Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9947413648002882
    Format: 1 online resource (xvii, 313 pages) : , digital, PDF file(s).
    ISBN: 9781780684802 (ebook)
    Series Statement: International Law ; 14
    Content: In the last five years the topic of cyber warfare has received much attention due to several so-called "cyber incidents" which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.This book is written for academics in public international law and practitioners from the military and other public security sectors.
    Note: Title from publisher's bibliographic system (viewed on 01 Dec 2017). , A survey of computer network operations -- , The legal regime of cyberspace -- , Computer network operations outside of armed conflict -- , The justified use of forceful computer network operations -- , Computer network operations during an international armed conflict -- , Neutrality in cyber warfare -- , Computer network operations restrained.
    Additional Edition: Print version: ISBN 9781780682266
    Language: English
    Subjects: Law
    RVK:
    RVK:
    Keywords: Hochschulschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages