Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
(→‎Journal articles: Added sources)
Line 25: Line 25:
 
* Nigel White, ''The Law of International Organizations'' (Juris 2005).
 
* Nigel White, ''The Law of International Organizations'' (Juris 2005).
 
* Noam Zamir, ''Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars'' (Edward Elgar 2017) .
 
* Noam Zamir, ''Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars'' (Edward Elgar 2017) .
  +
* Kristin E. Heckman and others, [https://link.springer.com/book/10.1007/978-3-319-25133-2 Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defence] (Springer 2015)
  +
* Geoffrey S. Corn and others, [https://www.aspenpublishing.com/Corn-Conflict2#:~:text=The%20Law%20of%20Armed%20Conflict%3A%20An%20Operational%20Approach%20covers%20all,in%20regulation%20of%20military%20operations. The Law of Armed Conflict: An Operational Approach] (2nd edn, Wolters Kluwer 2019)
   
 
== Contributions to edited collections ==
 
== Contributions to edited collections ==
Line 64: Line 66:
 
*Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, ''Looking to the Future: Essays on International Law in Honor of Michael Reisman'' (Brill 2010).
 
*Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, ''Looking to the Future: Essays on International Law in Honor of Michael Reisman'' (Brill 2010).
 
*Katja Ziegler, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1398 Domaine Réservé]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2013).
 
*Katja Ziegler, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1398 Domaine Réservé]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2013).
  +
*Christian Dominicé, ‘Attribution of Conduct to Multiple States and the Implication of a State in the Act of Another State’ in James Crawford and others (eds), [https://opil.ouplaw.com/view/10.1093/law/9780199296972.001.0001/law-9780199296972 The Law of International Responsibility] (OUP 2010).
  +
*James Crawford, ‘[http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1093 State Responsibility]’ in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  +
*Marcelo Kohen, ‘The Court’s Contribution to Determining the Content of Fundamental Principles of International Law’ in Giorgio Gaja and Jenny Grote Stoutenburg (eds), [https://brill.com/view/title/25461 Enhancing the Rule of Law through the International Court of Justice] (Brill 2012).
  +
*Michael N Schmitt, ‘The Use of Cyber Force and International Law’ in Marc Weller (ed), [https://www.oxfordhandbooks.com/view/10.1093/law/9780199673049.001.0001/oxfordhb-9780199673049 Oxford Handbook on the Use of Force in International Law] (OUP 2015).
  +
*Robin Geiss, ‘The Obligation to Respect and to Ensure Respect for the Conventions’ in Andrew Clapham, Paola Gaeta and Marco Sassòli (eds), [https://opil.ouplaw.com/view/10.1093/law/9780199675449.001.0001/law-9780199675449 The 1949 Geneva Conventions: A Commentary] (OUP 2015).
  +
*Jeffrey Biller, ‘The Misuse of Protected Indicators in Cyberspace: Defending a Core Aspect of International Humanitarian Law’ in Henry Rõigas and others (eds), [https://ccdcoe.org/uploads/2018/10/CyCon_2017_book.pdf Defending the Core] (CCD COE 2017).
  +
*Kai Ambos, ‘International Criminal Responsibility in Cyberspace’ in Nicholas Tsagourias and Russell Buchan (eds), [https://www.e-elgar.com/shop/gbp/research-handbook-on-international-law-and-cyberspace-9781782547389.html Research Handbook on International Law and Cyberspace] (Edward Elgar 2015).
  +
*Wibke Timmermann and William A. Schabas, ‘Incitement to Genocide’ in Paul Behrens and Ralph Henham (eds), [https://www.routledge.com/Elements-of-Genocide/Behrens-Henham/p/book/9781138784710 Elements of Genocide] (Routledge 2013).
   
 
== Edited books and reference texts ==
 
== Edited books and reference texts ==
Line 72: Line 82:
 
*Bruno Simma and others (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Bruno Simma and others (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
 
*Rüdiger Wolfrum (ed), ''[http://opil.ouplaw.com/home/EPIL Max Planck Encyclopedia of Public International Law]'' (OUP 2008).
 
*Rüdiger Wolfrum (ed), ''[http://opil.ouplaw.com/home/EPIL Max Planck Encyclopedia of Public International Law]'' (OUP 2008).
  +
*Geoffrey S. Corn, Rachel E. VanLandingham and Shane R. Reeves (eds), [https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199328574.001.0001/acprof-9780199328574 U.S. Military Operations: Law, Policy, and Practice] (OUP 2015).
  +
*Yves Sandoz, Christophe Swinarski, and Bruno Zimmermann (eds), [https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/vwTreaties1949.xsp Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949] (ICRC 1987)
   
 
== Journal articles ==
 
== Journal articles ==
Line 130: Line 142:
 
* Beatrice A. Walton, ‘[https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=5798&context=ylj Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law]’ (2017) 126 YaleLJ 1460.
 
* Beatrice A. Walton, ‘[https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=5798&context=ylj Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law]’ (2017) 126 YaleLJ 1460.
 
*Sean Watts and Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L Rev. 771.
 
*Sean Watts and Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L Rev. 771.
  +
*Laurent Gisel, Tilman Rodenhäuser and Knut Dörmann, ‘[https://international-review.icrc.org/articles/twenty-years-ihl-effects-of-cyber-operations-during-armed-conflicts?utm_source=internal_newsletter&utm_medium=mail&utm_campaign=Homeanitarian_Sep4&utm_content=Review_cyber_IHL Twenty years on: International humanitarian law and the protection of civilians against the effects of cyber operations during armed conflicts]’ (2020) 102 IRRC 913.
  +
*Marko Milanovic and Michael N Schmitt, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3612019 Cyber Attacks and Cyber (Mis)information Operations during a Pandemic]’, (2020) 11 Journal of National Security Law & Policy 247.
  +
*Harriet Moynihan, ‘[https://doi.org/10.1080/23738871.2020.1832550 The Vital Role of International Law in the Framework for Responsible State Behaviour in Cyberspace]’ (2020) 5 Journal of Cyber Policy.
  +
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611753 Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations]’ (2015) 50 Texas International Law Journal 1.
  +
*William Banks, ‘[https://texaslawreview.org/state-responsibility-attribution-cyber-intrusions-tallinn-2-0/ State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0]’ (2017) 95 Tex. L. Rev. 1487.
  +
*Tomohiro Mikanagi and Kubo Mačák, ‘[https://www.elgaronline.com/view/journals/cilj/9-1/cilj.2020.01.03.xml Attribution of Cyber Operations: An International Law Perspective on the Park Jin Hyok case]’ (2020) 9 Cambridge Int’l L, J. 51.
  +
*Massimo Marelli, ‘[https://international-review.icrc.org/sites/default/files/reviews-pdf/2021-03/hacking-humanitarians-cyber-security-strategy-international-humanitarian-organizations-913.pdf Hacking humanitarians: Defining the cyber perimeter and developing a cyber security strategy for international humanitarian organizations in digital transformation]’ (2020) 102 (913) IRRC 367.
  +
*Eric Talbot Jensen and Sean Watts, ‘[https://texaslawreview.org/wp-content/uploads/2017/11/Jensen.Watts_..pdf A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer]’ (2017) 95 Tex. L. Rev. 1555.
  +
*Christian Payne and Lorraine Finlay, ‘[https://gwilr.org/wordpress/wp-content/uploads/2017/05/ILR-Vol-49.3_Panye-Finlay.pdf Addressing Obstacles to Cyber-Attribution]’, 49 Geo. Wash. Int’l L. Rev. 535 (2017).
  +
*Russell Buchan, ‘[https://academic.oup.com/chinesejil/article-abstract/15/4/741/2765117?redirectedFrom=fulltext Cyber Warfare and the Status of Anonymous under International Humanitarian Law]' (2016) Chinese JIL 741.
  +
*Kubo Mačák, ‘[https://doi.org/10.1080/23738871.2021.2014919 Unblurring the lines: military cyber operations and international law]’ (2021) 6(3) Journal of Cyber Policy 411
  +
*James Banks, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2129457 European Regulation of Cross-Border Hate Speech in Cyberspace: The Limits of Legislation]’ (2011) 19 Eur J Crime CrL & CrJ 1.
  +
*Andrey Fino, ‘[https://academic.oup.com/jicj/article/18/1/31/5858150 Defining Hate Speech – A Seemingly Elusive Task]’ (2020) 18 JICL 31.
  +
*Shannon Fyee, ‘[https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/abs/tracking-hate-speech-acts-as-incitement-to-genocide-in-international-criminal-law/671620A70B629DDE9C37E774CDEBAC65 Tracking Hate Speech Acts as Incitement to Genocide in International Criminal Law]’ (2017) 30 LJIL 523.
  +
*Gregory S Gordon, ‘[https://lawecommons.luc.edu/luclj/vol43/iss2/3/ Formulating a New Atrocity Speech Offense: Incitement to Commit War Crimes]’ (2012) 43 LoyUChiLJ 281.
  +
*Gregory S Gordon, ‘[https://scholarship.law.vanderbilt.edu/cgi/viewcontent.cgi?article=1251&context=vjtl Hate Speech and Persecution: A Contextual Approach]’ (2013) 46 VandJTransnatlL 303.
  +
*Wibke K Timmermann, ‘[https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/abs/relationship-between-hate-propaganda-and-incitement-to-genocide-a-new-trend-in-international-law-towards-criminalization-of-hate-propaganda/D658B2F64EC10371D96407154FDE5ED2 The Relationship between Hate Propaganda and Incitement to Genocide: A New Trend in International Law Towards Criminalization of Hate Propaganda?]’ (2005) 18 LJIL 257.
  +
*Richard A Wilson, ‘[https://repository.law.umich.edu/mjil/vol36/iss2/2/ Inciting Genocide with Words]’ (2015) 36 MichJIntlL 277.
  +
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3435439 Gravity in the Statute of the International Criminal Court and Cyber Conduct that Constitutes, Instigates or Facilitates International Crimes]’ (2019) 30 CrimLF 247.
   
 
== International treaties, reports and other public documents ==
 
== International treaties, reports and other public documents ==
Line 151: Line 182:
 
*ICRC, <i>[https://www.icrc.org/en/doc/assets/files/other/icrc-002-0990.pdf Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law]</i> (ICRC 2009).
 
*ICRC, <i>[https://www.icrc.org/en/doc/assets/files/other/icrc-002-0990.pdf Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law]</i> (ICRC 2009).
 
*ICRC, ''[https://shop.icrc.org/international-humanitarian-law-and-the-challenges-of-contemporary-armed-conflicts-recommitting-to-protection-in-armed-conflict-on-the-70th-anniversary-of-the-geneva-conventions-pdf-en International Humanitarian Law and the Challenges of Contemporary Armed Conflicts: Recommitting to Protection in Armed Conflict on the 70th Anniversary of the Geneva Conventions]'' (ICRC 2019).
 
*ICRC, ''[https://shop.icrc.org/international-humanitarian-law-and-the-challenges-of-contemporary-armed-conflicts-recommitting-to-protection-in-armed-conflict-on-the-70th-anniversary-of-the-geneva-conventions-pdf-en International Humanitarian Law and the Challenges of Contemporary Armed Conflicts: Recommitting to Protection in Armed Conflict on the 70th Anniversary of the Geneva Conventions]'' (ICRC 2019).
* ICRC, ''[https://shop.icrc.org/a-guide-to-the-legal-review-of-new-weapons-means-and-methods-of-warfare-pdf-en A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977]'' (Kathleen Lawand (ed), ICRC 2006).
+
*ICRC, ''[https://shop.icrc.org/a-guide-to-the-legal-review-of-new-weapons-means-and-methods-of-warfare-pdf-en A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977]'' (Kathleen Lawand (ed), ICRC 2006).
  +
*ICRC, ‘[http://www.icrc.org/en/download/file/108983/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf International Humanitarian Law and Cyber Operations during Armed Conflicts: ICRC Position Paper]’ (November 2019).
  +
*ICRC (ed), [https://doi.org/10.1017/9781316755709 Commentary on the First Geneva Convention] (CUP 2016).
 
*Organization for Security and Cooperation in Europe, ''[https://www.osce.org/pc/227281?download=true Decision No. 1202, OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies]'' (Permanent Council, 10 March 2016) PC.DEC/1202.
 
*Organization for Security and Cooperation in Europe, ''[https://www.osce.org/pc/227281?download=true Decision No. 1202, OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies]'' (Permanent Council, 10 March 2016) PC.DEC/1202.
 
* [https://www.elac.ox.ac.uk/the-oxford-statement-on-the-international-law-protections-against-cyber-operations-targeting-the-hea Oxford Statement on the International Law Protections against Cyber Operations Targeting the Health-Care Sector] (20 May 2020).
 
* [https://www.elac.ox.ac.uk/the-oxford-statement-on-the-international-law-protections-against-cyber-operations-targeting-the-hea Oxford Statement on the International Law Protections against Cyber Operations Targeting the Health-Care Sector] (20 May 2020).
Line 182: Line 215:
 
*[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf G20 Leaders’ Communiqué] (15–16 November 2015).
 
*[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf G20 Leaders’ Communiqué] (15–16 November 2015).
 
* Alexander Gamero-Garrido and others, ‘[https://www.caida.org/workshops/aims/1904/slides/aims1904_agamero-handout.pdf Inferring Country-Level Transit Influence of Autonomous Systems]’ (on Active Internet Measurement Systems Conference, San Diego April 2019)
 
* Alexander Gamero-Garrido and others, ‘[https://www.caida.org/workshops/aims/1904/slides/aims1904_agamero-handout.pdf Inferring Country-Level Transit Influence of Autonomous Systems]’ (on Active Internet Measurement Systems Conference, San Diego April 2019)
* Internet Society, ‘[https://www.internetsociety.org/policybriefs/internet-shutdowns Policy brief: Internet Shutdowns]’ (<i>Internet Society</i>, 18 December 2019).
+
*Internet Society, ‘[https://www.internetsociety.org/policybriefs/internet-shutdowns Policy brief: Internet Shutdowns]’ (<i>Internet Society</i>, 18 December 2019).
* Vinit Jain and Brad Edgeworth, <i>[https://www.ciscopress.com/articles/article.asp?p=2756480&seqNum=6 Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP]</i>, (Cisco Press 2017).
+
*Vinit Jain and Brad Edgeworth, <i>[https://www.ciscopress.com/articles/article.asp?p=2756480&seqNum=6 Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP]</i>, (Cisco Press 2017).
 
*Tim Maurer and Michael Schmitt, ‘[https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?]’ ''Just Security,'' 14 August 2017.
 
*Tim Maurer and Michael Schmitt, ‘[https://www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?]’ ''Just Security,'' 14 August 2017.
 
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
 
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
Line 189: Line 222:
 
*President of the United States, [https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’] (2011).
 
*President of the United States, [https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’] (2011).
 
*United States, ‘[https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states FACT SHEET: President Xi Jinping’s State Visit to the United States]’ (25 September 2015).
 
*United States, ‘[https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states FACT SHEET: President Xi Jinping’s State Visit to the United States]’ (25 September 2015).
  +
*United States, ‘[https://armypubs.army.mil/epubs/DR_pubs/DR_a/pdf/web/ARN19354_FM%206-27%20_C1_FINAL_WEB_v2.pdf The Commander’s Handbook on the Law of Land Warfare]’ (FM 6-27, MCTP 11-10C, August 2019).
 
*Michael N Schmitt, ‘[https://www.justsecurity.org/64490/estonia-speaks-out-on-key-rules-for-cyberspace/ Estonia Speaks Out on Key Rules for Cyberspace]’ ''JustSecurity'' , 10 June 2019.
 
*Michael N Schmitt, ‘[https://www.justsecurity.org/64490/estonia-speaks-out-on-key-rules-for-cyberspace/ Estonia Speaks Out on Key Rules for Cyberspace]’ ''JustSecurity'' , 10 June 2019.
 
*Michael N Schmitt, ‘[https://www.justsecurity.org/66194/frances-major-statement-on-international-law-and-cyber-an-assessment/ France’s Major Statement on International Law and Cyber: An Assessment]’ ''JustSecurity'', 16 September 2019.
 
*Michael N Schmitt, ‘[https://www.justsecurity.org/66194/frances-major-statement-on-international-law-and-cyber-an-assessment/ France’s Major Statement on International Law and Cyber: An Assessment]’ ''JustSecurity'', 16 September 2019.
Line 195: Line 229:
 
*Matthew Waxman, Principal Deputy Director of Policy Planning, U.S. Department of State, ‘[https://2001-2009.state.gov/g/drl/rls/70392.htm Opening Statement to the U.N. Human Rights Committee on the Report Concerning the International Covenant on Civil and Political Rights]’ (17 July 2006).
 
*Matthew Waxman, Principal Deputy Director of Policy Planning, U.S. Department of State, ‘[https://2001-2009.state.gov/g/drl/rls/70392.htm Opening Statement to the U.N. Human Rights Committee on the Report Concerning the International Covenant on Civil and Political Rights]’ (17 July 2006).
 
*Jeremy Wright, QC MP, UK Attorney General ‘[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]’ (23 May 2018).
 
*Jeremy Wright, QC MP, UK Attorney General ‘[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]’ (23 May 2018).
  +
*Harold Hongju Koh, ‘[https://harvardilj.org/2012/12/online_54_koh/ International Law in Cyberspace: Remarks as Prepared for Delivery to the USCYBERCOM Inter-Agency Legal Conference]’ (18 September 2002), reprinted in (2012) 54 Harv. Int’l L.J. Online 1, 4.
  +
*Kubo Mačák, Tilman Rodenhäuser and Laurent Gisel, ‘[https://blogs.icrc.org/law-and-policy/2020/04/02/cyber-attacks-hospitals-covid-19/ Cyber attacks against hospitals and the COVID-19 pandemic: How strong are international law protections?]’, ''ICRC Humanitarian Law and Policy Blog'', 2 April 2020.
  +
*Duncan B Hollis and Tsvetelina van Benthem, ‘[https://www.lawfareblog.com/what-would-happen-if-states-started-looking-cyber-operations-threat-use-force What Would Happen If States Started Looking at Cyber Operations as a “Threat” to Use Force?]’ ''Lawfare'' (30 March 2021).
  +
*Tilman Rodenhäuser, ‘[https://www.ejiltalk.org/hacking-humanitarians-ihl-and-the-protection-of-humanitarian-organizations-against-cyber-operations/ Hacking Humanitarians? IHL and the protection of humanitarian organizations against cyber operations]’, ''EJIL:Talk!'' (16 March 2020).
  +
*Harriet Moynihan, ‘[https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks The Application of International Law to State Cyberattacks: Sovereignty and Non-intervention]’ (2019) Chatham House.
  +
*Erica Häger & Carolina Dackö, ‘[https://www.mannheimerswartling.se/globalassets/nyhetsbrev/msa_nyhetsbrev_economic_espionage_dec17_a4_final.pdf Economic Espionage: A Report by Mannheimer Swartling]’ (2018).
  +
*Sina Alavi (ed), ‘[https://www.regierung.li/files/medienarchiv/The-Council-of-Advisers-Report-on-the-Application-of-the-Rome-Statute-of-the-International-Criminal-Court-to-Cyberwarfare.pdf The Council of Advisers’ Report on the Application of the Rome Statute of the International Criminal Court to Cyberwarfare]’ (August 2021).

Revision as of 17:04, 3 March 2022

Bibliography.jpg

Books and monographs

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron and others, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Gary P. Corn and Peter P. Pascucci, ‘The Law of Armed Conflict Implications of Covered or Concealed Cyber Operations: Perfidy, Ruses, and the Principle of Passive Distinction’ in Ronald T. P. Alcala and Eric T. Jensen (eds), The Impact of Emerging Technologies on the Law of Armed Conflict (OUP 2019).
  • Jean D’Aspremont, ‘Persona Non Grata’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecht Randelzhofer, ‘Article 2(4)’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’ in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Hans-Peter Gasser and Knut Dörmann, ‘Protection of Civilian Population’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Terry D. Gill, ‘Non-intervention in the Cyber Context’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Douglas Guilfoyle, ‘The High Seas’ (2015) in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Wolff Heintschel von Heinegg, ‘Warships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated October 2015)
  • Albert J. Hoffmann, ‘Freedom of Navigation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2011).
  • Knut Ipsen, ‘Combatants and Non-Combatants’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Jan K. Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Jeff Kosseff, ‘Retorsion as a Response to Ongoing Cyber Operations’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
  • Natalie Klein, ‘Maritime Security’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Doris König, ‘Flag of Ships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2009).
  • Philip Kunig, ‘Prohibition of Intervention’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2008).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), The Law of International Responsibility (OUP 2010).
  • Nils Melzer, ‘Cyber Operations and jus in bello’ in Kerstin Vignard (ed), Confronting Cyberconflict (UNIDIR 2011).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
  • Przemysław Roguski, ‘Collective Countermeasures in Cyberspace: Lex lata, Progressive Development or a Bad Idea?’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
  • Tassilo Singer, ‘Update to Revolving Door 2.0 – the Extension of the Period for Direct Participation in Hostilities Due to Autonomous Cyber Weapons’ in Henry Rõigas and others (eds), 9th International Conference on Cyber Conflict: Defending the Core (NATO CCD COE 2017).
  • Waldemar A Solf, ‘Article 37: Prohibition of Perfidy’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Waldemar A Solf, ‘Article 38: Recognized Emblems’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Waldemar A Solf, ‘Article 39: Emblems of Nationality’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Yoshifumi Tanaka, ‘Navigational Rights and Freedoms’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Sabine Von Schorlemer, ‘Telecommunications, international regulation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated March 2009)
  • Silja Vöneky, ‘Analogy in International Law’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Sean Watts, ‘The Notion of Combatancy in Cyber Warfare’, in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
  • Rolf Weber, ‘A Legal Lens into Internet Governance’, in Laura DeNardis and others (eds), Researching Internet Governance: Methods, Frameworks, Futures (MIT Press 2020).
  • Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Katja Ziegler, ‘Domaine Réservé’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2013).
  • Christian Dominicé, ‘Attribution of Conduct to Multiple States and the Implication of a State in the Act of Another State’ in James Crawford and others (eds), The Law of International Responsibility (OUP 2010).
  • James Crawford, ‘State Responsibility’ in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Marcelo Kohen, ‘The Court’s Contribution to Determining the Content of Fundamental Principles of International Law’ in Giorgio Gaja and Jenny Grote Stoutenburg (eds), Enhancing the Rule of Law through the International Court of Justice (Brill 2012).
  • Michael N Schmitt, ‘The Use of Cyber Force and International Law’ in Marc Weller (ed), Oxford Handbook on the Use of Force in International Law (OUP 2015).
  • Robin Geiss, ‘The Obligation to Respect and to Ensure Respect for the Conventions’ in Andrew Clapham, Paola Gaeta and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Jeffrey Biller, ‘The Misuse of Protected Indicators in Cyberspace: Defending a Core Aspect of International Humanitarian Law’ in Henry Rõigas and others (eds), Defending the Core (CCD COE 2017).
  • Kai Ambos, ‘International Criminal Responsibility in Cyberspace’ in Nicholas Tsagourias and Russell Buchan (eds), Research Handbook on International Law and Cyberspace (Edward Elgar 2015).
  • Wibke Timmermann and William A. Schabas, ‘Incitement to Genocide’ in Paul Behrens and Ralph Henham (eds), Elements of Genocide (Routledge 2013).

Edited books and reference texts

Journal articles

International treaties, reports and other public documents

Blog posts and other online sources