In the given article author studies the theoretical basis of the ‘cyber warfare’ phenomenon and analyzes its different definitions. In his analysis the author compares different definitions and their wording. The author gives definitions to some interrelated terms and phrases. According to him, apart from goals and objectives, a proper full definition should also mention possible parties to the conflict, suggest a list of possible targets, suggest a list of the “weapons” used in cyber warfare. The author points out that without a detailed definition that takes into consideration all aspects of cyber warfare, it is highly problematic, if possible at all, to come up with proper legal tools against cyber wars. At the end of the article the aut...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
The internet has created enormous global changes. People can interact with others anyplace, anytime ...
Objectives: This article explains the concepts of cyber conflict attributes in relation to the class...
The article will examine the applicability of international laws to cyber affairs by focusing on cyb...
The article considers the applicability of existing international rules on the use of force to cyber...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
This article explores the definition of the term “cyberterrorism” in light of available literature a...
The objective of this article is to analyze the concept of “cyber warfare” by contrasting it with th...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
Nowadays, an old fiction known as cyber warfare is coming true. US Pentagon declared Cyber Warfare a...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
The internet has created enormous global changes. People can interact with others anyplace, anytime ...
Objectives: This article explains the concepts of cyber conflict attributes in relation to the class...
The article will examine the applicability of international laws to cyber affairs by focusing on cyb...
The article considers the applicability of existing international rules on the use of force to cyber...
Since the mid-1990s, discussion around the prospect of cyber war has become an increasingly hot topi...
This article explores the definition of the term “cyberterrorism” in light of available literature a...
The objective of this article is to analyze the concept of “cyber warfare” by contrasting it with th...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
Nowadays, an old fiction known as cyber warfare is coming true. US Pentagon declared Cyber Warfare a...
On 24th of February, 2022, the Russian Federation launched an invasion of Ukraine. This is the first...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This thesis examined the relationship between cyber operations and armed attacks to determine when t...
The internet has created enormous global changes. People can interact with others anyplace, anytime ...
Objectives: This article explains the concepts of cyber conflict attributes in relation to the class...