Bibliography: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(Added sources from Case study 16 + oscola editing)
(added sources from case study 17 + oscola editing)
Line 4: Line 4:
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
* William H Boothby, ''[http://opil.ouplaw.com/view/10.1093/law/9780199696611.001.0001/law-9780199696611 The Law of Targeting]'' (OUP 2012).
*William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016).
*William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016).
*Dennis Broeders, ''The Public Core of the Internet'' (Amsterdam University Press 2015).
*Ian Brownlie, ''[http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780198251583.001.0001/acprof-9780198251583 International Law and the Use of Force by States]'' (OUP 1963).
*Ian Brownlie, ''[http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780198251583.001.0001/acprof-9780198251583 International Law and the Use of Force by States]'' (OUP 1963).
* Oliver Corten, ''The Law against War'' (Hart Pub 2010).
* Oliver Corten, ''The Law against War'' (Hart Pub 2010).
* James Crawford, ''Brownlie's Principles of Public International Law'' (OUP 2012).
* James Crawford, ''Brownlie's Principles of Public International Law'' (OUP 2012).
* James Crawford, ''State Responsibility: The General Part'' (CUP 2013).
* James Crawford, ''State Responsibility: The General Part'' (CUP 2013).
*Martin Dawidowicz, ''Third-Party Countermeasures in International Law'' (CUP 2017).
* François Delerue, ''[https://doi.org/10.1017/9781108780605 Cyber Operations and International Law]'' (CUP 2020).
* François Delerue, ''[https://doi.org/10.1017/9781108780605 Cyber Operations and International Law]'' (CUP 2020).
* Heather H Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012).
* Heather H Dinniss, ''[https://doi.org/10.1017/CBO9780511894527 Cyber Warfare and the Laws of War]'' (CUP 2012).
Line 13: Line 15:
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
* Yoram Dinstein, ''[https://doi.org/10.1017/CBO9781107279391 Non-International Armed Conflicts in International Law]'' (CUP 2014).
* Christine Gray, ''International Law and the use of force'' (OUP 2018).
* Christine Gray, ''International Law and the use of force'' (OUP 2018).
*Eleni Katselli Proukaki, ''The Problem of Enforcement in International Law'' (Routledge 2010).
*Natalie Klein, ''Maritime Security and the Law of the Sea'' (OUP 2012).
*Natalie Klein, ''Maritime Security and the Law of the Sea'' (OUP 2012).
* Joanna Kulesza, ''Due Diligence in International Law'' (Brill 2016).
* Joanna Kulesza, ''Due Diligence in International Law'' (Brill 2016).
Line 37: Line 40:
*Albert J. Hoffmann, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1199 Freedom of Navigation]’ in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2011).
*Albert J. Hoffmann, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1199 Freedom of Navigation]’ in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2011).
*Jan K. Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), ''[http://opil.ouplaw.com/view/10.1093/law/9780199658800.001.0001/law-9780199658800 The Handbook of International Humanitarian Law]'' (3rd edn, OUP 2013).
*Jan K. Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), ''[http://opil.ouplaw.com/view/10.1093/law/9780199658800.001.0001/law-9780199658800 The Handbook of International Humanitarian Law]'' (3rd edn, OUP 2013).
*Jeff Kosseff, ‘Retorsion as a Response to Ongoing Cyber Operations’ in Taťána Jančárková et al (eds), ''20/20 Vision: The Next Decade'' (NATO CCD COE 2020).
*Natalie Klein, ‘Maritime Security’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), ''[https://www.oxfordhandbooks.com/view/10.1093/law/9780198715481.001.0001/oxfordhb-9780198715481 The Oxford Handbook of the Law of the Sea]'' (OUP 2015).
*Natalie Klein, ‘Maritime Security’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), ''[https://www.oxfordhandbooks.com/view/10.1093/law/9780198715481.001.0001/oxfordhb-9780198715481 The Oxford Handbook of the Law of the Sea]'' (OUP 2015).
*Doris König, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1166 Flag of Ships]’ in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2009).
*Doris König, ‘[https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1166 Flag of Ships]’ in Rüdiger Wolfrum (ed), ''Max Planck Encyclopedia of Public International Law'' (OUP 2008, updated April 2009).
Line 43: Line 47:
*Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
*Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), ''The Charter of the United Nations: A Commentary'' (OUP 2012).
*Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199639762.001.0001/law-9780199639762 The Charter of the United Nations: A Commentary]'' (3rd edn, OUP 2012).
*Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), ''[http://opil.ouplaw.com/view/10.1093/law/9780199639762.001.0001/law-9780199639762 The Charter of the United Nations: A Commentary]'' (3rd edn, OUP 2012).
*Przemysław Roguski, ‘Collective Countermeasures in Cyberspace: ''Lex lata,'' Progressive Development or a Bad Idea?’ in Taťána Jančárková et al (eds), ''20/20 Vision: The Next Decade'' (NATO CCD COE 2020).
*Waldemar A Solf, ‘Article 37: Prohibition of Perfidy’ in Michael Bothe et al (eds), ''New Rules for Victims of Armed Conflicts'' (Brill 1982).
*Waldemar A Solf, ‘Article 37: Prohibition of Perfidy’ in Michael Bothe et al (eds), ''New Rules for Victims of Armed Conflicts'' (Brill 1982).
*Waldemar A Solf, ‘Article 38: Recognized Emblems’ in Michael Bothe et al (eds), ''New Rules for Victims of Armed Conflicts'' (Brill 1982).
*Waldemar A Solf, ‘Article 38: Recognized Emblems’ in Michael Bothe et al (eds), ''New Rules for Victims of Armed Conflicts'' (Brill 1982).
Line 67: Line 72:
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law and Policy 115.
*Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law and Policy 115.
*Gary Brown and Keira Poellet, ''‘''The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
*Gary Brown and Keira Poellet, ''‘''The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
*Russell Buchan ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’ (2012) 17 Journal of Conflict and Security Law 212
*Russell Buchan, ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’ (2012) 17 Journal of Conflict and Security Law 212.
*Elena Chachko, ‘Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’ (2019) 44 Yale Journal of International Law 1.
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
*Luke Chircop, ‘[https://doi.org/10.1017/S0020589318000015 A Due Diligence Standard of Attribution in Cyberspace]’ (2018) 67 ICLQ 643.
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
*Gary P. Corn and Robert Taylor, ‘[https://doi.org/10.1017/aju.2017.57 Sovereignty in the Age of Cyber]’ (2017) 111 AJIL Unbound 207.
*Gary P. Corn and Eric T. Jensen, ‘The Use of Force and Cyber Countermeasures’ (2018) 32 Temple International and Comparative Law Journal 127.
*Gary P. Corn and Eric T. Jensen, ‘The Use of Force and Cyber Countermeasures’ (2018) 32 Temple International and Comparative Law Journal 127.
*Martin Dawidowicz, ‘Third-Party Countermeasures: A Progressive Development of International Law? - QIL QDI’ (2016) 29 Questions of International Law 3.
*Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 Virginia J Int'l L 291.
*Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 Virginia J Int'l L 291.
*Heather H Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 Isr L Rev 39.
*Heather H Dinniss, ‘[https://heinonline.org/HOL/P?h=hein.journals/israel48&i=41 The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives]’ (2015) 48 Isr L Rev 39.
Line 76: Line 83:
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL 583.
*Dan Efrony and Yuval Shany, '[https://doi.org/10.1017/ajil.2018.86 A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice]' (2018) 112 AJIL 583.
*David Fidler, ‘[https://www.asil.org/insights/volume/17/issue/10/economic-cyber-espionage-and-international-law-controversies-involving Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies]’ (2013) 17/10 ASIL Insights.
*David Fidler, ‘[https://www.asil.org/insights/volume/17/issue/10/economic-cyber-espionage-and-international-law-controversies-involving Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies]’ (2013) 17/10 ASIL Insights.
*Carlo Focarelli, ‘International Law and Third-Party Countermeasures in the Age of Global Instant Communication’ (2016) 29 Questions of International Law 17.
*Jack Goldsmith, ‘''[http://www.ejil.org/pdfs/24/1/2374.pdf How Cyber Changes the Laws of War]''’ (2013) 24 EJIL 129.
*Jack Goldsmith, ‘''[http://www.ejil.org/pdfs/24/1/2374.pdf How Cyber Changes the Laws of War]''’ (2013) 24 EJIL 129.
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
*James Green, ‘[https://doi.org/10.1017/S0020589308000833 Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice]’ (2009) 58 ICLQ 163.
Line 81: Line 89:
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
*Wolff Heintschel von Heinegg, '[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?referer=https://www.google.ee/&httpsredir=1&article=1027&context=ils Territorial Sovereignty and Neutrality in Cyberspace]' (2013) 89 Int’l L Stud 123.
*Maziar Jamnejad and Michael Wood, ‘Prohibition of Intervention’ (2009) 22 LJIL 345.
*Maziar Jamnejad and Michael Wood, ‘Prohibition of Intervention’ (2009) 22 LJIL 345.
*Jeff Kosseff, ‘Collective Countermeasures in Cyberspace’ (2020) 10 Notre Dame Journal of International and Comparative Law 1.
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
*David Kretzmer, ‘[http://www.ejil.org/pdfs/24/1/2380.pdf The Inherent Right to Self-Defence and Proportionality in ''Jus Ad Bellum'']’ (2013) 24 EJIL 235.
*Patricia Kwast, ‘Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the ''Guyana/Suriname'' Award’ (2008) 13 Journal of Conflict and Security Law 1.
*Patricia Kwast, ‘Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the ''Guyana/Suriname'' Award’ (2008) 13 Journal of Conflict and Security Law 1.
Line 93: Line 102:
*Sean K Price, ‘[https://harvardnsj.org/2020/02/perfidy-in-cyberspace-the-requirement-for-human-confidence/ Perfidy in Cyberspace: The Requirement for Human Confidence]’ (2020) Harv. Nat'l Sec. J. Online.
*Sean K Price, ‘[https://harvardnsj.org/2020/02/perfidy-in-cyberspace-the-requirement-for-human-confidence/ Perfidy in Cyberspace: The Requirement for Human Confidence]’ (2020) Harv. Nat'l Sec. J. Online.
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
*Darien Pun, ‘[https://doi.org/10.1093/jcsl/krw014 Rethinking Espionage in the Modern Era]’ (2017) 18 Chicago JIL 353.
*Barrie Sander, ‘[https://doi.org/10.1093/chinesejil/jmz003 Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections]’, (2019) 18 Chinese JIL __ (forthcoming).
*Barrie Sander, ‘[https://doi.org/10.1093/chinesejil/jmz003 Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections]’ (2019) 18 Chinese Journal of International Law 1.
*Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
*Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
*Michael N Schmitt, ‘Computer Network Attack and Use of Force in International Law: Thoughts on a Normative Framework’ (1999) 37 Columbia Journal of Transnational Law 885.
*Michael N Schmitt, ‘Computer Network Attack and Use of Force in International Law: Thoughts on a Normative Framework’ (1999) 37 Columbia Journal of Transnational Law 885.
Line 154: Line 163:
*President of the United States, [https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’] (2011).
*President of the United States, [https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’] (2011).
*‘President Xi Jinping’s State Visit to the United States: [https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states FACT SHEET]’ (25 September 2015).
*‘President Xi Jinping’s State Visit to the United States: [https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states FACT SHEET]’ (25 September 2015).
*Michael N Schmitt and Jeffrey Biller, ‘[https://www.ejiltalk.org/the-notpetya-cyber-operation-as-a-case-study-of-international-law/ The NotPetya Cyber Operation as a Case Study of International Law]’, ''EJIL: Talk!'', 11 July 2017.
*Michael N Schmitt, ‘[https://www.justsecurity.org/64490/estonia-speaks-out-on-key-rules-for-cyberspace/ Estonia Speaks Out on Key Rules for Cyberspace]’ ''JustSecurity'' , 10 June 2019.
*Michael N Schmitt and Sean Fahey, ‘[https://www.justsecurity.org/50038/wannacry-international-law-cyberspace/ WannaCry and the International Law of Cyberspace]’, ''JustSecurity'', 22 December 2017.
*Michael N Schmitt, ‘[https://www.justsecurity.org/66194/frances-major-statement-on-international-law-and-cyber-an-assessment/ France’s Major Statement on International Law and Cyber: An Assessment]’ ''JustSecurity'', 16 September 2019.
*Michael N Schmitt and Jeffrey Biller, ‘[https://www.ejiltalk.org/the-notpetya-cyber-operation-as-a-case-study-of-international-law/ The NotPetya Cyber Operation as a Case Study of International Law]’ ''EJIL: Talk!'', 11 July 2017.
*Michael N Schmitt and Sean Fahey, ‘[https://www.justsecurity.org/50038/wannacry-international-law-cyberspace/ WannaCry and the International Law of Cyberspace]’ ''JustSecurity'', 22 December 2017.
*Jeremy Wright, QC MP, UK Attorney General ‘[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]’ (23 May 2018).
*Jeremy Wright, QC MP, UK Attorney General ‘[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]’ (23 May 2018).

Revision as of 12:55, 6 September 2021

Books and monographs

  • William H Boothby, The Law of Targeting (OUP 2012).
  • William H Boothby, Weapons and the Law of Armed Conflict (OUP 2016).
  • Dennis Broeders, The Public Core of the Internet (Amsterdam University Press 2015).
  • Ian Brownlie, International Law and the Use of Force by States (OUP 1963).
  • Oliver Corten, The Law against War (Hart Pub 2010).
  • James Crawford, Brownlie's Principles of Public International Law (OUP 2012).
  • James Crawford, State Responsibility: The General Part (CUP 2013).
  • Martin Dawidowicz, Third-Party Countermeasures in International Law (CUP 2017).
  • François Delerue, Cyber Operations and International Law (CUP 2020).
  • Heather H Dinniss, Cyber Warfare and the Laws of War (CUP 2012).
  • Yoram Dinstein, The Conduct of Hostilities under the Law of International Armed Conflict (CUP 2016).
  • Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014).
  • Christine Gray, International Law and the use of force (OUP 2018).
  • Eleni Katselli Proukaki, The Problem of Enforcement in International Law (Routledge 2010).
  • Natalie Klein, Maritime Security and the Law of the Sea (OUP 2012).
  • Joanna Kulesza, Due Diligence in International Law (Brill 2016).
  • Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018).
  • René Provost, International Human Rights and Humanitarian Law (CUP 2002).
  • Marco Roscini, Cyber Operations and the Use of Force in International Law (OUP 2014).
  • Gary D Solis, The Law of Armed Conflict: International Humanitarian Law in War (CUP 2016).
  • Nigel White, The Law of International Organizations (Juris 2005).
  • Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017) .

Contributions to edited collections

  • Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
  • Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
  • Gary P. Corn and Peter P. Pascucci, ‘The Law of Armed Conflict Implications of Covered or Concealed Cyber Operations: Perfidy, Ruses, and the Principle of Passive Distinction’ in Ronald T. P. Alcala and Eric T. Jensen (eds), The Impact of Emerging Technologies on the Law of Armed Conflict (OUP 2019).
  • Jean D’Aspremont, ‘Persona Non Grata’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Oliver Dörr and Albrecht Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’ in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
  • Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
  • Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Terry D. Gill, ‘Non-intervention in the Cyber Context’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
  • Douglas Guilfoyle, ‘The High Seas’ (2015) in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Wolff Heintschel von Heinegg, ‘Warships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated October 2015)
  • Albert J. Hoffmann, ‘Freedom of Navigation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2011).
  • Jan K. Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
  • Jeff Kosseff, ‘Retorsion as a Response to Ongoing Cyber Operations’ in Taťána Jančárková et al (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
  • Natalie Klein, ‘Maritime Security’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Doris König, ‘Flag of Ships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2009).
  • Philip Kunig, ‘Prohibition of Intervention’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2008).
  • Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), The Law of International Responsibility (OUP 2010).
  • Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
  • Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
  • Przemysław Roguski, ‘Collective Countermeasures in Cyberspace: Lex lata, Progressive Development or a Bad Idea?’ in Taťána Jančárková et al (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
  • Waldemar A Solf, ‘Article 37: Prohibition of Perfidy’ in Michael Bothe et al (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Waldemar A Solf, ‘Article 38: Recognized Emblems’ in Michael Bothe et al (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Waldemar A Solf, ‘Article 39: Emblems of Nationality’ in Michael Bothe et al (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
  • Yoshifumi Tanaka, ‘Navigational Rights and Freedoms’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
  • Silja Vöneky, ‘Analogy in International Law’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
  • Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
  • Katja Ziegler, ‘Domaine Réservé’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2013).

Edited books and reference texts

Journal articles

International treaties, reports and other public documents

Blog posts and other online sources