Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
mNo edit summary
(10 intermediate revisions by 3 users not shown)
Line 4: Line 4:
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
*William H Boothby, ''[https://opil.ouplaw.com/view/10.1093/law/9780198728504.001.0001/law-9780198728504 Weapons and the Law of Armed Conflict]'' (OUP 2016).
*William H Boothby, ''[https://opil.ouplaw.com/view/10.1093/law/9780198728504.001.0001/law-9780198728504 Weapons and the Law of Armed Conflict]'' (OUP 2016).
*William H Boothby, [https://www.cambridge.org/core/books/new-technologies-and-the-law-in-war-and-peace/AA47FC74ABEA568F6971E53EF906601C#fndtn-contents ''New Technologies and the Law in War and Peace''] (CUP 2018).
*Dennis Broeders, ''[https://library.oapen.org/handle/20.500.12657/32439 The Public Core of the Internet]'' (Amsterdam University Press 2015).
*Dennis Broeders, ''[https://library.oapen.org/handle/20.500.12657/32439 The Public Core of the Internet]'' (Amsterdam University Press 2015).
*Ian Brownlie, ''[http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780198251583.001.0001/acprof-9780198251583 International Law and the Use of Force by States]'' (OUP 1963).
*Ian Brownlie, ''[http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780198251583.001.0001/acprof-9780198251583 International Law and the Use of Force by States]'' (OUP 1963).
Line 13: Line 14:
*Martin Dawidowicz, ''[https://doi.org/10.1017/9781139046602 Third-Party Countermeasures in International Law]'' (CUP 2017).
*Martin Dawidowicz, ''[https://doi.org/10.1017/9781139046602 Third-Party Countermeasures in International Law]'' (CUP 2017).
* François Delerue, ''[https://doi.org/10.1017/9781108780605 Cyber Operations and International Law]'' (CUP 2020).
* François Delerue, ''[https://doi.org/10.1017/9781108780605 Cyber Operations and International Law]'' (CUP 2020).
* Heather H Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012).
* Heather Harrison Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781316389591 The Conduct of Hostilities under the Law of International Armed Conflict]'' (CUP 2016).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781316389591 The Conduct of Hostilities under the Law of International Armed Conflict]'' (CUP 2016).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
* Christine Gray, ''[https://opil.ouplaw.com/view/10.1093/law/9780198808411.001.0001/law-9780198808411 International Law and the use of force]'' (OUP 2018).
* Christine Gray, ''[https://opil.ouplaw.com/view/10.1093/law/9780198808411.001.0001/law-9780198808411 International Law and the use of force]'' (OUP 2018).
* Kristin E. Heckman and others, [https://link.springer.com/book/10.1007/978-3-319-25133-2 Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defence] (Springer 2015).
* Kristin E. Heckman and others, [https://link.springer.com/book/10.1007/978-3-319-25133-2 ''Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defence''] (Springer 2015).
* Vinit Jain and Brad Edgeworth, ''[https://www.ciscopress.com/articles/article.asp?p=2756480&seqNum=6 Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP]'' (Cisco Press 2017).
* Vinit Jain and Brad Edgeworth, ''[https://www.ciscopress.com/articles/article.asp?p=2756480&seqNum=6 Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP]'' (Cisco Press 2017).
*Eleni Katselli Proukaki, ''[https://www.taylorfrancis.com/books/oa-mono/10.4324/9780203865569/problem-enforcement-international-law-elena-katselli-proukaki The Problem of Enforcement in International Law]'' (Routledge 2010).
*Eleni Katselli Proukaki, ''[https://www.taylorfrancis.com/books/oa-mono/10.4324/9780203865569/problem-enforcement-international-law-elena-katselli-proukaki The Problem of Enforcement in International Law]'' (Routledge 2010).
*Natalie Klein, ''[https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199566532.001.0001/acprof-9780199566532 Maritime Security and the Law of the Sea]'' (OUP 2011).
*Natalie Klein, ''[https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199566532.001.0001/acprof-9780199566532 Maritime Security and the Law of the Sea]'' (OUP 2011).
* Joanna Kulesza, ''[https://brill.com/view/title/26829 Due Diligence in International Law]'' (Brill 2016).
* Joanna Kulesza, ''[https://brill.com/view/title/26829 Due Diligence in International Law]'' (Brill 2016).
* Henning Lahmann, ''[https://doi.org/10.1017/9781108807050 Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution]'' (CUP 2020).
* Kubo Mačák, ''[http://www.oxfordscholarship.com/view/10.1093/oso/9780198819868.001.0001/oso-9780198819868 Internationalized Armed Conflicts in International Law]'' (OUP 2018).
* Kubo Mačák, ''[http://www.oxfordscholarship.com/view/10.1093/oso/9780198819868.001.0001/oso-9780198819868 Internationalized Armed Conflicts in International Law]'' (OUP 2018).
* René Provost, ''[https://www.cambridge.org/ch/academic/subjects/law/humanitarian-law/international-human-rights-and-humanitarian-law?format=PB#contentsTabAnchor International Human Rights and Humanitarian Law]'' (CUP 2002).
* René Provost, ''[https://www.cambridge.org/ch/academic/subjects/law/humanitarian-law/international-human-rights-and-humanitarian-law?format=PB#contentsTabAnchor International Human Rights and Humanitarian Law]'' (CUP 2002).
* Marco Roscini, ''[https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199655014.001.0001/acprof-9780199655014 Cyber Operations and the Use of Force in International Law]'' (OUP 2014).
* Marco Roscini, ''[https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199655014.001.0001/acprof-9780199655014 Cyber Operations and the Use of Force in International Law]'' (OUP 2014).
* Gary D Solis, ''[https://www.cambridge.org/ch/academic/subjects/law/humanitarian-law/law-armed-conflict-international-humanitarian-law-war-2nd-edition?format=AR&isbn=9781107135604 The Law of Armed Conflict: International Humanitarian Law in War]'' (CUP 2016).
* Gary D Solis, ''[https://www.cambridge.org/ch/academic/subjects/law/humanitarian-law/law-armed-conflict-international-humanitarian-law-war-2nd-edition?format=AR&isbn=9781107135604 The Law of Armed Conflict: International Humanitarian Law in War]'' (CUP 2016).
* Nicholas Tsagourias and Russell Buchan (eds), ''[https://www.e-elgar.com/shop/gbp/research-handbook-on-international-law-and-cyberspace-9781789904246.html Research Handbook on International Law and Cyberspace]'' (2nd edn, Edward Elgar 2021).
* Nigel White, ''[https://manchesteruniversitypress.co.uk/9780719059544/the-law-of-international-organisations/ The Law of International Organizations]'' (Manchester University Press 2005).
* Nigel White, ''[https://manchesteruniversitypress.co.uk/9780719059544/the-law-of-international-organisations/ The Law of International Organizations]'' (Manchester University Press 2005).
* Noam Zamir, ''[https://www.elgaronline.com/view/9781785367892/9781785367892.xml Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars]'' (Edward Elgar 2017) .
* Noam Zamir, ''[https://www.elgaronline.com/view/9781785367892/9781785367892.xml Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars]'' (Edward Elgar 2017) .
Line 54: Line 57:
*Philip Kunig, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1434 Prohibition of Intervention]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2008).
*Philip Kunig, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1434 Prohibition of Intervention]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2008).
*Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), ''[https://opil.ouplaw.com/view/10.1093/law/9780199296972.001.0001/law-9780199296972 The Law of International Responsibility]'' (OUP 2010).
*Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), ''[https://opil.ouplaw.com/view/10.1093/law/9780199296972.001.0001/law-9780199296972 The Law of International Responsibility]'' (OUP 2010).
* Kubo Mačák and Laurent Gisel, ‘Grammar: Rules in a Cyber Conflict’ in Patryk Pawlak and François Delerue (eds), ''[https://www.iss.europa.eu/content/language-power A Language of Power? Cyber Defence in the European Union]'' (EUISS 2022).
*Nils Melzer, ‘Cyber Operations and ''jus in bello''’ in Kerstin Vignard (ed), <i>[https://www.unidir.org/files/publications/pdfs/confronting-cyberconflict-en-317.pdf Confronting Cyberconflict]</i> (UNIDIR 2011).
*Nils Melzer, ‘Cyber Operations and ''jus in bello''’ in Kerstin Vignard (ed), <i>[https://www.unidir.org/files/publications/pdfs/confronting-cyberconflict-en-317.pdf Confronting Cyberconflict]</i> (UNIDIR 2011).
*Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), <i>[https://ccdcoe.org/uploads/2019/03/CyCon_book_2012.pdf 4th International Conference on Cyber Conflict]</i> (NATO CCD COE 2012).
*Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), <i>[https://ccdcoe.org/uploads/2019/03/CyCon_book_2012.pdf 4th International Conference on Cyber Conflict]</i> (NATO CCD COE 2012).
Line 81: Line 85:


== Journal articles ==
== Journal articles ==
* Dapo Akande, Antonio Coco, and Talita de Souza Dias, ‘[https://digital-commons.usnwc.edu/ils/vol99/iss1/2/ Drawing the Cyber Baseline: The Applicability of Existing International Law to the Governance of Information and Communication Technologies]’ (2022) 99 Int'l L Stud 4.
* James Banks, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2129457 European Regulation of Cross-Border Hate Speech in Cyberspace: The Limits of Legislation]’ (2011) 19 Eur J Crime CrL & CrJ 1.
* James Banks, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2129457 European Regulation of Cross-Border Hate Speech in Cyberspace: The Limits of Legislation]’ (2011) 19 Eur J Crime CrL & CrJ 1.
* William Banks, ‘[https://texaslawreview.org/state-responsibility-attribution-cyber-intrusions-tallinn-2-0/ State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0]’ (2017) 95 Tex. L. Rev. 1487.
* William Banks, ‘[https://texaslawreview.org/state-responsibility-attribution-cyber-intrusions-tallinn-2-0/ State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0]’ (2017) 95 Tex. L. Rev. 1487.
Line 95: Line 100:
*Elena Chachko, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3157255 Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’] (2019) 44 Yale Journal of International Law 1.
*Elena Chachko, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3157255 Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’] (2019) 44 Yale Journal of International Law 1.
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
* Antonio Coco and Talita de Souza Dias, ‘[https://academic.oup.com/ejil/article/32/3/771/6356808 Cyber Due Diligence: A Patchwork of Protective Obligations in International Law]’ (2021) 32 Eur J of Int'l Law 771.
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
*Gary P. Corn and Eric T. Jensen, ‘[https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf The Use of Force and Cyber Countermeasures]’ (2018) 32 Temple International and Comparative Law Journal 127.
*Gary P. Corn and Eric T. Jensen, ‘[https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf The Use of Force and Cyber Countermeasures]’ (2018) 32 Temple International and Comparative Law Journal 127.
*Martin Dawidowicz, ‘[http://www.qil-qdi.org/third-party-countermeasures-progressive-development-international-law/ Third-Party Countermeasures: A Progressive Development of International Law?]’ (2016) 29 Questions of International Law 3.
*Martin Dawidowicz, ‘[http://www.qil-qdi.org/third-party-countermeasures-progressive-development-international-law/ Third-Party Countermeasures: A Progressive Development of International Law?]’ (2016) 29 Questions of International Law 3.
*Ashley Deeks, ‘[https://www.ilsa.org/Jessup/Jessup16/Batch%202/DeeksLegalFramework.pdf An International Legal Framework for Surveillance]’ (2015) 55 Virginia J Int'l L 291.
*Ashley Deeks, ‘[https://www.ilsa.org/Jessup/Jessup16/Batch%202/DeeksLegalFramework.pdf An International Legal Framework for Surveillance]’ (2015) 55 Virginia J Int'l L 291.
*Heather H Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 Isr L Rev 39.
*Heather Harrison Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 Isr L Rev 39.
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL 583.
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL 583.
Line 112: Line 118:
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
* Nori Katagiri, ‘[https://academic.oup.com/cybersecurity/article/7/1/tyab009/6168044 Why International Law and Norms Do Little in Preventing Non-State Cyber Attacks]’ (2021) 7 Journal of Cybersecurity 1.
*Harold Hongju Koh, ‘[https://harvardilj.org/2012/12/online_54_koh/ International Law in Cyberspace: Remarks as Prepared for Delivery to the USCYBERCOM Inter-Agency Legal Conference]’ (18 September 2002), reprinted in (2012) 54 Harv. Int’l L.J. Online 1, 4.
*Harold Hongju Koh, ‘[https://harvardilj.org/2012/12/online_54_koh/ International Law in Cyberspace: Remarks as Prepared for Delivery to the USCYBERCOM Inter-Agency Legal Conference]’ (18 September 2002), reprinted in (2012) 54 Harv. Int’l L.J. Online 1, 4.
*Maziar Jamnejad and Michael Wood, ‘[https://journals.scholarsportal.info/details?uri=/09221565/v22i0002/345_tpon The Principle of Non-Intervention]’ (2009) 22 LJIL 345.
*Maziar Jamnejad and Michael Wood, ‘[https://journals.scholarsportal.info/details?uri=/09221565/v22i0002/345_tpon The Principle of Non-Intervention]’ (2009) 22 LJIL 345.
Line 118: Line 125:
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
*Patricia Kwast, ‘[https://academic.oup.com/jcsl/article-abstract/13/1/49/824799 Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the ''Guyana/Suriname'' Award]’ (2008) 13 Journal of Conflict and Security Law 1.
*Patricia Kwast, ‘[https://academic.oup.com/jcsl/article-abstract/13/1/49/824799 Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the ''Guyana/Suriname'' Award]’ (2008) 13 Journal of Conflict and Security Law 1.
* Henning Lahmann, ‘[https://scholarship.law.duke.edu/djcil/vol32/iss1/2/ On the Politics and Ideologies of the Sovereignty Discourse in Cyberspace]’ (2021) 32 Duke Journal of Comparative & International Law 61.
* Jan Martin Lemnitzer, ‘[https://academic.oup.com/ejil/article-abstract/33/3/789/6770702?redirectedFrom=fulltext Back to the Roots: The Laws of Neutrality and the Future of Due Diligence in Cyberspace]’ (2022) 33 Eur J of Int'l Law 789.
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 NCJ Int'l L & Com Reg 443.
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 NCJ Int'l L & Com Reg 443.
*Noam Lubell, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1026&context=ils Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?]’ (2013) 89 Int’l L Stud 252.
*Noam Lubell, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1026&context=ils Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?]’ (2013) 89 Int’l L Stud 252.
Line 133: Line 142:
*Harriet Moynihan, ‘[https://doi.org/10.1080/23738871.2020.1832550 The Vital Role of International Law in the Framework for Responsible State Behaviour in Cyberspace]’ (2020) 5 Journal of Cyber Policy.
*Harriet Moynihan, ‘[https://doi.org/10.1080/23738871.2020.1832550 The Vital Role of International Law in the Framework for Responsible State Behaviour in Cyberspace]’ (2020) 5 Journal of Cyber Policy.
*Noam Neuman, ‘[https://scholarship.law.vanderbilt.edu/cgi/viewcontent.cgi?article=1099&context=vjtl Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas]’ (2018) 51 VJTL 807.
*Noam Neuman, ‘[https://scholarship.law.vanderbilt.edu/cgi/viewcontent.cgi?article=1099&context=vjtl Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas]’ (2018) 51 VJTL 807.
* Noam Neuman, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=2970&context=ils Neutrality and Cyberspace: Bridging the Gap between Theory and Reality]’ (2021) 97 Int'l L Stud 765.
*Christian Payne and Lorraine Finlay, ‘[https://gwilr.org/wordpress/wp-content/uploads/2017/05/ILR-Vol-49.3_Panye-Finlay.pdf Addressing Obstacles to Cyber-Attribution]’, (2017) 49 Geo. Wash. Int’l L. Rev. 535.
*Christian Payne and Lorraine Finlay, ‘[https://gwilr.org/wordpress/wp-content/uploads/2017/05/ILR-Vol-49.3_Panye-Finlay.pdf Addressing Obstacles to Cyber-Attribution]’, (2017) 49 Geo. Wash. Int’l L. Rev. 535.
*Sean K Price, ‘[https://harvardnsj.org/2020/02/perfidy-in-cyberspace-the-requirement-for-human-confidence/ Perfidy in Cyberspace: The Requirement for Human Confidence]’ (2020) Harv. Nat'l Sec. J. Online.
*Sean K Price, ‘[https://harvardnsj.org/2020/02/perfidy-in-cyberspace-the-requirement-for-human-confidence/ Perfidy in Cyberspace: The Requirement for Human Confidence]’ (2020) Harv. Nat'l Sec. J. Online.
* Ori Pomson, ‘[https://digital-commons.usnwc.edu/ils/vol99/iss1/7/ The Prohibition on Intervention Under International Law and Cyber Operations]’ (2022) 99 International Law Studies 180.
* Ori Pomson, ‘[https://doi.org/10.1093/jcsl/krad002 “Objects”? The Legal Status of Computer Data under International Humanitarian Law]’ (2023) __ Journal of Conflict and Security Law __ (forthcoming).
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3435439 Gravity in the Statute of the International Criminal Court and Cyber Conduct that Constitutes, Instigates or Facilitates International Crimes]’ (2019) 30 CrimLF 247.
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3435439 Gravity in the Statute of the International Criminal Court and Cyber Conduct that Constitutes, Instigates or Facilitates International Crimes]’ (2019) 30 CrimLF 247.
Line 200: Line 212:
*ICRC, ‘[https://shop.icrc.org/a-guide-to-the-legal-review-of-new-weapons-means-and-methods-of-warfare-pdf-en A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977]’ (Kathleen Lawand (ed), ICRC 2006).
*ICRC, ‘[https://shop.icrc.org/a-guide-to-the-legal-review-of-new-weapons-means-and-methods-of-warfare-pdf-en A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977]’ (Kathleen Lawand (ed), ICRC 2006).
*ICRC, ‘[http://www.icrc.org/en/download/file/108983/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf International Humanitarian Law and Cyber Operations during Armed Conflicts: ICRC Position Paper]’ (November 2019).
*ICRC, ‘[http://www.icrc.org/en/download/file/108983/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf International Humanitarian Law and Cyber Operations during Armed Conflicts: ICRC Position Paper]’ (November 2019).
*ICRC, '[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/01_when_does_ihl_apply-0.pdf When does International Humanitarian Law apply to the Use of Information and Communications Technologies?]' (7 March 2023).
*ICRC, ‘[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/02_humanity_and_necessity-0.pdf The Principles of Humanity and Necessity]' (7 March 2023).
*ICRC, ‘[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/03_distinction-0.pdf The Principle of Distinction]’ (7 March 2023).
*ICRC, ‘[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/04_proportionality-0.pdf The Principle of Proportionality]’ (7 March 2023).
* Andraz Kastelic, '[https://unidir.org/sites/default/files/2022-01/UNIDIR_Non-Escalatory_Attribution_International_Cyber_Incidents.pdf Non-Escalatory Attribution of International Cyber Incidents: Facts, International Law and Politics]’ (UNIDIR 2022).
*Harriet Moynihan, ‘[https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks The Application of International Law to State Cyberattacks: Sovereignty and Non-intervention]’ (Chatham House, 2019).
*Harriet Moynihan, ‘[https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks The Application of International Law to State Cyberattacks: Sovereignty and Non-intervention]’ (Chatham House, 2019).
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).

Revision as of 08:36, 6 May 2024

Books and monographs

Contributions to edited collections

Edited books and reference texts

Journal articles

International treaties, resolutions and other legislative documents

Blog posts and other online sources