Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cambridge [u.a.] : Cambridge University Press
    UID:
    gbv_1654868035
    Format: XIX, 331 S.
    Edition: 1. publ.
    Edition: Online-Ausg. Online-Ressource Cambridge books online
    ISBN: 9781107416994 , 9781107011083
    Series Statement: Cambridge studies in international and comparative law 92
    Content: The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
    Note: Includes bibliographical references and index , Cover; Cyber Warfare and the Laws of War; Series; Title; Copyright; Dedication; Contents; Acknowledgements; Table of cases; List of abbreviations; 1: The world in which we live and fight; 1. Computer network attacks; 2. Law and war in the internet age; 3. Societal trends generally; 3.1. The information revolution and digitisation; 3.1.1. Ubiquity; 3.1.2. Amount; 3.1.3. Societal change; 3.1.4. Organisational change; 3.2. Globalisation, interdependency and the changing world order; 3.3. The rise of the knowledge economy; 4. Military trends; 4.1. A change of purpose , 4.2. Network-centric warfare and effects-based operations4.3. Outsourcing and civilianisation; 5. Terminology and definitions; 5.1. New laws for old?; 5.2. Methodology; 5.3. A word about examples and hypotheticals; 6. Conclusion; PART I: Jus ad bellum; 2 Computer network attacks as a use of force in international law; 1. Force defined as armed force; The Charter wording; Travaux préparatoires and historical background; Subsequent iterations of the rule; 2. Definition of armed force; 2.1. State actions; 2.2. Theories of force - scholastic writings; 3. Computer network attacks as a use of force , 3.1. Characteristics of computer network attacks3.1.1. Indirectness; 3.1.2. Intangibility; Target intangibility; Weapons intangibility; 3.1.3. Locus; 3.1.4. Result; 4. Conclusion; 3 Armed attack and response in the digital age; 1. Armed attack; 1.1. Anticipatory self-defence; 1.1.1. Doctrinal debate and imminent attacks; 1.1.2. State practice; 1.1.3. Computer network attacks and anticipatory self-defence; 1.1.4. The 'Bush doctrine' of pre-emptive self-defence65; 1.2. Pinprick attacks or accumulation of events theory; 2. Self-defence against non-state actors; 3. Attribution , 4. Necessity and proportionality5. Countermeasures against unlawful acts; 6. Security Council authorisation and collective measures; 7. Conclusion; PART II: Jus in bello; 4 The applicability of the laws of armed conflict to computer network attacks; 1. Armed conflict; 1.1. The requirement of armed force; 1.2. Intervention of the armed forces; 2. Application to computer network attacks; 2.1. Application during conventional armed conflict; 2.2. Computer network attack on its own; 2.2.1. Armed force; 2.2.2. Humanitarian principles; 2.3. Computer network attacks in support of conventional attacks , 3. Territory4. Conclusion; 5 Participants in conflict: combatant status, direct participation and computer network attack; 1. Combatant status; 1.1. Requirements of combatant status; 1.1.1. Responsible command; 1.1.2. Distinction; 1.1.3. Compliance, organisation, belonging and allegiance; 1.2. Saboteurs and spies; 1.2.1. Sabotage; 1.2.2. Espionage; 2. Direct participation by civilians; 2.1. Requirements of direct participation; 2.1.1. Earlier scholarship; 2.1.2. The ICRC interpretive guidance; 2.2. Offensive computer network attack; 2.3. Computer network attack system support , 2.4. Generic IT support
    Additional Edition: ISBN 9780511894527
    Additional Edition: ISBN 9781107011083
    Additional Edition: Erscheint auch als Druck-Ausgabe Dinniss, Heather Harrison Cyber warfare and the laws of war Cambridge [u.a.] : Cambridge University Press, 2012 ISBN 9781107011083
    Additional Edition: ISBN 1107011086
    Language: English
    Subjects: Law , General works
    RVK:
    RVK:
    RVK:
    Keywords: Information warfare ; Internationales Recht ; Computerkriminalität ; Internationales Recht ; Electronic books
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages