Cyber warfare military cross-border computer network operations under international law
"In the last five years the topic of cyber warfare has received much attention due to several so-called 'cyber incidents' which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which Sta...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Cambridge, United Kingdom :
Intersentia
[2014]
|
Colección: | CUP ebooks.
International Law ; 14. |
Acceso en línea: | Conectar con la versión electrónica |
Ver en Universidad de Navarra: | https://innopac.unav.es/record=b39830482*spi |
Sumario: | "In the last five years the topic of cyber warfare has received much attention due to several so-called 'cyber incidents' which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction."--Dust jacket. |
---|---|
Notas: | Originally presented as author's thesis (doctoral)--University of Hamburg, 2013. |
Descripción Física: | 1 recurso electrónico |
Formato: | Forma de acceso: World Wide Web. |
Bibliografía: | Incluye referencias bibliográficas (p. 279-313). |
ISBN: | 9781780684802 |