Cyber-attacks Based on Legal Requirements and International Relations of Governments
Abstract
Keywords
Full Text:
PDFReferences
A-Book
Lehman, Michael & Gray, Potter (2016). Terrorism as an Organized Crime, translated by Qasem Zamani, Law, 3rd ed., Tehran, Ney publ.
B-Article
Andress, J & Winterfeld, S (2014), Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, second edition, USA, Elsevier
Conforti, B.( 2005), The Law and Practice of the United Nations, Leiden: Martinus Nijhoff.
Duncan B. H (2007), Why States Need an International Law for Information Operations, 11 Lewis & Clark Law Review.1023, 1042.
Delibasis, D.( 2007), The Right to National Self-Defence in Information warfare Operations, London: Arena Books.
Gladyshev, Pavel; Marrington, Andrew & Baggili, Ibrahim (2015), Digital forensics and cyber crime, New York, Springer International Publishing.
Heinegg, W. H. (2012, June). Legal implications of territorial sovereignty in cyberspace. In Cyber Conflict (CYCON), 2012 4th International Conference on (pp. 1-13). IEEE.
Jensen, E. T. (2013). Cyber attacks: Proportionality and precautions in attack. Int'l L. Stud. Ser. US Naval War Col., 89, i.
Jensen, E. T. (2013). Cyber attacks: Proportionality and precautions in attack. Int'l L. Stud. Ser. US Naval War Col., 89, i.
Kodar, Erki (2013). "Applying the Law of Armed Conflict to Cyber Attacks : From the Martens Clause to Additional Protocol 1", ENDC Proceedings, Vol 15, 107-132.
Libicki C. Martin (2009) Cyber deterrence and Cyber war, at: http://www.rand.org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf
Lee, D(2013) "China Dismisses U.S. Accusations of Cyber-Spying", Los Angeles Times, May 7, 2013 http://articles.latimes.com/2013/may/07/world/la-fg-wn-china-uscyber-spying-20130507 .
Lewis, James A., “Multilateral Agreements to Constrain Cyber Conflicts”, Arms Control Today.
Lobel, H. (2012). Cyber war inc.: The law of war implications of the private sector's role in cyber conflict. Tex. Int'l LJ, 47, 617.
Markoff, John & Kramer, Andrew E.( 2010), “U.S., Russia Disagree on Need for Cyber Treaty” , The New York Times, June 28, 2009 cited in:
Reverson, Derek S. (2012), Cyberspace and national security: threats, opportunities, and power in a virtual world, USA, Georgetown University Press.
Responsibility of state for internationally wrongful acts article, 2001: 30-35
Responsibility of state for internationally wrongful acts وarticle 30-31.(2001).
Roscini, Marco (2014), Cyber Operations and the Use of Force in International Law, first Edition, USA, Oxford University Press.
Schreier, Fred (2015), On Cyberwarfare, DCAF Horizon 2015 Working Paper No. 7.
Spinello, Richard A. (2014), Cyberethics: Morality and Law in Cyberspace, fifth edition, USA, Jones & Bartlett Learning
Saxon, Dan (2013), International Humanitarian Law and the changing technology of war, Netherlands, Koninklijke Brill NV.
Schmitt, Michael N. (2013), Tallin Manual on the International Law Applicable to Cyber Warfare, New York, Cambridge University Press.
Sanger E. David (2015), Document Reveals Growth of Cyberwarfare between the U.S. and Iran, at: http://www.nytimes.com
Shakarian, Paulo; Shakarian, Jana & Ruef, Andrew (2013), Introduction to Cyber warfare: A Multidisciplinary Approach, USA, Elsevier.
Tsagourias, Nicholas & Buchan Russell (2015), Research Handbook on International Law and Cyberspace, UK, Edward Elgar Publishing Limited.
Weller, Marc (2015), The Oxford Handbook of the Use of Force in International Law, first Edition, UK, Oxford University Press.
C-Theses
Saberi Tilki, Moazameh (2014). Cyberattacks on Iran’s Nuclear Facilities from the Perspective of International Law (Stuxnet Virus), Master’s thesis, Pardis, University of Gilan.
DOI: https://doi.org/10.33258/birex.v1i2.229
Article Metrics
Abstract view : 166 timesPDF - 146 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.