Bibliography
(This page is currently under construction.)
Books and monographs
- William H Boothby, The Law of Targeting (OUP 2012).
- William H Boothby, Weapons and the Law of Armed Conflict (OUP 2016).
- Oliver Corten, The Law against War (Hart Pub. 2010).
- James Crawford, Brownlie's Principles of Public International Law (OUP 2012).
- James Crawford, State Responsibility: The General Part (CUP 2013).
- H Harrison Dinniss, Cyber Warfare and the Laws of War (CUP 2012)
- Yoram Dinstein (ed), The Conduct of Hostilities under the Law of International Armed Conflict (CUP 2016).
- Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014).
- Christine Gray, International Law and the use of force (OUP 2018).
- Joanna Kulesza, Due Diligence in International Law (Brill 2016) 266.
- Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018).
- René Provost, International Human Rights and Humanitarian Law (CUP 2002)
- Marco Roscini, Cyber Operations and the Use of Force in International Law (OUP 2014).
- Gary D. Solis, The Law of Armed Conflict: International Humanitarian Law in War (CUP 2016).
- Nigel White, The Law of International Organizations (Juris 2005).
- Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
- Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017) .
Contributions to edited collections
- Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (Eds.) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
- Lindsey Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
- Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
- Jean D’Aspremont, ‘Persona Non Grata’, in Rudiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
- Oliver Dörr and Albrecgr Randelzhofer, ‘Article 2(4)’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
- Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’, in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
- T Ferraro and L Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016)
- Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
- Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
- Franck Latty, ‘Actions and Omissions’ in James Crawford et al (eds), The Law of International Responsibility (OUP 2010).
- Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (OUP 2012).
- Anne Peters, ‘Article 25’ in Bruno Simma et al (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
- Rudiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani et al, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
- Silja Vöneky, ‘Analogy in International Law’, in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
Edited books and reference texts
- MN Schmitt (ed), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (CUP 2017)
Journal articles
- Steven Bellovin, Susan Landau and Herbert Lin, ‘Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications’ (2017) 3(1) Journal of Cybersecurity 59.
- Duncan Blake and Joseph Imburgia, ‘“Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons”’, (2010) 66 Air Force Law Review 157.
- Vincent Boulanin and Maaike Verbruggen, Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies (SIPRI 2017).
- Mark Bromley, ‘Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation’ (2017) SIPRI.
- Gary Brown and Andrew Metcalf, ‘Easier Said Than Done: Legal Reviews of Cyber Weapons’ (2014) 7 Journal of National Security Law & Policy 115.
- Gary Brown and Keira Poellet, ‘The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
- Luke Chircop, ‘A Due Diligence Standard of Attribution in Cyberspace’ (2018) 67 ICLQ 643.
- Gary P. Corn and Robert Taylor, ‘Sovereignty in the Age of Cyber’ (2017) 111 AJIL Unbound 207.
- Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 VA.J.INT’LL. 291.
- Heather A Harrison Dinniss, ‘The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives’ (2015) 48 IsrLR 39.
- Cordula Droege, ‘Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians’ (2012) 94 IRRC 533.
- Dan Efrony and Yuval Shany, 'A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice' (2018) 112 AJIL.
- David Fidler, ‘Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies’ (2013) 17/10 ASIL Insights.
- Jack Goldsmith, ‘How Cyber Changes the Laws of War’ (2013) 24 EJIL 129.
- James Green, ‘Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice’ (2009) 58 ICLQ 163.
- Erika Häger & Carolina Dackö, ‘Economic Espionage: A Report by Mannheimer Swartling’ (2018).
- Fan O Hampson and Michael Sulmeyer (eds), Getting Beyond Norms (CIGI 2017).
- Wolff Heintschel von Heinegg, 'Territorial Sovereignty and Neutrality in Cyberspace' (2013) 89 Int’l L. Stud. 123.
- Catherine Lotrionte, ‘Countering State-Sponsored Cyber Economic Espionage Under International Law’ (2015) 40 N.C. J. INT'L L. & COM. REG. 443.
- Noam Lubell, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 Int’l L Studies 252.
- Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
- Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
- K Mačák, ‘Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law’ (2015) 48 Isr L Rev 55
- Peter Margulies, 'Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility' (2013) 14 MJIL.
- Tim Maurer and Michael Schmitt, ‘Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?’ Just Security, 14th August 2017.
- Marko Milanovic, ‘Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age’ (2015) 56/1 HarvIntlLJ
- Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807
- Darien Pun, ‘Rethinking Espionage in the Modern Era’ (2017) 18 Chicago JIL 353.
- Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
- Michael N. Schmitt, ‘International Cyber Norms: Reflections on the Path Ahead’ (2018) 111 Netherlands’ Military Law Review 12.
- Michael N Schmitt, ‘The Notion of ‘Objects’ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision’ (2015) 48 IsrLR 81.
- Michael N Schmitt, 'Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law' (2018) 19 ChiJIntlL 30.
- Michael N Schmitt and Jeffrey Biller, ‘The NotPetya Cyber Operation as a Case Study of International Law’, EJIL: Talk!, 11 July 2017.
- Michael N Schmitt and Sean Fahey, ‘WannaCry and the International Law of Cyberspace’, JustSecurity, 22 December 2017.
- Michael N. Schmitt and Sean Watts, ‘The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare’ (2015) 50 TexIntlLJ 189.
- Michael N Schmitt and Liis Vihul, ‘Respect for Sovereignty in Cyberspace’ (2017) 95 Tex L Rev. 1639.
- Nicholas Tsagourias ''Cyber Attacks, Self-Defence and the Problem of Attribution' (2012) 17 (2) Journal of Conflict and Security Law 23.
- David Wallace, ‘Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis’ (2018) Tallinn Paper No. 11.
- Sean Watts & Theodore Richard, 'Baseline Territorial Sovereignty and Cyberspace' (2018) 22 Lewis & Clark L. Rev. 771.
International reports and other public documents
- [TBC]
Newspaper articles and online news
- [TBC]
Blog posts and other online sources
- [TBC]