Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(Adding Henning's 2020 book & 2021 article)
m (Added Rodenhauser (2023). Added Pomson (2023); added page and volume numbers to Pomson ('Legal Status of Computer Data', 2023); added Lahmann (2020); added Oorsprong et al. (2023); added Schmitt and Watts (2021).)
 
(12 intermediate revisions by 3 users not shown)
Line 4: Line 4:
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
*William H Boothby, ''[https://opil.ouplaw.com/view/10.1093/law/9780198728504.001.0001/law-9780198728504 Weapons and the Law of Armed Conflict]'' (OUP 2016).
*William H Boothby, ''[https://opil.ouplaw.com/view/10.1093/law/9780198728504.001.0001/law-9780198728504 Weapons and the Law of Armed Conflict]'' (OUP 2016).
*William H Boothby, [https://www.cambridge.org/core/books/new-technologies-and-the-law-in-war-and-peace/AA47FC74ABEA568F6971E53EF906601C#fndtn-contents ''New Technologies and the Law in War and Peace''] (CUP 2018).
*Dennis Broeders, ''[https://library.oapen.org/handle/20.500.12657/32439 The Public Core of the Internet]'' (Amsterdam University Press 2015).
*Dennis Broeders, ''[https://library.oapen.org/handle/20.500.12657/32439 The Public Core of the Internet]'' (Amsterdam University Press 2015).
*Ian Brownlie, ''[http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780198251583.001.0001/acprof-9780198251583 International Law and the Use of Force by States]'' (OUP 1963).
*Ian Brownlie, ''[http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780198251583.001.0001/acprof-9780198251583 International Law and the Use of Force by States]'' (OUP 1963).
Line 13: Line 14:
*Martin Dawidowicz, ''[https://doi.org/10.1017/9781139046602 Third-Party Countermeasures in International Law]'' (CUP 2017).
*Martin Dawidowicz, ''[https://doi.org/10.1017/9781139046602 Third-Party Countermeasures in International Law]'' (CUP 2017).
* François Delerue, ''[https://doi.org/10.1017/9781108780605 Cyber Operations and International Law]'' (CUP 2020).
* François Delerue, ''[https://doi.org/10.1017/9781108780605 Cyber Operations and International Law]'' (CUP 2020).
* Heather H Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012).
* Heather Harrison Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781316389591 The Conduct of Hostilities under the Law of International Armed Conflict]'' (CUP 2016).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781316389591 The Conduct of Hostilities under the Law of International Armed Conflict]'' (CUP 2016).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
* Christine Gray, ''[https://opil.ouplaw.com/view/10.1093/law/9780198808411.001.0001/law-9780198808411 International Law and the use of force]'' (OUP 2018).
* Christine Gray, ''[https://opil.ouplaw.com/view/10.1093/law/9780198808411.001.0001/law-9780198808411 International Law and the use of force]'' (OUP 2018).
* Samuel Haataja, ''[https://www.taylorfrancis.com/books/mono/10.4324/9781351057028/cyber-attacks-international-law-use-force-samuli-haataja Cyber Attacks and the International Law on the Use of Force: The Turn to Information Ethics]'' (Routledge, 2018).
* Kristin E. Heckman and others, [https://link.springer.com/book/10.1007/978-3-319-25133-2 Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defence] (Springer 2015).
* Kristin E. Heckman and others, [https://link.springer.com/book/10.1007/978-3-319-25133-2 ''Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defence''] (Springer 2015).
* Vinit Jain and Brad Edgeworth, ''[https://www.ciscopress.com/articles/article.asp?p=2756480&seqNum=6 Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP]'' (Cisco Press 2017).
* Vinit Jain and Brad Edgeworth, ''[https://www.ciscopress.com/articles/article.asp?p=2756480&seqNum=6 Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP]'' (Cisco Press 2017).
*Eleni Katselli Proukaki, ''[https://www.taylorfrancis.com/books/oa-mono/10.4324/9780203865569/problem-enforcement-international-law-elena-katselli-proukaki The Problem of Enforcement in International Law]'' (Routledge 2010).
*Eleni Katselli Proukaki, ''[https://www.taylorfrancis.com/books/oa-mono/10.4324/9780203865569/problem-enforcement-international-law-elena-katselli-proukaki The Problem of Enforcement in International Law]'' (Routledge 2010).
Line 27: Line 29:
* Marco Roscini, ''[https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199655014.001.0001/acprof-9780199655014 Cyber Operations and the Use of Force in International Law]'' (OUP 2014).
* Marco Roscini, ''[https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199655014.001.0001/acprof-9780199655014 Cyber Operations and the Use of Force in International Law]'' (OUP 2014).
* Gary D Solis, ''[https://www.cambridge.org/ch/academic/subjects/law/humanitarian-law/law-armed-conflict-international-humanitarian-law-war-2nd-edition?format=AR&isbn=9781107135604 The Law of Armed Conflict: International Humanitarian Law in War]'' (CUP 2016).
* Gary D Solis, ''[https://www.cambridge.org/ch/academic/subjects/law/humanitarian-law/law-armed-conflict-international-humanitarian-law-war-2nd-edition?format=AR&isbn=9781107135604 The Law of Armed Conflict: International Humanitarian Law in War]'' (CUP 2016).
* Nicholas Tsagourias and Russell Buchan (eds), ''[https://www.e-elgar.com/shop/gbp/research-handbook-on-international-law-and-cyberspace-9781789904246.html Research Handbook on International Law and Cyberspace]'' (2nd edn, Edward Elgar 2021).
* Nigel White, ''[https://manchesteruniversitypress.co.uk/9780719059544/the-law-of-international-organisations/ The Law of International Organizations]'' (Manchester University Press 2005).
* Nigel White, ''[https://manchesteruniversitypress.co.uk/9780719059544/the-law-of-international-organisations/ The Law of International Organizations]'' (Manchester University Press 2005).
* Noam Zamir, ''[https://www.elgaronline.com/view/9781785367892/9781785367892.xml Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars]'' (Edward Elgar 2017) .
* Noam Zamir, ''[https://www.elgaronline.com/view/9781785367892/9781785367892.xml Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars]'' (Edward Elgar 2017) .
Line 55: Line 58:
*Philip Kunig, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1434 Prohibition of Intervention]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2008).
*Philip Kunig, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1434 Prohibition of Intervention]’, in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2008).
*Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), ''[https://opil.ouplaw.com/view/10.1093/law/9780199296972.001.0001/law-9780199296972 The Law of International Responsibility]'' (OUP 2010).
*Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), ''[https://opil.ouplaw.com/view/10.1093/law/9780199296972.001.0001/law-9780199296972 The Law of International Responsibility]'' (OUP 2010).
* Kubo Mačák and Laurent Gisel, ‘Grammar: Rules in a Cyber Conflict’ in Patryk Pawlak and François Delerue (eds), ''[https://www.iss.europa.eu/content/language-power A Language of Power? Cyber Defence in the European Union]'' (EUISS 2022).
*Nils Melzer, ‘Cyber Operations and ''jus in bello''’ in Kerstin Vignard (ed), <i>[https://www.unidir.org/files/publications/pdfs/confronting-cyberconflict-en-317.pdf Confronting Cyberconflict]</i> (UNIDIR 2011).
*Nils Melzer, ‘Cyber Operations and ''jus in bello''’ in Kerstin Vignard (ed), <i>[https://www.unidir.org/files/publications/pdfs/confronting-cyberconflict-en-317.pdf Confronting Cyberconflict]</i> (UNIDIR 2011).
*Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), <i>[https://ccdcoe.org/uploads/2019/03/CyCon_book_2012.pdf 4th International Conference on Cyber Conflict]</i> (NATO CCD COE 2012).
*Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), <i>[https://ccdcoe.org/uploads/2019/03/CyCon_book_2012.pdf 4th International Conference on Cyber Conflict]</i> (NATO CCD COE 2012).
Line 82: Line 86:


== Journal articles ==
== Journal articles ==
* Dapo Akande, Antonio Coco, and Talita de Souza Dias, ‘[https://digital-commons.usnwc.edu/ils/vol99/iss1/2/ Drawing the Cyber Baseline: The Applicability of Existing International Law to the Governance of Information and Communication Technologies]’ (2022) 99 Int'l L Stud 4.
* James Banks, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2129457 European Regulation of Cross-Border Hate Speech in Cyberspace: The Limits of Legislation]’ (2011) 19 Eur J Crime CrL & CrJ 1.
* James Banks, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2129457 European Regulation of Cross-Border Hate Speech in Cyberspace: The Limits of Legislation]’ (2011) 19 Eur J Crime CrL & CrJ 1.
* William Banks, ‘[https://texaslawreview.org/state-responsibility-attribution-cyber-intrusions-tallinn-2-0/ State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0]’ (2017) 95 Tex. L. Rev. 1487.
* William Banks, ‘[https://texaslawreview.org/state-responsibility-attribution-cyber-intrusions-tallinn-2-0/ State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0]’ (2017) 95 Tex. L. Rev. 1487.
Line 96: Line 101:
*Elena Chachko, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3157255 Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’] (2019) 44 Yale Journal of International Law 1.
*Elena Chachko, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3157255 Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’] (2019) 44 Yale Journal of International Law 1.
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
* Antonio Coco and Talita de Souza Dias, ‘[https://academic.oup.com/ejil/article/32/3/771/6356808 Cyber Due Diligence: A Patchwork of Protective Obligations in International Law]’ (2021) 32 Eur J of Int'l Law 771.
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
*Gary P. Corn and Eric T. Jensen, ‘[https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf The Use of Force and Cyber Countermeasures]’ (2018) 32 Temple International and Comparative Law Journal 127.
*Gary P. Corn and Eric T. Jensen, ‘[https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf The Use of Force and Cyber Countermeasures]’ (2018) 32 Temple International and Comparative Law Journal 127.
*Martin Dawidowicz, ‘[http://www.qil-qdi.org/third-party-countermeasures-progressive-development-international-law/ Third-Party Countermeasures: A Progressive Development of International Law?]’ (2016) 29 Questions of International Law 3.
*Martin Dawidowicz, ‘[http://www.qil-qdi.org/third-party-countermeasures-progressive-development-international-law/ Third-Party Countermeasures: A Progressive Development of International Law?]’ (2016) 29 Questions of International Law 3.
*Ashley Deeks, ‘[https://www.ilsa.org/Jessup/Jessup16/Batch%202/DeeksLegalFramework.pdf An International Legal Framework for Surveillance]’ (2015) 55 Virginia J Int'l L 291.
*Ashley Deeks, ‘[https://www.ilsa.org/Jessup/Jessup16/Batch%202/DeeksLegalFramework.pdf An International Legal Framework for Surveillance]’ (2015) 55 Virginia J Int'l L 291.
*Heather H Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 Isr L Rev 39.
*Heather Harrison Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 Isr L Rev 39.
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL 583.
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL 583.
Line 113: Line 119:
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
* Nori Katagiri, ‘[https://academic.oup.com/cybersecurity/article/7/1/tyab009/6168044 Why International Law and Norms Do Little in Preventing Non-State Cyber Attacks]’ (2021) 7 Journal of Cybersecurity 1.
*Harold Hongju Koh, ‘[https://harvardilj.org/2012/12/online_54_koh/ International Law in Cyberspace: Remarks as Prepared for Delivery to the USCYBERCOM Inter-Agency Legal Conference]’ (18 September 2002), reprinted in (2012) 54 Harv. Int’l L.J. Online 1, 4.
*Harold Hongju Koh, ‘[https://harvardilj.org/2012/12/online_54_koh/ International Law in Cyberspace: Remarks as Prepared for Delivery to the USCYBERCOM Inter-Agency Legal Conference]’ (18 September 2002), reprinted in (2012) 54 Harv. Int’l L.J. Online 1, 4.
*Maziar Jamnejad and Michael Wood, ‘[https://journals.scholarsportal.info/details?uri=/09221565/v22i0002/345_tpon The Principle of Non-Intervention]’ (2009) 22 LJIL 345.
*Maziar Jamnejad and Michael Wood, ‘[https://journals.scholarsportal.info/details?uri=/09221565/v22i0002/345_tpon The Principle of Non-Intervention]’ (2009) 22 LJIL 345.
Line 119: Line 126:
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
*Patricia Kwast, ‘[https://academic.oup.com/jcsl/article-abstract/13/1/49/824799 Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the ''Guyana/Suriname'' Award]’ (2008) 13 Journal of Conflict and Security Law 1.
*Patricia Kwast, ‘[https://academic.oup.com/jcsl/article-abstract/13/1/49/824799 Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the ''Guyana/Suriname'' Award]’ (2008) 13 Journal of Conflict and Security Law 1.
* Henning Lahmann, '[https://www.cambridge.org/core/journals/israel-law-review/article/abs/information-operations-and-the-question-of-illegitimate-interference-under-international-law/60096A88BD9BBCEF8CF15ADE0EF89B5D Information Operations and the Question of Illegitimate Interference under International Law]' (2020) 53 Israel Law Review 49.
* Henning Lahmann, ‘[https://scholarship.law.duke.edu/djcil/vol32/iss1/2/ On the Politics and Ideologies of the Sovereignty Discourse in Cyberspace]’ (2021) 32 Duke Journal of Comparative & International Law 61.
* Henning Lahmann, ‘[https://scholarship.law.duke.edu/djcil/vol32/iss1/2/ On the Politics and Ideologies of the Sovereignty Discourse in Cyberspace]’ (2021) 32 Duke Journal of Comparative & International Law 61.
* Jan Martin Lemnitzer, ‘[https://academic.oup.com/ejil/article-abstract/33/3/789/6770702?redirectedFrom=fulltext Back to the Roots: The Laws of Neutrality and the Future of Due Diligence in Cyberspace]’ (2022) 33 Eur J of Int'l Law 789.
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 NCJ Int'l L & Com Reg 443.
*Catherine Lotrionte, ‘[https://scholarship.law.unc.edu/ncilj/vol40/iss2/4/ Countering State-Sponsored Cyber Economic Espionage Under International Law]’ (2015) 40 NCJ Int'l L & Com Reg 443.
*Noam Lubell, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1026&context=ils Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?]’ (2013) 89 Int’l L Stud 252.
*Noam Lubell, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1026&context=ils Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?]’ (2013) 89 Int’l L Stud 252.
Line 135: Line 144:
*Harriet Moynihan, ‘[https://doi.org/10.1080/23738871.2020.1832550 The Vital Role of International Law in the Framework for Responsible State Behaviour in Cyberspace]’ (2020) 5 Journal of Cyber Policy.
*Harriet Moynihan, ‘[https://doi.org/10.1080/23738871.2020.1832550 The Vital Role of International Law in the Framework for Responsible State Behaviour in Cyberspace]’ (2020) 5 Journal of Cyber Policy.
*Noam Neuman, ‘[https://scholarship.law.vanderbilt.edu/cgi/viewcontent.cgi?article=1099&context=vjtl Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas]’ (2018) 51 VJTL 807.
*Noam Neuman, ‘[https://scholarship.law.vanderbilt.edu/cgi/viewcontent.cgi?article=1099&context=vjtl Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas]’ (2018) 51 VJTL 807.
* Noam Neuman, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=2970&context=ils Neutrality and Cyberspace: Bridging the Gap between Theory and Reality]’ (2021) 97 Int'l L Stud 765.
* Ferry Oorsprong, Paul Ducheine & Peter Pijpers, '[https://www.tandfonline.com/doi/full/10.1080/25741292.2023.2179955 Cyber-attacks and the right of self-defence: a case study of the Netherlands]' (2023) 6 Policy Design and Practice 217.
*Christian Payne and Lorraine Finlay, ‘[https://gwilr.org/wordpress/wp-content/uploads/2017/05/ILR-Vol-49.3_Panye-Finlay.pdf Addressing Obstacles to Cyber-Attribution]’, (2017) 49 Geo. Wash. Int’l L. Rev. 535.
*Christian Payne and Lorraine Finlay, ‘[https://gwilr.org/wordpress/wp-content/uploads/2017/05/ILR-Vol-49.3_Panye-Finlay.pdf Addressing Obstacles to Cyber-Attribution]’, (2017) 49 Geo. Wash. Int’l L. Rev. 535.
*Sean K Price, ‘[https://harvardnsj.org/2020/02/perfidy-in-cyberspace-the-requirement-for-human-confidence/ Perfidy in Cyberspace: The Requirement for Human Confidence]’ (2020) Harv. Nat'l Sec. J. Online.
*Sean K Price, ‘[https://harvardnsj.org/2020/02/perfidy-in-cyberspace-the-requirement-for-human-confidence/ Perfidy in Cyberspace: The Requirement for Human Confidence]’ (2020) Harv. Nat'l Sec. J. Online.
* Ori Pomson, '[https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/methodology-of-identifying-customary-international-law-applicable-to-cyber-activities/E213A0C17FA373718CAD5DC4FAD78CAD Methodology of identifying customary international law applicable to cyber activities]’ (2023) 36 Leiden Journal of International Law 1.
* Ori Pomson, ‘[https://digital-commons.usnwc.edu/ils/vol99/iss1/7/ The Prohibition on Intervention Under International Law and Cyber Operations]’ (2022) 99 International Law Studies 180.
* Ori Pomson, ‘[https://doi.org/10.1093/jcsl/krad002 “Objects”? The Legal Status of Computer Data under International Humanitarian Law]’ (2023) 28 Journal of Conflict and Security Law 349.
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
*Tilman Rodenhäuser, '[https://digital-commons.usnwc.edu/ils/vol100/iss1/16/ The Legal Boundaries of (Digital) Information or Psychological Operations Under International Humanitarian Law]' (2023) 100 International Law Studies 541.
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3435439 Gravity in the Statute of the International Criminal Court and Cyber Conduct that Constitutes, Instigates or Facilitates International Crimes]’ (2019) 30 CrimLF 247.
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3435439 Gravity in the Statute of the International Criminal Court and Cyber Conduct that Constitutes, Instigates or Facilitates International Crimes]’ (2019) 30 CrimLF 247.
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611753 Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations]’ (2015) 50 Texas International Law Journal 1.
*Marco Roscini, ‘[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611753 Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations]’ (2015) 50 Texas International Law Journal 1.
Line 148: Line 163:
*Michael N Schmitt, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=83 The Notion of ‘Objects’ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision]’ (2015) 48 Isr L Rev 81.
*Michael N Schmitt, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=83 The Notion of ‘Objects’ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision]’ (2015) 48 Isr L Rev 81.
*Michael N Schmitt, '[https://heinonline.org/HOL/P?h=hein.journals/cjil19&i=36 Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law]' (2018) 19 Chinese JIL 30.
*Michael N Schmitt, '[https://heinonline.org/HOL/P?h=hein.journals/cjil19&i=36 Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law]' (2018) 19 Chinese JIL 30.
*Michael N. Schmitt and Sean Watts, '[https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/harvardnsj12&section=11&casa_token=_y0Q9slrWgQAAAAA:TBhBLu4cs_qndC76m5Q7yvDag0Ae6DM0SP1AX6QLZXpk3tPBrDtUHcmqqlDIqzr_ljOixbQ Collective Cyber Countermeasures?]' (2021) 12 Harvard National Security Journal 373.
*Michael N. Schmitt and Sean Watts, ‘[https://heinonline.org/HOL/P?h=hein.journals/tilj50&i=217 The Decline of International Humanitarian Law ''Opinio Juris'' and the Law of Cyber Warfare]’ (2015) 50 Tex Int'l LJ 189.
*Michael N. Schmitt and Sean Watts, ‘[https://heinonline.org/HOL/P?h=hein.journals/tilj50&i=217 The Decline of International Humanitarian Law ''Opinio Juris'' and the Law of Cyber Warfare]’ (2015) 50 Tex Int'l LJ 189.
*Michael N Schmitt and Liis Vihul, ‘[https://texaslawreview.org/respect-sovereignty-cyberspace/ Respect for Sovereignty in Cyberspace]’ (2017) 95 Tex L Rev. 1639.
*Michael N Schmitt and Liis Vihul, ‘[https://texaslawreview.org/respect-sovereignty-cyberspace/ Respect for Sovereignty in Cyberspace]’ (2017) 95 Tex L Rev. 1639.
Line 153: Line 169:
*Wibke K Timmermann, ‘[https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/abs/relationship-between-hate-propaganda-and-incitement-to-genocide-a-new-trend-in-international-law-towards-criminalization-of-hate-propaganda/D658B2F64EC10371D96407154FDE5ED2 The Relationship between Hate Propaganda and Incitement to Genocide: A New Trend in International Law Towards Criminalization of Hate Propaganda?]’ (2005) 18 LJIL 257.
*Wibke K Timmermann, ‘[https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/abs/relationship-between-hate-propaganda-and-incitement-to-genocide-a-new-trend-in-international-law-towards-criminalization-of-hate-propaganda/D658B2F64EC10371D96407154FDE5ED2 The Relationship between Hate Propaganda and Incitement to Genocide: A New Trend in International Law Towards Criminalization of Hate Propaganda?]’ (2005) 18 LJIL 257.
*Nicholas Tsagourias ''<nowiki/>'''[https://doi.org/10.1093/jcsl/krs019 Cyber Attacks, Self-Defence and the Problem of Attribution]' (2012) 17 (2) JCSL 23.
*Nicholas Tsagourias ''<nowiki/>'''[https://doi.org/10.1093/jcsl/krs019 Cyber Attacks, Self-Defence and the Problem of Attribution]' (2012) 17 (2) JCSL 23.
* Beth Van Schaack, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1011&context=ils The United States' position on the extra-territorial application of human rights obligations: Now is the time for change]’ (2014) 90 Int’l L Stud 20.
*Beth Van Schaack, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1011&context=ils The United States' position on the extra-territorial application of human rights obligations: Now is the time for change]’ (2014) 90 Int’l L Stud 20.
*David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP&#x20;11_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11.
*David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP+11_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11.
* Beatrice A. Walton, ‘[https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=5798&context=ylj Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law]’ (2017) 126 YaleLJ 1460.
*Beatrice A. Walton, ‘[https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=5798&context=ylj Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law]’ (2017) 126 YaleLJ 1460.
*Sean Watts and Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L Rev. 771.
*Sean Watts and Theodore Richard, '[https://law.lclark.edu/live/files/26902-lcb223article3wattspdf Baseline Territorial Sovereignty and Cyberspace]' (2018) 22 Lewis & Clark L Rev. 771.
*Richard A Wilson, ‘[https://repository.law.umich.edu/mjil/vol36/iss2/2/ Inciting Genocide with Words]’ (2015) 36 MichJIntlL 277.
*Richard A Wilson, ‘[https://repository.law.umich.edu/mjil/vol36/iss2/2/ Inciting Genocide with Words]’ (2015) 36 MichJIntlL 277.


== International treaties, resolutions and other legislative documents ==
== International treaties, resolutions and other legislative documents ==
* [https://www.wto.org/english/docs_e/legal_e/27-trips_01_e.htm Agreement on Trade-Related Aspects of Intellectual Property Rights, Annex 1C to the Agreement Establishing the World Trade Organization] (signed on 15 April 1994 in Marrakesh), 1869 UNTS 299
*[https://www.wto.org/english/docs_e/legal_e/27-trips_01_e.htm Agreement on Trade-Related Aspects of Intellectual Property Rights, Annex 1C to the Agreement Establishing the World Trade Organization] (signed on 15 April 1994 in Marrakesh), 1869 UNTS 299
*[https://doi.org/10.1017/9781316577226.029 American Convention on Human Rights] (open for signature from 22 November 1969, entered into force 18 July 1978), 1144 UNTS 123.
*[https://doi.org/10.1017/9781316577226.029 American Convention on Human Rights] (open for signature from 22 November 1969, entered into force 18 July 1978), 1144 UNTS 123.
*[https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT Charter of Fundamental Rights of the European Union] (2012) OJ C326/391.
*[https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT Charter of Fundamental Rights of the European Union] (2012) OJ C326/391.
*[https://treaties.un.org/doc/publication/ctc/uncharter.pdf Charter of the United Nations] (adopted 26 June 1945, entered into force 24 October 1945) 1 UNTS 16.
*[https://treaties.un.org/doc/publication/ctc/uncharter.pdf Charter of the United Nations] (adopted 26 June 1945, entered into force 24 October 1945) 1 UNTS 16.
*[https://www.echr.coe.int/Documents/Convention_ENG.pdf Convention for the Protection of Human Rights and Fundamental Freedoms] (opened to the signature in Rome on 4 November 1950, entered into force 3 September 1953) ETS 5.
*[https://www.echr.coe.int/Documents/Convention_ENG.pdf Convention for the Protection of Human Rights and Fundamental Freedoms] (opened to the signature in Rome on 4 November 1950, entered into force 3 September 1953) ETS 5.
*[https://treaties.un.org/doc/Publication/UNTS/Volume&#x20;974/volume-974-I-14118-english.pdf Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation] (signed 23 September 1971, entered into force 26 January 1973) 974 UNTS 178 (“Montreal Convention”).
*[https://treaties.un.org/doc/Publication/UNTS/Volume+974/volume-974-I-14118-english.pdf Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation] (signed 23 September 1971, entered into force 26 January 1973) 974 UNTS 178 (“Montreal Convention”).
*Council of Europe, [https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 Convention on Cybercrime] (adopted 23 November 2001, entered into force 1 July 2004).
*Council of Europe, [https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 Convention on Cybercrime] (adopted 23 November 2001, entered into force 1 July 2004).
*Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a [https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:02009R0428-20171216 Community regime for the control of exports, transfer, brokering and transit of dual-use items] (consolidated version as of 16 December 2017).
*Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a [https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:02009R0428-20171216 Community regime for the control of exports, transfer, brokering and transit of dual-use items] (consolidated version as of 16 December 2017).
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf Draft Articles on Responsibility of States for Internationally Wrongful Acts], with commentaries, Yearbook of the ILC (2001).
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf Draft Articles on Responsibility of States for Internationally Wrongful Acts], with commentaries, Yearbook of the ILC (2001).
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_11_2011.pdf Draft Articles on the Responsibility of International Organizations], with commentaries (UNYBILC, 2011).
*ILC, [http://legal.un.org/ilc/texts/instruments/english/commentaries/9_11_2011.pdf Draft Articles on the Responsibility of International Organizations], with commentaries (UNYBILC, 2011).
* ILC, [http://legal.un.org/ilc/publications/yearbooks/english/ilc_1966_v2.pdf Document A/6309/ Rev.1: Reports of the International Law Commission on the second part of its seventeenth and on its eighteenth session] (UNYBILC II, 1966).
*ILC, [http://legal.un.org/ilc/publications/yearbooks/english/ilc_1966_v2.pdf Document A/6309/ Rev.1: Reports of the International Law Commission on the second part of its seventeenth and on its eighteenth session] (UNYBILC II, 1966).
*[https://treaties.un.org/doc/publication/unts/volume%20999/volume-999-i-14668-english.pdf International Covenant on Civil and Political Rights] (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171.
*[https://treaties.un.org/doc/publication/unts/volume%20999/volume-999-i-14668-english.pdf International Covenant on Civil and Political Rights] (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171.
*[https://www.ohchr.org/en/professionalinterest/pages/cescr.aspx International Covenant on Economic, Social and Cultural Rights] (adopted 16 December 1966, entered into force 3 January 1976) 993 UNTS 3.
*[https://www.ohchr.org/en/professionalinterest/pages/cescr.aspx International Covenant on Economic, Social and Cultural Rights] (adopted 16 December 1966, entered into force 3 January 1976) 993 UNTS 3.
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts] (Protocol 1) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 3.
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts] (Protocol 1) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 3.
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts] (Protocol II) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 609.
*[https://www.icrc.org/en/doc/assets/files/other/icrc_002_0321.pdf Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts] (Protocol II) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 609.
* [https://www.icj-cij.org/en/statute Statute of the International Court of Justice] (adopted 26 June 1945, entered into force 24 October 1945).  
*[https://www.icj-cij.org/en/statute Statute of the International Court of Justice] (adopted 26 June 1945, entered into force 24 October 1945).  
*UNGA Res 2625 (XXV), ‘[https://treaties.un.org/doc/source/docs/A_RES_2625-Eng.pdf Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States in accordance with the Charter of the United Nations]’ (24 October 1970).
*UNGA Res 2625 (XXV), ‘[https://treaties.un.org/doc/source/docs/A_RES_2625-Eng.pdf Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States in accordance with the Charter of the United Nations]’ (24 October 1970).
*UNGA Res 55/63, ‘[https://digitallibrary.un.org/record/428861?ln=en Combating the criminal misuse of information technologies]’ (UN Doc. A/RES/55/63, 4 December 2000).
*UNGA Res 55/63, ‘[https://digitallibrary.un.org/record/428861?ln=en Combating the criminal misuse of information technologies]’ (UN Doc. A/RES/55/63, 4 December 2000).
*UNGA Res 68/243, ‘[https://undocs.org/A/RES/68/243 Developments in the field of information and telecommunications in the context of international security]’ (UN Doc. A/RES/68/243, 27 December 2013).
*UNGA Res 68/243, ‘[https://undocs.org/A/RES/68/243 Developments in the field of information and telecommunications in the context of international security]’ (UN Doc. A/RES/68/243, 27 December 2013).
* UNGA Res 70/237, ‘[https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf Developments in the field of information and telecommunications in the context of international security]’ (UN Doc. A/RES/20/237, 23 December 2015).
*UNGA Res 70/237, ‘[https://unoda-web.s3-accelerate.amazonaws.com/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf Developments in the field of information and telecommunications in the context of international security]’ (UN Doc. A/RES/20/237, 23 December 2015).
* UNGA Res 76/19, ‘[https://undocs.org/en/A/RES/76/19 Developments in the field of information and telecommunications in the context of international security, and advancing responsible State behaviour in the use of information and communications technologies]’ (UN Doc. A/RES/76/19, 8 December 2021).
*UNGA Res 76/19, ‘[https://undocs.org/en/A/RES/76/19 Developments in the field of information and telecommunications in the context of international security, and advancing responsible State behaviour in the use of information and communications technologies]’ (UN Doc. A/RES/76/19, 8 December 2021).
*UN Security Council, [http://daccess-ods.un.org/access.nsf/GetFile?OpenAgent&DS=S/RES/2321(2016)&Lang=E&Type=DOC Resolution 2321] (2016) Adopted by the Security Council at its 7821st meeting, on 30 November 2016.
*UN Security Council, [http://daccess-ods.un.org/access.nsf/GetFile?OpenAgent&DS=S/RES/2321(2016)&Lang=E&Type=DOC Resolution 2321] (2016) Adopted by the Security Council at its 7821st meeting, on 30 November 2016.
*UN Human Rights Council Res 32/13, ‘[https://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/32/13 The promotion, protection and enjoyment of human rights on the Internet]’ (UN Doc. A/HRC/RES/32/13, 1 July 2016).
*UN Human Rights Council Res 32/13, ‘[https://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/32/13 The promotion, protection and enjoyment of human rights on the Internet]’ (UN Doc. A/HRC/RES/32/13, 1 July 2016).
Line 187: Line 203:
*[https://treaties.un.org/doc/publication/unts/volume%201155/volume-1155-i-18232-english.pdf Vienna Convention on the Law of Treaties] (adopted 23 May 1969, entered into force 27 January 1908) 1155 UNTS 331.
*[https://treaties.un.org/doc/publication/unts/volume%201155/volume-1155-i-18232-english.pdf Vienna Convention on the Law of Treaties] (adopted 23 May 1969, entered into force 27 January 1908) 1155 UNTS 331.


== Blog posts and other online sources ==
== Blog posts and other online sources ==
* James Clapper, US, Director of National Intelligence, ‘[https://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf Worldwide Threat Assessment of the US Intelligence Community]’ (26 February 2015).
*James Clapper, US, Director of National Intelligence, ‘[https://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf Worldwide Threat Assessment of the US Intelligence Community]’ (26 February 2015).
*Council of the European Union, ‘[https://www.consilium.europa.eu/media/31666/st14435en17.pdf Council Conclusions on the Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU]’ (Council conclusions, 20 November 2017).
*Council of the European Union, ‘[https://www.consilium.europa.eu/media/31666/st14435en17.pdf Council Conclusions on the Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU]’ (Council conclusions, 20 November 2017).
*[https://rm.coe.int/16800cce5b Documents of the United Nations Conference on International Organization] (1945), vol VI, Explanatory Report to the Convention on Cybercrime.
*[https://rm.coe.int/16800cce5b Documents of the United Nations Conference on International Organization] (1945), vol VI, Explanatory Report to the Convention on Cybercrime.
*Brian Egan, US, State Department Legal Advisor, ‘[https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf International Law and Stability in Cyberspace]’, Speech at Berkeley Law School (10 November 2016).
*Brian Egan, US, State Department Legal Advisor, ‘[https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf International Law and Stability in Cyberspace]’, Speech at Berkeley Law School (10 November 2016).
*Brian Egan, State Department Legal Advisor, ‘[https://digital-commons.usnwc.edu/ils/vol92/iss1/7/ Remarks to the American Society of International Law: International Law, Legal Diplomacy, and the Counter-ISIL Campaign]’ (1 April 2016).
*Brian Egan, State Department Legal Advisor, ‘[https://digital-commons.usnwc.edu/ils/vol92/iss1/7/ Remarks to the American Society of International Law: International Law, Legal Diplomacy, and the Counter-ISIL Campaign]’ (1 April 2016).
* Alexander Gamero-Garrido and others, ‘[https://www.caida.org/workshops/aims/1904/slides/aims1904_agamero-handout.pdf Inferring Country-Level Transit Influence of Autonomous Systems]’ (on Active Internet Measurement Systems Conference, San Diego April 2019).
*Alexander Gamero-Garrido and others, ‘[https://www.caida.org/workshops/aims/1904/slides/aims1904_agamero-handout.pdf Inferring Country-Level Transit Influence of Autonomous Systems]’ (on Active Internet Measurement Systems Conference, San Diego April 2019).
* G7, ‘[https://www.mofa.go.jp/files/000160279.pdf Principles and Actions on Cyber]’ (Annex to the Ise-Shima Declaration from 27 May 2016).
*G7, ‘[https://www.mofa.go.jp/files/000160279.pdf Principles and Actions on Cyber]’ (Annex to the Ise-Shima Declaration from 27 May 2016).
*G8, ‘[https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2011_05/20110926_110526-G8-Summit-Deauville.pdf Declaration: Renewed Commitment for Freedom and Democracy]’ (Summit of Deauville, 27 May 2011).
*G8, ‘[https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2011_05/20110926_110526-G8-Summit-Deauville.pdf Declaration: Renewed Commitment for Freedom and Democracy]’ (Summit of Deauville, 27 May 2011).
*G20, ‘[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf Leaders’ Communiqué]’ (15–16 November 2015).
*G20, ‘[http://www.consilium.europa.eu/media/23729/g20-antalya-leaders-summit-communique.pdf Leaders’ Communiqué]’ (15–16 November 2015).
Line 202: Line 218:
*ICRC, ‘[https://shop.icrc.org/a-guide-to-the-legal-review-of-new-weapons-means-and-methods-of-warfare-pdf-en A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977]’ (Kathleen Lawand (ed), ICRC 2006).
*ICRC, ‘[https://shop.icrc.org/a-guide-to-the-legal-review-of-new-weapons-means-and-methods-of-warfare-pdf-en A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977]’ (Kathleen Lawand (ed), ICRC 2006).
*ICRC, ‘[http://www.icrc.org/en/download/file/108983/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf International Humanitarian Law and Cyber Operations during Armed Conflicts: ICRC Position Paper]’ (November 2019).
*ICRC, ‘[http://www.icrc.org/en/download/file/108983/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf International Humanitarian Law and Cyber Operations during Armed Conflicts: ICRC Position Paper]’ (November 2019).
*ICRC, '[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/01_when_does_ihl_apply-0.pdf When does International Humanitarian Law apply to the Use of Information and Communications Technologies?]' (7 March 2023).
*ICRC, ‘[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/02_humanity_and_necessity-0.pdf The Principles of Humanity and Necessity]' (7 March 2023).
*ICRC, ‘[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/03_distinction-0.pdf The Principle of Distinction]’ (7 March 2023).
*ICRC, ‘[https://www.icrc.org/sites/default/files/wysiwyg/war-and-law/04_proportionality-0.pdf The Principle of Proportionality]’ (7 March 2023).
*Andraz Kastelic, '[https://unidir.org/sites/default/files/2022-01/UNIDIR_Non-Escalatory_Attribution_International_Cyber_Incidents.pdf Non-Escalatory Attribution of International Cyber Incidents: Facts, International Law and Politics]’ (UNIDIR 2022).
*Harriet Moynihan, ‘[https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks The Application of International Law to State Cyberattacks: Sovereignty and Non-intervention]’ (Chatham House, 2019).
*Harriet Moynihan, ‘[https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks The Application of International Law to State Cyberattacks: Sovereignty and Non-intervention]’ (Chatham House, 2019).
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
*North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/ic/natohq/official_texts_112964.htm Wales Summit Declaration]’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
* North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/en/natohq/official_texts_133169.htm Warsaw Summit Communiqué]’ (issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw, 9 July 2016).
*North Atlantic Treaty Organization, ‘[https://www.nato.int/cps/en/natohq/official_texts_133169.htm Warsaw Summit Communiqué]’ (issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw, 9 July 2016).
*Organization for Security and Cooperation in Europe, ‘[https://www.osce.org/pc/227281?download=true Decision No. 1202, OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies]’ (Permanent Council, 10 March 2016) PC.DEC/1202.
*Organization for Security and Cooperation in Europe, ‘[https://www.osce.org/pc/227281?download=true Decision No. 1202, OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies]’ (Permanent Council, 10 March 2016) PC.DEC/1202.
* ‘[https://www.elac.ox.ac.uk/the-oxford-statement-on-the-international-law-protections-against-cyber-operations-targeting-the-hea Oxford Statement on the International Law Protections against Cyber Operations Targeting the Health-Care Sector]’ (20 May 2020).
*‘[https://www.elac.ox.ac.uk/the-oxford-statement-on-the-international-law-protections-against-cyber-operations-targeting-the-hea Oxford Statement on the International Law Protections against Cyber Operations Targeting the Health-Care Sector]’ (20 May 2020).
* Permanent Mission of Liechtenstein to the United Nations, ‘[https://www.regierung.li/files/medienarchiv/The-Council-of-Advisers-Report-on-the-Application-of-the-Rome-Statute-of-the-International-Criminal-Court-to-Cyberwarfare.pdf The Council of Advisers’ Report on the Application of the Rome Statute of the International Criminal Court to Cyberwarfare]’ (August 2021).
*Permanent Mission of Liechtenstein to the United Nations, ‘[https://www.regierung.li/files/medienarchiv/The-Council-of-Advisers-Report-on-the-Application-of-the-Rome-Statute-of-the-International-Criminal-Court-to-Cyberwarfare.pdf The Council of Advisers’ Report on the Application of the Rome Statute of the International Criminal Court to Cyberwarfare]’ (August 2021).
*‘[http://legal.un.org/ilc/documentation/english/a_cn4_534.pdf Sixth report on unilateral acts of States]’ (30 May 2003) by Victor Rodríguez Cedeño, Special Rapporteur, UN Doc A/CN.4/534.
*‘[http://legal.un.org/ilc/documentation/english/a_cn4_534.pdf Sixth report on unilateral acts of States]’ (30 May 2003) by Victor Rodríguez Cedeño, Special Rapporteur, UN Doc A/CN.4/534.
* ‘[https://elac.web.ox.ac.uk/article/the-second-oxford-statement#/ The Second Oxford Statement on International Law Protections of the Healthcare Sector During COVID-19: Safeguarding Vaccine Research]’ (7 August 2020).
*‘[https://elac.web.ox.ac.uk/article/the-second-oxford-statement#/ The Second Oxford Statement on International Law Protections of the Healthcare Sector During COVID-19: Safeguarding Vaccine Research]’ (7 August 2020).
*UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, ‘[https://undocs.org/en/A/70/174 Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security]’ (UN Doc A/70/174, 22 July 2015).
*UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, ‘[https://undocs.org/en/A/70/174 Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security]’ (UN Doc A/70/174, 22 July 2015).
*UN Human Rights Committee, ‘[https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/Download.aspx?symbolno=CCPR%2FC%2FSR.1405&Lang=en Summary Record of the 1405th Meeting]’ (CCPR/C/SR.1405, 31 March 1995) [20].
*UN Human Rights Committee, ‘[https://tbinternet.ohchr.org/_layouts/15/treatybodyexternal/Download.aspx?symbolno=CCPR%2FC%2FSR.1405&Lang=en Summary Record of the 1405th Meeting]’ (CCPR/C/SR.1405, 31 March 1995) [20].

Latest revision as of 12:37, 28 June 2024

Books and monographs[edit | edit source]

Contributions to edited collections[edit | edit source]

Edited books and reference texts[edit | edit source]

Journal articles[edit | edit source]

International treaties, resolutions and other legislative documents[edit | edit source]

Blog posts and other online sources[edit | edit source]