Listing 1 - 10 of 111 << page
of 12
>>
Sort by

Book
International law as we know it : cyberwar discourse and the construction of knowledge in international legal scholarship
Author:
ISBN: 1108676561 1108666361 1108484832 1108657079 Year: 2021 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as constructing knowledge within a particular academic discipline. By means of three close-ups of the discourse on cyberwar and international law, this book shows how international legal knowledge is constructed in ways usually overlooked: by means of footnotes, for example, or conference presentations. In so doing, this book aims to present a new way of seeing international legal scholarship: one that pays attention to the mundane parts of international legal texts and provides a different understanding of how international law as we know it comes about.


Book
Cyber operations and international law
Author:
ISBN: 110880117X 1108780601 1108807704 1108490271 110874835X Year: 2020 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.


Book
Unilateral remedies to cyber operations : self-defence, countermeasures, necessity, and the question of attribution
Author:
ISBN: 1108847870 1108807054 1108479863 110884622X Year: 2020 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a state faces when considering a reaction to a malicious cyber operation conducted by an adversarial state. While often invoked in political debates and widely analysed in international legal scholarship, self-defence and countermeasures will often remain unavailable to states in situations of cyber emergency due to the pervasive problem of reliable and timely attribution of cyber operations to state actors. Analysing the legal questions surrounding attribution in detail, the book presents the necessity defence as an evidently available alternative. However, the shortcomings of the doctrine as based in customary international law that render it problematic as a remedy for states are examined in-depth. In light of this, the book concludes by outlining a special emergency regime for cyberspace.


Book
Responses to cyber terrorism
Authors: ---
ISBN: 6611733582 128173358X 9786611733582 1607503115 6000005393 1433711397 9781607503118 9781433711398 9781586038366 Year: 2008 Publisher: Washington, DC : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The one issue touched on repeatedly by the contributors of this publication is the difficulty of arriving at a definition of cyber terrorism. A NATO Office of Security document cautiously defines it as ""a cyber attack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal."" But the cyber world is surely remote from what is recognized as terrorism: the bloody attacks and ethnic conflicts, or, more precisely, the politically-motivated ""intention to cause death or serious bodily h


Book
Proceedings, WOMBAT Workshop on Information Security Threats Data Collection and Sharing : WISTDCS 2008, 21-22 April 2008, Amsterdam, Netherlands
Authors: ---
ISBN: 0769533477 150907757X Year: 2008 Publisher: [Place of publication not identified] IEEE Computer Society


Book
ICCC : 2014 6th International Conference on Cyber Conflict : proceedings : 3-6 June 2014, Tallinn, Estonia
Authors: ---
ISBN: 994995441X 9949954401 1479951137 Year: 2014 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2012 4th International Conference on Cyber Conflict
Author:
ISBN: 9949904099 1467312703 Year: 2012 Publisher: [Place of publication not identified] IEEE

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyberterrorism.
Author:
ISBN: 0754624269 9780754624264 Year: 2004 Publisher: Aldershot Ashgate

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Inside the enemy's computer : identifying cyber attackers
Author:
ISBN: 0190848502 9780190848507 Year: 2017 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Attribution is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. This work examines this important topic.


Book
CyCon : 2018 10th International Conference on Cyber Conflict : CyCon X : maximising effects : 30 May-01 June 2018, Tallinn, Estonia
Authors: --- --- --- ---
ISBN: 9949990432 1538652595 Year: 2018 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 111 << page
of 12
>>
Sort by