The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to selfdefence when attacked in cyberspace? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of ‘use of force’, ‘armed attack’, and ‘armed conflict’ and asks whether existing laws created for analogue technologies can be applied to new digital developments. The book provides a comprehensive analysis of primary documents and surrounding literature to establish whether and how existing rules on the use of force in in...
Cyber incidents are a growing menace for states and individuals alike. Even though they have been ar...
This article addresses the problem of international lawenforcement within the War on Cyberterrorism....
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
LLM (International Aspects of Law), North-West University, Potchefstroom CampusThe purpose of this r...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Cyber weapons and cyber warfare have become one of the most dangerous innovations of recent years, a...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Cyber-attacks are becoming more advanced, and more dangerous, but can these simple lines of code be ...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyber incidents are a growing menace for states and individuals alike. Even though they have been ar...
This article addresses the problem of international lawenforcement within the War on Cyberterrorism....
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
LLM (International Aspects of Law), North-West University, Potchefstroom CampusThe purpose of this r...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Cyber weapons and cyber warfare have become one of the most dangerous innovations of recent years, a...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Cyber-attacks are becoming more advanced, and more dangerous, but can these simple lines of code be ...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyber incidents are a growing menace for states and individuals alike. Even though they have been ar...
This article addresses the problem of international lawenforcement within the War on Cyberterrorism....
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...