Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
No edit summary
Line 4: Line 4:
 
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
 
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
 
*William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016).
 
*William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016).
  +
*Ian Brownlie, ''[http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780198251583.001.0001/acprof-9780198251583 International Law and the Use of Force by States]'' (OUP 1963).
 
*Oliver Corten, ''The Law against War'' (Hart Pub 2010).
 
*Oliver Corten, ''The Law against War'' (Hart Pub 2010).
 
*James Crawford, ''Brownlie's Principles of Public International Law'' (OUP 2012).
 
*James Crawford, ''Brownlie's Principles of Public International Law'' (OUP 2012).
Line 60: Line 61:
 
*Erika Häger and Carolina Dackö, ‘[https://www.mannheimerswartling.se/globalassets/nyhetsbrev/msa_nyhetsbrev_economic_espionage_dec17_a4_final.pdf Economic Espionage: A Report by Mannheimer Swartling]’ (2018).
 
*Erika Häger and Carolina Dackö, ‘[https://www.mannheimerswartling.se/globalassets/nyhetsbrev/msa_nyhetsbrev_economic_espionage_dec17_a4_final.pdf Economic Espionage: A Report by Mannheimer Swartling]’ (2018).
 
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
 
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
  +
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
 
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 NCJ Int'l L & Com Reg 443.
 
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 NCJ Int'l L & Com Reg 443.
 
*Noam Lubell, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 Int’l L Stud 252.
 
*Noam Lubell, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 Int’l L Stud 252.

Revision as of 12:42, 2 February 2019

(This page is currently under construction.)

Books and monographs

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Jean D’Aspremont, ‘Persona Non Grata’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), The Law of International Responsibility (OUP 2010).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Silja Vöneky, ‘Analogy in International Law’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).

Edited books and reference texts

Journal articles

International treaties, reports and other public documents

Blog posts and other online sources