Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
No edit summary
(→‎Books and monographs: Added full bibliography)
Line 2: Line 2:
   
 
== Books and monographs ==
 
== Books and monographs ==
* H Harrison Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012)
+
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
  +
*William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016).
  +
*Oliver Corten, ''The Law against War'' (Hart Pub. 2010).
  +
*James Crawford, ''Brownlie's Principles of Public International Law'' (OUP 2012).
  +
*James Crawford, ''State Responsibility: The General Part'' (CUP 2013).
  +
*H Harrison Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012)
  +
*Yoram Dinstein (ed), ''[https://doi.org/10.1017/CBO9781316389591 The Conduct of Hostilities under the Law of International Armed Conflict]'' (CUP 2016).
  +
*Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
  +
*Christine Gray, ''International Law and the use of force'' (OUP 2018).
  +
*Joanna Kulesza, ''Due Diligence in International Law'' (Brill 2016) 266.
  +
*Kubo Mačák, ''[http://www.oxfordscholarship.com/view/10.1093/oso/9780198819868.001.0001/oso-9780198819868 Internationalized Armed Conflicts in International Law]'' (OUP 2018).
  +
*René Provost, ''International Human Rights and Humanitarian Law'' (CUP 2002)
  +
*Marco Roscini, ''Cyber Operations and the Use of Force in International Law'' (OUP 2014).
  +
*Gary D. Solis, ''The Law of Armed Conflict: International Humanitarian Law in War'' (CUP 2016).
  +
*Nigel White, ''The Law of International Organizations'' (Juris 2005).
  +
*Rudiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
  +
*Noam Zamir, ''Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars'' (Edward Elgar 2017) .
   
 
== Contributions to edited collections ==
 
== Contributions to edited collections ==
  +
* Russell Buchan, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_Ch4.pdf The International Legal Regulation of State-Sponsored Cyber Espionage]’ (2016) in Anna-Maria Osula and Henry Rõigas (Eds.) ''International Cyber Norms: Legal, Policy & Industry Perspectives'' (NATO CCD COE Publications, Tallinn 2016).
* T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016)
 
  +
*Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016).
  +
*Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199675449.001.0001/law-9780199675449 The 1949 Geneva Conventions: A Commentary]'' (OUP 2015).
  +
*Jean D’Aspremont, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e974 Persona Non Grata]’, in Rudiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
  +
*Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
  +
*Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) ''International Organizations and the Idea of Autonomy'' (Routledge 2011).
 
*T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), ''[https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention]'' (CUP 2016)
  +
*Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), ''Peacetime Regime for State Activities in Cyberspace'' (NATO CCD COE 2013).
  +
*Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), ''[http://opil.ouplaw.com/view/10.1093/law/9780199658800.001.0001/law-9780199658800 The Handbook of International Humanitarian Law]'' (3rd edn, OUP 2013).
  +
*Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), ''The Law of International Responsibility'' (OUP 2010).
  +
*Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
  +
*Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199639762.001.0001/law-9780199639762 The Charter of the United Nations: A Commentary]'' (3rd edn, OUP 2012).
  +
*Rudiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, ''Looking to the Future: Essays on International Law in Honor of Michael Reisman'' (Brill 2010).
  +
*Silja Vöneky, ‘Analogy in International Law’, in R Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
   
 
== Edited books and reference texts ==
 
== Edited books and reference texts ==
Line 11: Line 40:
   
 
== Journal articles ==
 
== Journal articles ==
  +
* Steven Bellovin, Susan Landau and Herbert Lin, ‘[https://academic.oup.com/cybersecurity/article/3/1/59/3097802 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications]’ (2017) 3(1) Journal of Cybersecurity 59.
* K Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55
 
  +
*Duncan Blake and Joseph Imburgia, ‘“[https://ssrn.com/abstract=1850831 Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons]”’, (2010) 66 Air Force Law Review 157.
  +
*Vincent Boulanin and Maaike Verbruggen, ''[https://www.sipri.org/sites/default/files/2017-12/article_36_report_1712.pdf Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies]'' (SIPRI 2017).
  +
*Mark Bromley, ‘[https://www.sipri.org/sites/default/files/2018-01/sipri1712_bromley.pdf Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation]’ (2017) SIPRI.
  +
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law & Policy 115.
  +
*Gary Brown and Keira Poellet, ''‘''The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
  +
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
  +
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
  +
*Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 VA.J.INT’LL. 291.
  +
*Heather A Harrison Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 IsrLR 39.
  +
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
  +
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL.
  +
*David Fidler, ‘[https://www.asil.org/insights/volume/17/issue/10/economic-cyber-espionage-and-international-law-controversies-involving Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies]’ (2013) 17/10 ASIL Insights.
  +
*Jack Goldsmith, ‘''[http://www.ejil.org/pdfs/24/1/2374.pdf How Cyber Changes the Laws of War]''’ (2013) 24 EJIL 129.
  +
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
  +
*Erika Häger & Carolina Dackö, ‘[https://www.mannheimerswartling.se/globalassets/nyhetsbrev/msa_nyhetsbrev_economic_espionage_dec17_a4_final.pdf Economic Espionage: A Report by Mannheimer Swartling]’ (2018).
  +
*Fan O Hampson and Michael Sulmeyer (eds), ''Getting Beyond Norms'' (CIGI 2017).
  +
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L. Stud. 123.
  +
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 N.C. J. INT'L L. & COM. REG. 443.
  +
*Noam Lubell, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 Int’l L Studies 252.
  +
*Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
  +
*Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
 
*K Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55
  +
*
  +
*Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
  +
*Tim Maurer and Michael Schmitt, ‘[https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?]’ ''Just Security,'' 14th August 2017.
  +
*Marko Milanovic, ‘[http://www.harvardilj.org/wp-content/uploads/561Milanovic.pdf Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age]’ (2015) 56/1 HarvIntlLJ
  +
*Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807
  +
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
  +
*Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
  +
*Michael N. Schmitt, ‘[https://puc.overheid.nl/mrt/doc/PUC_248137_11/ International Cyber Norms: Reflections on the Path Ahead]’ (2018) 111 Netherlands’ Military Law Review 12.
  +
*Michael N Schmitt, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=83 The Notion of ‘Objects’ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision]’ (2015) 48 IsrLR 81.
  +
*Michael N Schmitt, '[https://heinonline.org/HOL/P?h=hein.journals/cjil19&i=36 Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law]' (2018) 19 ChiJIntlL 30.
  +
*Michael N Schmitt and Jeffrey Biller, ‘[https://www.ejiltalk.org/the-notpetya-cyber-operation-as-a-case-study-of-international-law/ The NotPetya Cyber Operation as a Case Study of International Law]’, ''EJIL: Talk!'', 11 July 2017.
  +
*Michael N Schmitt and Sean Fahey, ‘[https://www.justsecurity.org/50038/wannacry-international-law-cyberspace/ WannaCry and the International Law of Cyberspace]’, ''JustSecurity'', 22 December 2017.
  +
*Michael N. Schmitt and Sean Watts, ‘[https://heinonline.org/HOL/P?h=hein.journals/tilj50&i=217 The Decline of International Humanitarian Law ''Opinio Juris'' and the Law of Cyber Warfare]’ (2015) 50 TexIntlLJ 189.
  +
*Michael N Schmitt and Liis Vihul, ‘[https://texaslawreview.org/respect-sovereignty-cyberspace/ Respect for Sovereignty in Cyberspace]’ (2017) 95 Tex L Rev. 1639.
  +
*Nicholas Tsagourias ''<nowiki>''</nowiki>''[https://doi.org/10.1093/jcsl/krs019 Cyber Attacks, Self-Defence and the Problem of Attribution]' (2012) 17 (2) Journal of Conflict and Security Law 23.
  +
*David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP&#x20;11_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11.
  +
*Sean Watts & Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L. Rev. 771. <br />
   
 
== International reports and other public documents ==
 
== International reports and other public documents ==

Revision as of 09:43, 31 January 2019

(This page is currently under construction.)

Books and monographs

  • William H Boothby, The Law of Targeting (OUP 2012).
  • William H Boothby, Weapons and the Law of Armed Conflict (OUP 2016).
  • Oliver Corten, The Law against War (Hart Pub. 2010).
  • James Crawford, Brownlie's Principles of Public International Law (OUP 2012).
  • James Crawford, State Responsibility: The General Part (CUP 2013).
  • H Harrison Dinniss, Cyber Warfare and the Laws of War (CUP 2012)
  • Yoram Dinstein (ed), The Conduct of Hostilities under the Law of International Armed Conflict (CUP 2016).
  • Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014).
  • Christine Gray, International Law and the use of force (OUP 2018).
  • Joanna Kulesza, Due Diligence in International Law (Brill 2016) 266.
  • Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018).
  • René Provost, International Human Rights and Humanitarian Law (CUP 2002)
  • Marco Roscini, Cyber Operations and the Use of Force in International Law (OUP 2014).
  • Gary D. Solis, The Law of Armed Conflict: International Humanitarian Law in War (CUP 2016).
  • Nigel White, The Law of International Organizations (Juris 2005).
  • Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017) .

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (Eds.) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Jean D’Aspremont, ‘Persona Non Grata’, in Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016)
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), The Law of International Responsibility (OUP 2010).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Rudiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Silja Vöneky, ‘Analogy in International Law’, in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).

Edited books and reference texts

Journal articles

International reports and other public documents

  • [TBC]

Newspaper articles and online news

  • [TBC]

Blog posts and other online sources

  • [TBC]