3.1. The information revolution and digitisation; 3.1.1. Ubiquity; 3.1.2. Amount; 3.1.3. Societal change; 3.1.4. Organisational change; 3.2. Globalisation, interdependency and the changing world order; 3.3. The rise of the knowledge economy; 4. Military trends; 4.1. A change of purpose
  • 4.2. Network-centric warfare and effects-based operations4.3. Outsourcing and civilianisation; 5. Terminology and definitions; 5.1. New laws for old?; 5.2. Methodology; 5.3. A word about examples and hypotheticals; 6. Conclusion; PART I: Jus ad bellum; 2 Computer network attacks as a use of force in international law; 1. Force defined as armed force; The Charter wording; Travaux prĂ©paratoires and historical background; Subsequent iterations of the rule; 2. Definition of armed force; 2.1. State actions; 2.2. Theories of force -- scholastic writings; 3. Computer network attacks as a use of force
  • 3.1. Characteristics of computer network attacks3.1.1. Indirectness; 3.1.2. Intangibility; Target intangibility; Weapons intangibility; 3.1.3. Locus; 3.1.4. Result; 4. Conclusion; 3 Armed attack and response in the digital age; 1. Armed attack; 1.1. Anticipatory self-defence; 1.1.1. Doctrinal debate and imminent attacks; 1.1.2. State practice; 1.1.3. Computer network attacks and anticipatory self-defence; 1.1.4. The 'Bush doctrine' of pre-emptive self-defence65; 1.2. Pinprick attacks or accumulation of events theory; 2. Self-defence against non-state actors; 3. Attribution
  • 4. Necessity and proportionality5. Countermeasures against unlawful acts; 6. Security Council authorisation and collective measures; 7. Conclusion; PART II: Jus in bello; 4 The applicability of the laws of armed conflict to computer network attacks; 1. Armed conflict; 1.1. The requirement of armed force; 1.2. Intervention of the armed forces; 2. Application to computer network attacks; 2.1. Application during conventional armed conflict; 2.2. Computer network attack on its own; 2.2.1. Armed force; 2.2.2. Humanitarian principles; 2.3. Computer network attacks in support of conventional attacks
  • 3. Territory4. Conclusion; 5 Participants in conflict: combatant status, direct participation and computer network attack; 1. Combatant status; 1.1. Requirements of combatant status; 1.1.1. Responsible command; 1.1.2. Distinction; 1.1.3. Compliance, organisation, belonging and allegiance; 1.2. Saboteurs and spies; 1.2.1. Sabotage; 1.2.2. Espionage; 2. Direct participation by civilians; 2.1. Requirements of direct participation; 2.1.1. Earlier scholarship; 2.1.2. The ICRC interpretive guidance; 2.2. Offensive computer network attack; 2.3. Computer network attack system support
Control code
804664864
Dimensions
unknown
Extent
1 online resource (360 pages)
Form of item
online
Isbn
9780511894527
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9786613834447
Specific material designation
remote
System control number
(OCoLC)804664864
Label
Cyber Warfare and the Laws of War
Publication
Note
2.4. Generic IT support
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Cover; Cyber Warfare and the Laws of War; Series; Title; Copyright; Dedication; Contents; Acknowledgements; Table of cases; List of abbreviations; 1: The world in which we live and fight; 1. Computer network attacks; 2. Law and war in the internet age; 3. Societal trends generally; 3.1. The information revolution and digitisation; 3.1.1. Ubiquity; 3.1.2. Amount; 3.1.3. Societal change; 3.1.4. Organisational change; 3.2. Globalisation, interdependency and the changing world order; 3.3. The rise of the knowledge economy; 4. Military trends; 4.1. A change of purpose
  • 4.2. Network-centric warfare and effects-based operations4.3. Outsourcing and civilianisation; 5. Terminology and definitions; 5.1. New laws for old?; 5.2. Methodology; 5.3. A word about examples and hypotheticals; 6. Conclusion; PART I: Jus ad bellum; 2 Computer network attacks as a use of force in international law; 1. Force defined as armed force; The Charter wording; Travaux prĂ©paratoires and historical background; Subsequent iterations of the rule; 2. Definition of armed force; 2.1. State actions; 2.2. Theories of force -- scholastic writings; 3. Computer network attacks as a use of force
  • 3.1. Characteristics of computer network attacks3.1.1. Indirectness; 3.1.2. Intangibility; Target intangibility; Weapons intangibility; 3.1.3. Locus; 3.1.4. Result; 4. Conclusion; 3 Armed attack and response in the digital age; 1. Armed attack; 1.1. Anticipatory self-defence; 1.1.1. Doctrinal debate and imminent attacks; 1.1.2. State practice; 1.1.3. Computer network attacks and anticipatory self-defence; 1.1.4. The 'Bush doctrine' of pre-emptive self-defence65; 1.2. Pinprick attacks or accumulation of events theory; 2. Self-defence against non-state actors; 3. Attribution
  • 4. Necessity and proportionality5. Countermeasures against unlawful acts; 6. Security Council authorisation and collective measures; 7. Conclusion; PART II: Jus in bello; 4 The applicability of the laws of armed conflict to computer network attacks; 1. Armed conflict; 1.1. The requirement of armed force; 1.2. Intervention of the armed forces; 2. Application to computer network attacks; 2.1. Application during conventional armed conflict; 2.2. Computer network attack on its own; 2.2.1. Armed force; 2.2.2. Humanitarian principles; 2.3. Computer network attacks in support of conventional attacks
  • 3. Territory4. Conclusion; 5 Participants in conflict: combatant status, direct participation and computer network attack; 1. Combatant status; 1.1. Requirements of combatant status; 1.1.1. Responsible command; 1.1.2. Distinction; 1.1.3. Compliance, organisation, belonging and allegiance; 1.2. Saboteurs and spies; 1.2.1. Sabotage; 1.2.2. Espionage; 2. Direct participation by civilians; 2.1. Requirements of direct participation; 2.1.1. Earlier scholarship; 2.1.2. The ICRC interpretive guidance; 2.2. Offensive computer network attack; 2.3. Computer network attack system support
Control code
804664864
Dimensions
unknown
Extent
1 online resource (360 pages)
Form of item
online
Isbn
9780511894527
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9786613834447
Specific material designation
remote
System control number
(OCoLC)804664864

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...