Cyber warfare military cross-border computer network operations under international law

"In the last five years the topic of cyber warfare has received much attention due to several so-called 'cyber incidents' which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which Sta...

Descripción completa

Detalles Bibliográficos
Otros Autores: Woltag, Johann-Christoph, autor (autor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Cambridge, United Kingdom : Intersentia [2014]
Colección:CUP ebooks.
International Law ; 14.
Acceso en línea:Conectar con la versión electrónica
Ver en Universidad de Navarra:https://innopac.unav.es/record=b39830482*spi
Descripción
Sumario:"In the last five years the topic of cyber warfare has received much attention due to several so-called 'cyber incidents' which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction."--Dust jacket.
Notas:Originally presented as author's thesis (doctoral)--University of Hamburg, 2013.
Descripción Física:1 recurso electrónico
Formato:Forma de acceso: World Wide Web.
Bibliografía:Incluye referencias bibliográficas (p. 279-313).
ISBN:9781780684802