Harrison Dinniss, Heather

Cyber Warfare and the Laws of War / Heather Harrison Dinniss - 1st Ed. - New York, USA Cambridge University Press 2012 - xix, 331p. : ill. ; 23cm - Cambridge Studies in International and Comparative Law .

It includes Contents, Acknowledgements, Table of cases, List of Abbreviations, appendix, Bibliography and Index Pages etc..


Book description

The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.


Select Cyber Warfare and the Laws of War - Half title page

Cyber Warfare and the Laws of War - Half title page
pp i-i
Get access
Export citation

Select Series page

Series page
pp ii-ii
Get access
Export citation

Select Cyber Warfare and the Laws of War - Title page

Cyber Warfare and the Laws of War - Title page
pp iii-iii
By Heather Harrison Dinniss
Get access
Export citation

Select Copyright page

Copyright page
pp iv-iv
Get access
Export citation

Select Dedication

Dedication
pp v-vi
Get access
Export citation

Select Contents

Contents
pp vii-x
Get access
Export citation

Select Acknowledgements

Acknowledgements
pp xi-xii
Get access
Export citation

Select Table of cases

Table of cases
pp xiii-xv
Get access
Export citation

Select List of abbreviations

List of abbreviations
pp xvi-xx
Get access
Export citation

Select 1 - The world in which we live and fight

1 - The world in which we live and fight
pp 1-34
Get access
Export citation

Select Part I - Jus ad bellum

Part I - Jus ad bellum
pp 35-114
Get access
Export citation

Select 2 - Computer network attacks as a use of force in international law

2 - Computer network attacks as a use of force in international law
pp 37-74
Get access
Export citation

Select 3 - Armed attack and response in the digital age

3 - Armed attack and response in the digital age
pp 75-114
Get access
Export citation

Select Part II - Jus in bello

Part II - Jus in bello
pp 115-280
Get access
Export citation

Select 4 - The applicability of the laws of armed conflict to computer network attacks

4 - The applicability of the laws of armed conflict to computer network attacks
pp 117-138
Get access
Export citation

Select 5 - Participants in conflict: combatant status, direct participation and computer network attack

5 - Participants in conflict: combatant status, direct participation and computer network attack
pp 139-178
Get access
Export citation

Select 6 - Targeting and precautions in attack

6 - Targeting and precautions in attack
pp 179-219
Get access
Export citation

Select 7 - Measures of special protection

7 - Measures of special protection
pp 220-249
Get access
Export citation

Select 8 - Means and methods of warfare

8 - Means and methods of warfare
pp 250-278
Get access
Export citation

Select Concluding remarks

Concluding remarks
pp 279-280
Get access
Export citation

Select Appendix 1 - Selected computer network attack examples

Appendix 1 - Selected computer network attack examples
pp 281-292
Get access
Export citation

Select Appendix 2 - Glossary of selected computing terms1

Appendix 2 - Glossary of selected computing terms1
pp 293-296
Get access
Export citation

Select Bibliography

Bibliography
pp 297-320
Get access
Export citation

Select Index

Index
pp 321-331


9781107416994


Information Warfare (International Law); War (International Law); Cyberterrorism

341.63 HAR