€98.00 incl. VAT €92.45 excl. VAT
Available shipped within 3-5 business days
100% secure payment
payments maestro mastercard visa payments
Questions about this product? Contact our customer service

Cyber Warfare

Military Cross-Border Computer Network Operations under International Law (paperback)

Book | 1st edition 2014 | World | Johann-Christoph Woltag
Description

In the last five years the topic of cyber warfare has received much attention due to several so-called “cyber incidents” which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.

This book is written for academics in public international law and practitioners from the military and other public security sectors.

Technical info
More Information
Type of product Book
Format Paperback
EAN / ISSN 9781839702358
Series name International Law
Weight 520 g
Status Available
Number of pages xviii + 314 p.
Access to exercice No
Publisher Intersentia
Language English
Publication Date May 6, 2014
Available on Jurisquare No
Available on Strada Belgique No
Available on Strada Europe No
Available on Strada Luxembourg No
Chapters

Downloads

  • Table of contents and preliminary pages
  • Introduction
  • Chapter 1. A Survey of Computer Network Operations
  • Chapter 2. The Legal Regime of Cyberspace
  • Chapter 3. Computer Network Operations Outside of Armed Conflict
  • Chapter 4. The Justified Use of Forceful Computer Network Operations
  • Chapter 5. Computer Network Operations During an International Armed Conflict
  • Chapter 6. Neutrality in Cyber Warfare
  • Computer Network Operations Restrained