This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks. It first identifies when cyber attacks qualify as ‘attacks’ under the law of armed conflict and then examines the two elements of the definition of ‘military objective’ contained in Article 52(2) of the 1977 Protocol I additional to the 1949 Geneva Conventions on the Protection of Victims of War. The Chapter concludes that this definition is flexible enough to apply in the cyber context without significant problems and that none of the challenges that characterize cyber attacks hinders the application of the principle of distinction
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
The conduct of hostilities via cyberspace poses many issues regarding the application of internation...
While the rules of the jus in bello are generally operative in cyberspace, it appears to be problema...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
International humanitarian law (IHL) presently faces a number of complicated challenges. The issue o...
The main objective of my thesis is to argue whether a human dignity-oriented interpretation of the s...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
The conduct of hostilities via cyberspace poses many issues regarding the application of internation...
While the rules of the jus in bello are generally operative in cyberspace, it appears to be problema...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
International humanitarian law (IHL) presently faces a number of complicated challenges. The issue o...
The main objective of my thesis is to argue whether a human dignity-oriented interpretation of the s...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...