Humanitarian cyber operations would allow democratic states to utilize cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act, ignoring the repressive or failed state’s national sovereignty
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States sh...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
Cyber operations are designed to be a tool for defense, security and war. In the same way as harmles...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
Technology plays an important role in everyday life. Technological advancement can be found in every...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States sh...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
Military cyber capacity, built to be a part of military operations, can be utilized for humanitarian...
Cyber operations are designed to be a tool for defense, security and war. In the same way as harmles...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
State cyber operations that occur during peacetime and fall below the threshold of prohibited uses o...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
Technology plays an important role in everyday life. Technological advancement can be found in every...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States sh...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...