Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
No edit summary
Line 58: Line 58:
 
*Waldemar A Solf, ‘Article 39: Emblems of Nationality’ in Michael Bothe and others (eds), ''New Rules for Victims of Armed Conflicts'' (Brill 1982).
 
*Waldemar A Solf, ‘Article 39: Emblems of Nationality’ in Michael Bothe and others (eds), ''New Rules for Victims of Armed Conflicts'' (Brill 1982).
 
*Yoshifumi Tanaka, ‘Navigational Rights and Freedoms’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), ''[https://www.oxfordhandbooks.com/view/10.1093/law/9780198715481.001.0001/oxfordhb-9780198715481 The Oxford Handbook of the Law of the Sea]'' (OUP 2015).
 
*Yoshifumi Tanaka, ‘Navigational Rights and Freedoms’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), ''[https://www.oxfordhandbooks.com/view/10.1093/law/9780198715481.001.0001/oxfordhb-9780198715481 The Oxford Handbook of the Law of the Sea]'' (OUP 2015).
  +
* Sabine Von Schorlemer, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e998 Telecommunications, international regulation]’ in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated March 2009)
 
*Silja Vöneky, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1375 Analogy in International Law]’ in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
 
*Silja Vöneky, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1375 Analogy in International Law]’ in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008).
 
*Sean Watts, ‘The Notion of Combatancy in Cyber Warfare’, in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), <i>4th International Conference on Cyber Conflict</i> (NATO CCD COE 2012).
 
*Sean Watts, ‘The Notion of Combatancy in Cyber Warfare’, in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), <i>4th International Conference on Cyber Conflict</i> (NATO CCD COE 2012).
  +
* Rolf Weber, ‘A Legal Lens into Internet Governance’, in Laura DeNardis and others (eds), <i>Researching Internet Governance: Methods, Frameworks, Futures</i> (MIT Press 2020).
 
*Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, ''Looking to the Future: Essays on International Law in Honor of Michael Reisman'' (Brill 2010).
 
*Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, ''Looking to the Future: Essays on International Law in Honor of Michael Reisman'' (Brill 2010).
 
*Katja Ziegler, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1398 Domaine Réservé]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2013).
 
*Katja Ziegler, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1398 Domaine Réservé]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2013).
Line 79: Line 81:
 
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law and Policy 115.
 
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law and Policy 115.
 
*Gary Brown and Keira Poellet, ''‘''The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
 
*Gary Brown and Keira Poellet, ''‘''The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
  +
* Russell Buchan, ‘[https://eprints.whiterose.ac.uk/103386/11/Buchan%20FINAL%20Cyberspace.pdf Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm]’ (2016) 21(3) JCSL 429.
*Russell Buchan, ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’ (2012) 17 Journal of Conflict and Security Law 212.
+
*Russell Buchan, ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’ (2012) 17 JCSL 212.
 
*Elena Chachko, ‘Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’ (2019) 44 Yale Journal of International Law 1.
 
*Elena Chachko, ‘Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’ (2019) 44 Yale Journal of International Law 1.
 
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
 
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
Line 96: Line 99:
 
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
 
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
 
*Maziar Jamnejad and Michael Wood, ‘Prohibition of Intervention’ (2009) 22 LJIL 345.
 
*Maziar Jamnejad and Michael Wood, ‘Prohibition of Intervention’ (2009) 22 LJIL 345.
  +
* Ido Kilovaty, ‘[https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=1116&context=ndjicl An extra-territorial human right to cybersecurity]’ (2020) 10 Notre Dame Journal of International and Comparative Law 35.
 
*Jeff Kosseff, ‘Collective Countermeasures in Cyberspace’ (2020) 10 Notre Dame Journal of International and Comparative Law 1.
 
*Jeff Kosseff, ‘Collective Countermeasures in Cyberspace’ (2020) 10 Notre Dame Journal of International and Comparative Law 1.
 
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
 
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
Line 104: Line 108:
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0922156517000358 From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers]’ (2017) 30 LJIL 877.
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0922156517000358 From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers]’ (2017) 30 LJIL 877.
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55.
 
*Kubo Mačák, ‘[https://doi.org/10.1017/S0021223714000260 Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law]’ (2015) 48 Isr L Rev 55.
  +
* Peter Margulies, ‘[https://scholarship.law.ufl.edu/flr/vol68/iss4/3/ Surveillance by Algorithm: The NSA, Computerized Intelligence Collection and Human Rights]’ (2016) 68 Fla. L. Rev. 1084.
 
* Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
 
* Peter Margulies, '[https://law.unimelb.edu.au/__data/assets/pdf_file/0006/1687488/05Margulies-Depaginated.pdf Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility]' (2013) 14 MJIL.
 
*John Merriam, ‘Affirmative Target Identification, Operationalizing the Principle of Distinction for U.S. Warfighters’ (2015) 56 Virginia JIL 83.
 
*John Merriam, ‘Affirmative Target Identification, Operationalizing the Principle of Distinction for U.S. Warfighters’ (2015) 56 Virginia JIL 83.
Line 121: Line 126:
 
*Michael N Schmitt and Liis Vihul, ‘[https://texaslawreview.org/respect-sovereignty-cyberspace/ Respect for Sovereignty in Cyberspace]’ (2017) 95 Tex L Rev. 1639.
 
*Michael N Schmitt and Liis Vihul, ‘[https://texaslawreview.org/respect-sovereignty-cyberspace/ Respect for Sovereignty in Cyberspace]’ (2017) 95 Tex L Rev. 1639.
 
*Nicholas Tsagourias ''<nowiki/>'''[https://doi.org/10.1093/jcsl/krs019 Cyber Attacks, Self-Defence and the Problem of Attribution]' (2012) 17 (2) JCSL 23.
 
*Nicholas Tsagourias ''<nowiki/>'''[https://doi.org/10.1093/jcsl/krs019 Cyber Attacks, Self-Defence and the Problem of Attribution]' (2012) 17 (2) JCSL 23.
  +
* Beth Van Schaack, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1011&context=ils The United States' position on the extra-territorial application of human rights obligations: Now is the time for change]’ (2014) 90 Int’l L Stud 20.
 
*David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP&#x20;11_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11.
 
*David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP&#x20;11_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11.
  +
* Beatrice A. Walton, ‘[https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=5798&context=ylj Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law]’ (2017) 126 YaleLJ 1460.
*Sean Watts and Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L Rev. 771.
+
*Sean Watts and Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L Rev. 771.
   
 
== International treaties, reports and other public documents ==
 
== International treaties, reports and other public documents ==
Line 172: Line 179:
 
* James Clapper, US, Director of National Intelligence, [https://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf Worldwide Threat Assessment of the US Intelligence Community] (26 February 2015).
 
* James Clapper, US, Director of National Intelligence, [https://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf Worldwide Threat Assessment of the US Intelligence Community] (26 February 2015).
 
*Brian Egan, US, State Department Legal Advisor, [https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf International Law and Stability in Cyberspace], Speech at Berkeley Law School (10 November 2016).
 
*Brian Egan, US, State Department Legal Advisor, [https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf International Law and Stability in Cyberspace], Speech at Berkeley Law School (10 November 2016).
*Brian Egan, State Department Legal Adviser, “[https://digital-commons.usnwc.edu/ils/vol92/iss1/7/ Remarks to the American Society of International Law: International Law, Legal Diplomacy, and the Counter-ISIL Campaign]” (1 April 2016).
+
*Brian Egan, State Department Legal Advisor, “[https://digital-commons.usnwc.edu/ils/vol92/iss1/7/ Remarks to the American Society of International Law: International Law, Legal Diplomacy, and the Counter-ISIL Campaign]” (1 April 2016).
 
*[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf G20 Leaders’ Communiqué] (15–16 November 2015).
 
*[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf G20 Leaders’ Communiqué] (15–16 November 2015).
  +
* Alexander Gamero-Garrido and others, ‘[https://www.caida.org/workshops/aims/1904/slides/aims1904_agamero-handout.pdf Inferring Country-Level Transit Influence of Autonomous Systems]’ (on Active Internet Measurement Systems Conference, San Diego April 2019)
  +
* Internet Society, ‘[https://www.internetsociety.org/policybriefs/internet-shutdowns Policy brief: Internet Shutdowns]’ (<i>Internet Society</i>, 18 December 2019).
  +
* Vinit Jain and Brad Edgeworth, <i>[https://www.ciscopress.com/articles/article.asp?p=2756480&seqNum=6 Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP]</i>, (Cisco Press 2017).
 
*Tim Maurer and Michael Schmitt, ‘[https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?]’ ''Just Security,'' 14 August 2017.
 
*Tim Maurer and Michael Schmitt, ‘[https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?]’ ''Just Security,'' 14 August 2017.
 
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
 
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).

Revision as of 09:12, 15 October 2021

Bibliography.jpg

Books and monographs

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron and others, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Gary P. Corn and Peter P. Pascucci, ‘The Law of Armed Conflict Implications of Covered or Concealed Cyber Operations: Perfidy, Ruses, and the Principle of Passive Distinction’ in Ronald T. P. Alcala and Eric T. Jensen (eds), The Impact of Emerging Technologies on the Law of Armed Conflict (OUP 2019).
  • Jean D’Aspremont, ‘Persona Non Grata’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecht Randelzhofer, ‘Article 2(4)’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’ in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Hans-Peter Gasser and Knut Dörmann, ‘Protection of Civilian Population’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Terry D. Gill, ‘Non-intervention in the Cyber Context’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Douglas Guilfoyle, ‘The High Seas’ (2015) in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Wolff Heintschel von Heinegg, ‘Warships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated October 2015)
  • Albert J. Hoffmann, ‘Freedom of Navigation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2011).
  • Knut Ipsen, ‘Combatants and Non-Combatants’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Jan K. Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Jeff Kosseff, ‘Retorsion as a Response to Ongoing Cyber Operations’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
  • Natalie Klein, ‘Maritime Security’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Doris König, ‘Flag of Ships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2009).
  • Philip Kunig, ‘Prohibition of Intervention’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2008).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), The Law of International Responsibility (OUP 2010).
  • Nils Melzer, ‘Cyber Operations and jus in bello’ in Kerstin Vignard (ed), Confronting Cyberconflict (UNIDIR 2011).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
  • Przemysław Roguski, ‘Collective Countermeasures in Cyberspace: Lex lata, Progressive Development or a Bad Idea?’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
  • Tassilo Singer, ‘Update to Revolving Door 2.0 – the Extension of the Period for Direct Participation in Hostilities Due to Autonomous Cyber Weapons’ in Henry Rõigas and others (eds), 9th International Conference on Cyber Conflict: Defending the Core (NATO CCD COE 2017).
  • Waldemar A Solf, ‘Article 37: Prohibition of Perfidy’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Waldemar A Solf, ‘Article 38: Recognized Emblems’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Waldemar A Solf, ‘Article 39: Emblems of Nationality’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Yoshifumi Tanaka, ‘Navigational Rights and Freedoms’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Sabine Von Schorlemer, ‘Telecommunications, international regulation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated March 2009)
  • Silja Vöneky, ‘Analogy in International Law’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Sean Watts, ‘The Notion of Combatancy in Cyber Warfare’, in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
  • Rolf Weber, ‘A Legal Lens into Internet Governance’, in Laura DeNardis and others (eds), Researching Internet Governance: Methods, Frameworks, Futures (MIT Press 2020).
  • Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Katja Ziegler, ‘Domaine Réservé’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2013).

Edited books and reference texts

Journal articles

International treaties, reports and other public documents

Blog posts and other online sources