Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
(→‎Books and monographs: Added JustSecurity sources to 'online sources' rather than journals)
Line 13: Line 13:
 
*Joanna Kulesza, ''Due Diligence in International Law'' (Brill 2016) 266.
 
*Joanna Kulesza, ''Due Diligence in International Law'' (Brill 2016) 266.
 
*Kubo Mačák, ''[http://www.oxfordscholarship.com/view/10.1093/oso/9780198819868.001.0001/oso-9780198819868 Internationalized Armed Conflicts in International Law]'' (OUP 2018).
 
*Kubo Mačák, ''[http://www.oxfordscholarship.com/view/10.1093/oso/9780198819868.001.0001/oso-9780198819868 Internationalized Armed Conflicts in International Law]'' (OUP 2018).
*René Provost, ''International Human Rights and Humanitarian Law'' (CUP 2002)
+
*René Provost, ''International Human Rights and Humanitarian Law'' (CUP 2002).
 
*Marco Roscini, ''Cyber Operations and the Use of Force in International Law'' (OUP 2014).
 
*Marco Roscini, ''Cyber Operations and the Use of Force in International Law'' (OUP 2014).
 
*Gary D. Solis, ''The Law of Armed Conflict: International Humanitarian Law in War'' (CUP 2016).
 
*Gary D. Solis, ''The Law of Armed Conflict: International Humanitarian Law in War'' (CUP 2016).
Line 27: Line 27:
 
*Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) ''International Organizations and the Idea of Autonomy'' (Routledge 2011).
 
*Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) ''International Organizations and the Idea of Autonomy'' (Routledge 2011).
*T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016)
+
*T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016).
 
*Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), ''Peacetime Regime for State Activities in Cyberspace'' (NATO CCD COE 2013).
 
*Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), ''Peacetime Regime for State Activities in Cyberspace'' (NATO CCD COE 2013).
 
*Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), ''[http://opil.ouplaw.com/view/10.1093/law/9780199658800.001.0001/law-9780199658800 The Handbook of International Humanitarian Law]'' (3rd edn, OUP 2013).
 
*Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), ''[http://opil.ouplaw.com/view/10.1093/law/9780199658800.001.0001/law-9780199658800 The Handbook of International Humanitarian Law]'' (3rd edn, OUP 2013).
Line 62: Line 62:
 
*Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
 
*Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
 
*Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
 
*Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
*K Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55
+
*K Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55.
 
*
 
*
 
*Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
 
*Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
*Marko Milanovic, ‘[http://www.harvardilj.org/wp-content/uploads/561Milanovic.pdf Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age]’ (2015) 56/1 HarvIntlLJ
+
*Marko Milanovic, ‘[http://www.harvardilj.org/wp-content/uploads/561Milanovic.pdf Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age]’ (2015) 56/1 HarvIntlLJ.
*Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807
+
*Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807.
 
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
 
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
 
*Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
 
*Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
Line 80: Line 80:
   
 
== International reports and other public documents ==
 
== International reports and other public documents ==
  +
*[https://doi.org/10.1017/9781316577226.029 American Convention on Human Rights] (open for signature from 22 November 1969, entered into force 18 July 1978), 1144 UNTS 123.
* [TBC]
 
  +
*[https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT Charter of Fundamental Rights of the European Union], proclaimed on 7 December 2000.
  +
*[https://treaties.un.org/doc/publication/ctc/uncharter.pdf Charter of the United Nations] (adopted 26 June 1945, entered into force 24 October 1945) 1 UNTS 16.
  +
*[https://www.echr.coe.int/Documents/Convention_ENG.pdf Convention for the Protection of Human Rights and Fundamental Freedoms] (opened to the signature in Rome on 4 November 1950, entered into force 3 September 1953), ETS 5.
  +
*[https://treaties.un.org/doc/Publication/UNTS/Volume 974/volume-974-I-14118-english.pdf Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation] (signed 23 September 1971, entered into force 26 January 1973) 974 UNTS 178 (“Montreal Convention”).
  +
*Council of Europe, [https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 Convention on Cybercrime] (adopted 23 November 2001, entered into force 1 July 2004).
  +
*Council of the European Union, "[https://www.consilium.europa.eu/media/31666/st14435en17.pdf Council Conclusions on the Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU]" (Council conclusions, 20 November 2017),
  +
*Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a [https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:02009R0428-20171216 Community regime for the control of exports, transfer, brokering and transit of dual-use items] consolidated version as of 16 December 2017.
  +
*[https://rm.coe.int/16800cce5b Documents of the United Nations Conference on International Organization] (1945), vol VI, Explanatory Report to the Convention on Cybercrime.
  +
*[https://www.mofa.go.jp/files/000160279.pdf G7 Principles and Actions on Cyber] (Annex to the Ise-Shima Declaration from 27 May 2016).
  +
*[https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2011_05/20110926_110526-G8-Summit-Deauville.pdf G8 ''Summit of Deauville, Declaration: Renewed Commitment for Freedom and Democracy''] (27 May 2011),
  +
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf Draft Articles on Responsibility of States for Internationally Wrongful Acts], with commentaries, Yearbook of the ILC (2001).
  +
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_11_2011.pdf Draft Articles on the Responsibility of International Organizations], with commentaries, Yearbook of the ILC (2011).
  +
*International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171.
  +
*[https://www.ohchr.org/en/professionalinterest/pages/cescr.aspx International Covenant on Economic, Social and Cultural Rights] (adopted 16 December 1966, entered into force 3 January 1976) 993 UNTS 3.
  +
*NATO, ''[https://www.nato.int/cps/en/natohq/official_texts_133169.htm Warsaw Summit Communiqué]'' (9 July 2016).
  +
*Organization for Security and Cooperation in Europe, ''[https://www.osce.org/pc/227281?download=true Decision No. 1202, OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies]'' (Permanent Council, 10 March 2016) PC.DEC/1202.
  +
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts] (Protocol 1) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 3.
  +
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts] (Protocol II) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 609.
  +
*'[http://legal.un.org/ilc/documentation/english/a_cn4_534.pdf Sixth report on unilateral acts of States]' (30 May 2003) (by Mr. Victor Rodríguez Cedeño, Special Rapporteur) UN Doc A/CN.4/534 58.   
  +
*The International Law Commission, 'Document A/6309/ Rev.1: Reports of the International Law Commission on the second part of its seventeenth and on its eighteenth session' [http://legal.un.org/ilc/publications/yearbooks/english/ilc_1966_v2.pdf Yearbook of the International Law Commission Vol. II] (1966) 247.
  +
*UN GA Res 2625 (XXV) (24 October 1970) (Friendly Relations Declaration).
  +
*UN GA Res 55/63 (4 December 2000), Doc A/RES/55/63.
  +
*UN GGE 2015 '[https://documents-dds-ny.un.org/doc/UNDOC/GEN/N15/228/35/PDF/N1522835.pdf?OpenElement Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security report]' (22 July 2015) UN Doc A/70/174.
  +
*UN GGE 2015 report.
  +
*UN Human Rights Committee, ‘[http://docstore.ohchr.org/SelfServices/FilesHandler.ashx?enc=6QkG1d%2fPPRiCAqhKb7yhsjYoiCfMKoIRv2FVaVzRkMjTnjRO%2bfud3cPVrcM9YR0iW6Txaxgp3f9kUFpWoq%2fhW%2fTpKi2tPhZsbEJw%2fGeZRASjdFuuJQRnbJEaUhby31WiQPl2mLFDe6ZSwMMvmQGVHA%3d%3d General Comment No. 31 (80): The Nature of the General Legal Obligation Imposed on States Parties to the Covenant]’ (adopted on 29 March 2004, 2187th meeting).
  +
*UN Human Rights Committee, ''Summary Record of the 1405th Meeting,'' CCPR/C/SR.1405 (31 March 1995) 6.
  +
*UN Human Rights Committee, [https://www2.ohchr.org/english/bodies/hrc/docs/gc34.pdf ICCPR General Comment No. 34] (12 September 2011)
  +
*UN SC, [http://daccess-ods.un.org/access.nsf/GetFile?OpenAgent&DS=S/RES/2321(2016)&Lang=E&Type=DOC Resolution 2321] (2016) Adopted by the Security Council at its 7821st meeting, on 30 November 2016.
  +
*UNGA ‘[http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174 Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security]’ (22 July 2015), A/70/174.
  +
*UNGA [http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/243 Res 68/243] (27 December 2013) UN Doc A/RES/68/243.
  +
*UNGA [https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf Res 71/237] (30 December 2015) UN Doc A/RES/20/237.
  +
*United Nations Human Rights Council, ''[https://documents-dds-ny.un.org/doc/UNDOC/GEN/G16/156/90/PDF/G1615690.pdf?OpenElement The promotion, protection and enjoyment of human rights on the Internet]'', Resolution A/HRC/RES/32/13 (1 July 2016).
  +
*US Department of Defence, ''[https://dod.defense.gov/Portals/1/Documents/pubs/DoD Law of War Manual - June 2015 Updated Dec 2016.pdf?ver=2016-12-13-172036-190 Law of War Manual]'' (December 2016).
  +
*[http://legal.un.org/ilc/texts/instruments/english/conventions/9_2_1963.pdf Vienna Convention on Consular Relations] (adopted 24 April 1963, entered into force 19 March 1967), 596 UNTS 261.
  +
*[http://legal.un.org/ilc/texts/instruments/english/conventions/9_1_1961.pdf Vienna Convention on Diplomatic Relations] (adopted 18 April 1961, entered into force 24 April 1964), 500 UNTS 95.
  +
*[https://treaties.un.org/doc/publication/unts/volume%201155/volume-1155-i-18232-english.pdf Vienna Convention on the Law of Treaties] (adopted 23 May 1969, entered into force 27 January 1908) 1155 UNTS 331.
   
 
== Newspaper articles and online news ==
 
== Newspaper articles and online news ==
* [TBC]
 
 
 
== Blog posts and other online sources ==
 
== Blog posts and other online sources ==
 
* James Clapper, US, Director of National Intelligence, [https://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf Worldwide Threat Assessment of the US Intelligence Community] (26 February 2015).
 
* James Clapper, US, Director of National Intelligence, [https://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf Worldwide Threat Assessment of the US Intelligence Community] (26 February 2015).

Revision as of 18:37, 31 January 2019

(This page is currently under construction.)

Books and monographs

  • William H Boothby, The Law of Targeting (OUP 2012).
  • William H Boothby, Weapons and the Law of Armed Conflict (OUP 2016).
  • Oliver Corten, The Law against War (Hart Pub. 2010).
  • James Crawford, Brownlie's Principles of Public International Law (OUP 2012).
  • James Crawford, State Responsibility: The General Part (CUP 2013).
  • H Harrison Dinniss, Cyber Warfare and the Laws of War (CUP 2012)
  • Yoram Dinstein (ed), The Conduct of Hostilities under the Law of International Armed Conflict (CUP 2016).
  • Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014).
  • Christine Gray, International Law and the use of force (OUP 2018).
  • Joanna Kulesza, Due Diligence in International Law (Brill 2016) 266.
  • Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018).
  • René Provost, International Human Rights and Humanitarian Law (CUP 2002).
  • Marco Roscini, Cyber Operations and the Use of Force in International Law (OUP 2014).
  • Gary D. Solis, The Law of Armed Conflict: International Humanitarian Law in War (CUP 2016).
  • Nigel White, The Law of International Organizations (Juris 2005).
  • Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017) .

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (Eds.) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Jean D’Aspremont, ‘Persona Non Grata’, in Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), The Law of International Responsibility (OUP 2010).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Rudiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Silja Vöneky, ‘Analogy in International Law’, in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).

Edited books and reference texts

Journal articles

International reports and other public documents

Newspaper articles and online news

Blog posts and other online sources