Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
(Recommended changes made)
Line 4: Line 4:
 
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
 
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
 
*William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016).
 
*William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016).
*Oliver Corten, ''The Law against War'' (Hart Pub. 2010).
+
*Oliver Corten, ''The Law against War'' (Hart Pub 2010).
 
*James Crawford, ''Brownlie's Principles of Public International Law'' (OUP 2012).
 
*James Crawford, ''Brownlie's Principles of Public International Law'' (OUP 2012).
 
*James Crawford, ''State Responsibility: The General Part'' (CUP 2013).
 
*James Crawford, ''State Responsibility: The General Part'' (CUP 2013).
*H Harrison Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012)
+
*Heather H Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012).
 
*Yoram Dinstein (ed), ''[https://doi.org/10.1017/CBO9781316389591 The Conduct of Hostilities under the Law of International Armed Conflict]'' (CUP 2016).
 
*Yoram Dinstein (ed), ''[https://doi.org/10.1017/CBO9781316389591 The Conduct of Hostilities under the Law of International Armed Conflict]'' (CUP 2016).
 
*Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
 
*Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
 
*Christine Gray, ''International Law and the use of force'' (OUP 2018).
 
*Christine Gray, ''International Law and the use of force'' (OUP 2018).
*Joanna Kulesza, ''Due Diligence in International Law'' (Brill 2016) 266.
+
*Joanna Kulesza, ''Due Diligence in International Law'' (Brill 2016).
 
*Kubo Mačák, ''[http://www.oxfordscholarship.com/view/10.1093/oso/9780198819868.001.0001/oso-9780198819868 Internationalized Armed Conflicts in International Law]'' (OUP 2018).
 
*Kubo Mačák, ''[http://www.oxfordscholarship.com/view/10.1093/oso/9780198819868.001.0001/oso-9780198819868 Internationalized Armed Conflicts in International Law]'' (OUP 2018).
 
*René Provost, ''International Human Rights and Humanitarian Law'' (CUP 2002).
 
*René Provost, ''International Human Rights and Humanitarian Law'' (CUP 2002).
 
*Marco Roscini, ''Cyber Operations and the Use of Force in International Law'' (OUP 2014).
 
*Marco Roscini, ''Cyber Operations and the Use of Force in International Law'' (OUP 2014).
*Gary D. Solis, ''The Law of Armed Conflict: International Humanitarian Law in War'' (CUP 2016).
+
*Gary D Solis, ''The Law of Armed Conflict: International Humanitarian Law in War'' (CUP 2016).
 
*Nigel White, ''The Law of International Organizations'' (Juris 2005).
 
*Nigel White, ''The Law of International Organizations'' (Juris 2005).
 
*Rudiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
 
*Rudiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
Line 21: Line 21:
   
 
== Contributions to edited collections ==
 
== Contributions to edited collections ==
* Russell Buchan, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_Ch4.pdf The International Legal Regulation of State-Sponsored Cyber Espionage]’ (2016) in Anna-Maria Osula and Henry Rõigas (Eds.) ''International Cyber Norms: Legal, Policy & Industry Perspectives'' (NATO CCD COE Publications, Tallinn 2016).
+
* Russell Buchan, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_Ch4.pdf The International Legal Regulation of State-Sponsored Cyber Espionage]’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) ''International Cyber Norms: Legal, Policy & Industry Perspectives'' (NATO CCD COE Publications, Tallinn 2016).
 
*Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016).
 
*Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016).
 
*Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199675449.001.0001/law-9780199675449 The 1949 Geneva Conventions: A Commentary]'' (OUP 2015).
 
*Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199675449.001.0001/law-9780199675449 The 1949 Geneva Conventions: A Commentary]'' (OUP 2015).
Line 27: Line 27:
 
*Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) ''International Organizations and the Idea of Autonomy'' (Routledge 2011).
 
*Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) ''International Organizations and the Idea of Autonomy'' (Routledge 2011).
*T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016).
+
*Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016).
 
*Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), ''Peacetime Regime for State Activities in Cyberspace'' (NATO CCD COE 2013).
 
*Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), ''Peacetime Regime for State Activities in Cyberspace'' (NATO CCD COE 2013).
*Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), ''[http://opil.ouplaw.com/view/10.1093/law/9780199658800.001.0001/law-9780199658800 The Handbook of International Humanitarian Law]'' (3rd edn, OUP 2013).
+
*Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), ''[http://opil.ouplaw.com/view/10.1093/law/9780199658800.001.0001/law-9780199658800 The Handbook of International Humanitarian Law]'' (3rd edn, OUP 2013).
 
*Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), ''The Law of International Responsibility'' (OUP 2010).
 
*Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), ''The Law of International Responsibility'' (OUP 2010).
 
*Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199639762.001.0001/law-9780199639762 The Charter of the United Nations: A Commentary]'' (3rd edn, OUP 2012).
 
*Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199639762.001.0001/law-9780199639762 The Charter of the United Nations: A Commentary]'' (3rd edn, OUP 2012).
 
*Rudiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, ''Looking to the Future: Essays on International Law in Honor of Michael Reisman'' (Brill 2010).
 
*Rudiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, ''Looking to the Future: Essays on International Law in Honor of Michael Reisman'' (Brill 2010).
*Silja Vöneky, ‘Analogy in International Law’, in R Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
+
*Silja Vöneky, ‘Analogy in International Law’, in Rudiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
   
 
== Edited books and reference texts ==
 
== Edited books and reference texts ==
* MN Schmitt (ed), ''[https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations]'' (CUP 2017)
+
* Michael N Schmitt (ed), ''[https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations]'' (CUP 2017).
   
 
== Journal articles ==
 
== Journal articles ==
 
* Steven Bellovin, Susan Landau and Herbert Lin, ‘[https://academic.oup.com/cybersecurity/article/3/1/59/3097802 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications]’ (2017) 3(1) Journal of Cybersecurity 59.
 
* Steven Bellovin, Susan Landau and Herbert Lin, ‘[https://academic.oup.com/cybersecurity/article/3/1/59/3097802 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications]’ (2017) 3(1) Journal of Cybersecurity 59.
 
*Duncan Blake and Joseph Imburgia, ‘“[https://ssrn.com/abstract=1850831 Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons]”’, (2010) 66 Air Force Law Review 157.
 
*Duncan Blake and Joseph Imburgia, ‘“[https://ssrn.com/abstract=1850831 Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons]”’, (2010) 66 Air Force Law Review 157.
*Vincent Boulanin and Maaike Verbruggen, ''[https://www.sipri.org/sites/default/files/2017-12/article_36_report_1712.pdf Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies]'' (SIPRI 2017).
+
*Vincent Boulanin and Maaike Verbruggen, ''[https://www.sipri.org/sites/default/files/2017-12/article_36_report_1712.pdf Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies]'' [2017] SIPRI.
*Mark Bromley, ‘[https://www.sipri.org/sites/default/files/2018-01/sipri1712_bromley.pdf Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation]’ (2017) SIPRI.
+
*Mark Bromley, ‘[https://www.sipri.org/sites/default/files/2018-01/sipri1712_bromley.pdf Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation]’ [2017] SIPRI.
 
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law & Policy 115.
 
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law & Policy 115.
*Gary Brown and Keira Poellet, ''‘''The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
+
*Gary Brown and Keira Poellet, ''‘''The Customary International Law of Cyberspace’ [2012] Strategic Studies Quarterly 137.
 
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
 
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
 
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
 
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
 
*Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 VA.J.INT’LL. 291.
 
*Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 VA.J.INT’LL. 291.
*Heather A Harrison Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 IsrLR 39.
+
*Heather H Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 IsrLR 39.
 
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
 
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
 
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL.
 
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL.
Line 55: Line 55:
 
*Jack Goldsmith, ‘''[http://www.ejil.org/pdfs/24/1/2374.pdf How Cyber Changes the Laws of War]''’ (2013) 24 EJIL 129.
 
*Jack Goldsmith, ‘''[http://www.ejil.org/pdfs/24/1/2374.pdf How Cyber Changes the Laws of War]''’ (2013) 24 EJIL 129.
 
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
 
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
*Erika Häger & Carolina Dackö, ‘[https://www.mannheimerswartling.se/globalassets/nyhetsbrev/msa_nyhetsbrev_economic_espionage_dec17_a4_final.pdf Economic Espionage: A Report by Mannheimer Swartling]’ (2018).
+
*Erika Häger and Carolina Dackö, ‘[https://www.mannheimerswartling.se/globalassets/nyhetsbrev/msa_nyhetsbrev_economic_espionage_dec17_a4_final.pdf Economic Espionage: A Report by Mannheimer Swartling]’ (2018).
*Fan O Hampson and Michael Sulmeyer (eds), ''Getting Beyond Norms'' (CIGI 2017).
+
*Fan O Hampson and Michael Sulmeyer (eds), ''Getting Beyond Norms'' [2017] CIGI .
 
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L. Stud. 123.
 
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L. Stud. 123.
 
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 N.C. J. INT'L L. & COM. REG. 443.
 
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 N.C. J. INT'L L. & COM. REG. 443.
Line 62: Line 62:
 
*Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
 
*Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
 
*Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
 
*Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
*K Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55.
+
*Kubo Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55.
 
*
 
*
 
*Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
 
*Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
Line 77: Line 77:
 
*Nicholas Tsagourias ''<nowiki>''</nowiki>''[https://doi.org/10.1093/jcsl/krs019 Cyber Attacks, Self-Defence and the Problem of Attribution]' (2012) 17 (2) Journal of Conflict and Security Law 23.
 
*Nicholas Tsagourias ''<nowiki>''</nowiki>''[https://doi.org/10.1093/jcsl/krs019 Cyber Attacks, Self-Defence and the Problem of Attribution]' (2012) 17 (2) Journal of Conflict and Security Law 23.
 
*David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP&#x20;11_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11.
 
*David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP&#x20;11_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11.
*Sean Watts & Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L. Rev. 771. <br />
+
*Sean Watts and Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L. Rev. 771. <br />
   
 
== International reports and other public documents ==
 
== International reports and other public documents ==
Line 86: Line 86:
 
*[https://treaties.un.org/doc/Publication/UNTS/Volume&#x20;974/volume-974-I-14118-english.pdf Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation] (signed 23 September 1971, entered into force 26 January 1973) 974 UNTS 178 (“Montreal Convention”).
 
*[https://treaties.un.org/doc/Publication/UNTS/Volume&#x20;974/volume-974-I-14118-english.pdf Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation] (signed 23 September 1971, entered into force 26 January 1973) 974 UNTS 178 (“Montreal Convention”).
 
*Council of Europe, [https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 Convention on Cybercrime] (adopted 23 November 2001, entered into force 1 July 2004).
 
*Council of Europe, [https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 Convention on Cybercrime] (adopted 23 November 2001, entered into force 1 July 2004).
*Council of the European Union, "[https://www.consilium.europa.eu/media/31666/st14435en17.pdf Council Conclusions on the Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU]" (Council conclusions, 20 November 2017),
+
*Council of the European Union, "[https://www.consilium.europa.eu/media/31666/st14435en17.pdf Council Conclusions on the Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU]" (Council conclusions, 20 November 2017).
 
*Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a [https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:02009R0428-20171216 Community regime for the control of exports, transfer, brokering and transit of dual-use items] consolidated version as of 16 December 2017.
 
*Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a [https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:02009R0428-20171216 Community regime for the control of exports, transfer, brokering and transit of dual-use items] consolidated version as of 16 December 2017.
 
*[https://rm.coe.int/16800cce5b Documents of the United Nations Conference on International Organization] (1945), vol VI, Explanatory Report to the Convention on Cybercrime.
 
*[https://rm.coe.int/16800cce5b Documents of the United Nations Conference on International Organization] (1945), vol VI, Explanatory Report to the Convention on Cybercrime.
 
*[https://www.mofa.go.jp/files/000160279.pdf G7 Principles and Actions on Cyber] (Annex to the Ise-Shima Declaration from 27 May 2016).
 
*[https://www.mofa.go.jp/files/000160279.pdf G7 Principles and Actions on Cyber] (Annex to the Ise-Shima Declaration from 27 May 2016).
*[https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2011_05/20110926_110526-G8-Summit-Deauville.pdf G8 ''Summit of Deauville, Declaration: Renewed Commitment for Freedom and Democracy''] (27 May 2011),
+
*[https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2011_05/20110926_110526-G8-Summit-Deauville.pdf G8 ''Summit of Deauville, Declaration: Renewed Commitment for Freedom and Democracy''] (27 May 2011).
 
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf Draft Articles on Responsibility of States for Internationally Wrongful Acts], with commentaries, Yearbook of the ILC (2001).
 
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf Draft Articles on Responsibility of States for Internationally Wrongful Acts], with commentaries, Yearbook of the ILC (2001).
 
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_11_2011.pdf Draft Articles on the Responsibility of International Organizations], with commentaries, Yearbook of the ILC (2011).
 
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_11_2011.pdf Draft Articles on the Responsibility of International Organizations], with commentaries, Yearbook of the ILC (2011).
Line 99: Line 99:
 
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts] (Protocol 1) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 3.
 
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts] (Protocol 1) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 3.
 
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts] (Protocol II) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 609.
 
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts] (Protocol II) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 609.
*'[http://legal.un.org/ilc/documentation/english/a_cn4_534.pdf Sixth report on unilateral acts of States]' (30 May 2003) (by Mr. Victor Rodríguez Cedeño, Special Rapporteur) UN Doc A/CN.4/534 58.   
+
*'[http://legal.un.org/ilc/documentation/english/a_cn4_534.pdf Sixth report on unilateral acts of States]' (30 May 2003) by Victor Rodríguez Cedeño, Special Rapporteur, UN Doc A/CN.4/534 58.   
 
*The International Law Commission, 'Document A/6309/ Rev.1: Reports of the International Law Commission on the second part of its seventeenth and on its eighteenth session' [http://legal.un.org/ilc/publications/yearbooks/english/ilc_1966_v2.pdf Yearbook of the International Law Commission Vol. II] (1966) 247.
 
*The International Law Commission, 'Document A/6309/ Rev.1: Reports of the International Law Commission on the second part of its seventeenth and on its eighteenth session' [http://legal.un.org/ilc/publications/yearbooks/english/ilc_1966_v2.pdf Yearbook of the International Law Commission Vol. II] (1966) 247.
 
*UN GA Res 2625 (XXV) (24 October 1970) (Friendly Relations Declaration).
 
*UN GA Res 2625 (XXV) (24 October 1970) (Friendly Relations Declaration).
 
*UN GA Res 55/63 (4 December 2000), Doc A/RES/55/63.
 
*UN GA Res 55/63 (4 December 2000), Doc A/RES/55/63.
 
*UN GGE 2015 '[https://documents-dds-ny.un.org/doc/UNDOC/GEN/N15/228/35/PDF/N1522835.pdf?OpenElement Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security report]' (22 July 2015) UN Doc A/70/174.
 
*UN GGE 2015 '[https://documents-dds-ny.un.org/doc/UNDOC/GEN/N15/228/35/PDF/N1522835.pdf?OpenElement Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security report]' (22 July 2015) UN Doc A/70/174.
*UN GGE 2015 report.
 
 
*UN Human Rights Committee, ‘[http://docstore.ohchr.org/SelfServices/FilesHandler.ashx?enc=6QkG1d%2fPPRiCAqhKb7yhsjYoiCfMKoIRv2FVaVzRkMjTnjRO%2bfud3cPVrcM9YR0iW6Txaxgp3f9kUFpWoq%2fhW%2fTpKi2tPhZsbEJw%2fGeZRASjdFuuJQRnbJEaUhby31WiQPl2mLFDe6ZSwMMvmQGVHA%3d%3d General Comment No. 31 (80): The Nature of the General Legal Obligation Imposed on States Parties to the Covenant]’ (adopted on 29 March 2004, 2187th meeting).
 
*UN Human Rights Committee, ‘[http://docstore.ohchr.org/SelfServices/FilesHandler.ashx?enc=6QkG1d%2fPPRiCAqhKb7yhsjYoiCfMKoIRv2FVaVzRkMjTnjRO%2bfud3cPVrcM9YR0iW6Txaxgp3f9kUFpWoq%2fhW%2fTpKi2tPhZsbEJw%2fGeZRASjdFuuJQRnbJEaUhby31WiQPl2mLFDe6ZSwMMvmQGVHA%3d%3d General Comment No. 31 (80): The Nature of the General Legal Obligation Imposed on States Parties to the Covenant]’ (adopted on 29 March 2004, 2187th meeting).
 
*UN Human Rights Committee, ''Summary Record of the 1405th Meeting,'' CCPR/C/SR.1405 (31 March 1995) 6.
 
*UN Human Rights Committee, ''Summary Record of the 1405th Meeting,'' CCPR/C/SR.1405 (31 March 1995) 6.
*UN Human Rights Committee, [https://www2.ohchr.org/english/bodies/hrc/docs/gc34.pdf ICCPR General Comment No. 34] (12 September 2011)
+
*UN Human Rights Committee, [https://www2.ohchr.org/english/bodies/hrc/docs/gc34.pdf ICCPR General Comment No. 34] (12 September 2011).
 
*UN SC, [http://daccess-ods.un.org/access.nsf/GetFile?OpenAgent&DS=S/RES/2321(2016)&Lang=E&Type=DOC Resolution 2321] (2016) Adopted by the Security Council at its 7821st meeting, on 30 November 2016.
 
*UN SC, [http://daccess-ods.un.org/access.nsf/GetFile?OpenAgent&DS=S/RES/2321(2016)&Lang=E&Type=DOC Resolution 2321] (2016) Adopted by the Security Council at its 7821st meeting, on 30 November 2016.
 
*UNGA ‘[http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174 Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security]’ (22 July 2015), A/70/174.
 
*UNGA ‘[http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174 Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security]’ (22 July 2015), A/70/174.
Line 125: Line 124:
 
*[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf G20 Leaders’ Communiqué] (15–16 November 2015).
 
*[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf G20 Leaders’ Communiqué] (15–16 November 2015).
 
*Tim Maurer and Michael Schmitt, ‘[https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?]’ ''Just Security,'' 14th August 2017.
 
*Tim Maurer and Michael Schmitt, ‘[https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?]’ ''Just Security,'' 14th August 2017.
*North Atlantic Treaty Organization, '[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]' (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales (5 September 2015).
+
*North Atlantic Treaty Organization, '[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]' issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales (5 September 2015).
 
*President of the United States, [https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’] (2011).
 
*President of the United States, [https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’] (2011).
 
*‘President Xi Jinping’s State Visit to the United States: [https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states FACT SHEET]: ’ (25 September 2015).
 
*‘President Xi Jinping’s State Visit to the United States: [https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states FACT SHEET]: ’ (25 September 2015).
 
*Michael N Schmitt and Sean Fahey, ‘[https://www.justsecurity.org/50038/wannacry-international-law-cyberspace/ WannaCry and the International Law of Cyberspace]’, ''JustSecurity'', 22 December 2017.
 
*Michael N Schmitt and Sean Fahey, ‘[https://www.justsecurity.org/50038/wannacry-international-law-cyberspace/ WannaCry and the International Law of Cyberspace]’, ''JustSecurity'', 22 December 2017.
*Jeremy Wright, QC MP, UK Attorney General ‘[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]’ (23 May 2018) (‘The UK Government’s position is … that there is no such rule as a matter of current international law.’).
+
*Jeremy Wright, QC MP, UK Attorney General ‘[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]’ (23 May 2018).

Revision as of 23:12, 31 January 2019

(This page is currently under construction.)

Books and monographs

  • William H Boothby, The Law of Targeting (OUP 2012).
  • William H Boothby, Weapons and the Law of Armed Conflict (OUP 2016).
  • Oliver Corten, The Law against War (Hart Pub 2010).
  • James Crawford, Brownlie's Principles of Public International Law (OUP 2012).
  • James Crawford, State Responsibility: The General Part (CUP 2013).
  • Heather H Dinniss, Cyber Warfare and the Laws of War (CUP 2012).
  • Yoram Dinstein (ed), The Conduct of Hostilities under the Law of International Armed Conflict (CUP 2016).
  • Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014).
  • Christine Gray, International Law and the use of force (OUP 2018).
  • Joanna Kulesza, Due Diligence in International Law (Brill 2016).
  • Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018).
  • René Provost, International Human Rights and Humanitarian Law (CUP 2002).
  • Marco Roscini, Cyber Operations and the Use of Force in International Law (OUP 2014).
  • Gary D Solis, The Law of Armed Conflict: International Humanitarian Law in War (CUP 2016).
  • Nigel White, The Law of International Organizations (Juris 2005).
  • Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017) .

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Jean D’Aspremont, ‘Persona Non Grata’, in Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), The Law of International Responsibility (OUP 2010).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Rudiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Silja Vöneky, ‘Analogy in International Law’, in Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).

Edited books and reference texts

Journal articles

International reports and other public documents

Newspaper articles and online news

Blog posts and other online sources