This chapter evaluates the potential for legal regulation of the resort to cyber warfare between states under the ‘jus ad bellum’ (the law on the use of force). Debate in the literature has largely concerned whether cyber warfare falls within the scope of Article 2(4) UNC. The first part of this chapter sets out this debate. It then goes on to argue that the ‘Article 2(4) debate’ often misses the fact that an act of cyber warfare can be considered a breach of a different legal rule: the principle of non-intervention. The chapter further considers some of the issues in applying either the prohibition of the use of force or the principle of non-intervention to cyber warfare, and then concludes by arguing that the debate should be reorient...
Technological advance is a double edge sword. Computer systems that monitor and control industrial i...
Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear cent...
In international law discourse on cyber attacks, there has been much focus on the threshold for the ...
The use of force is resorted by States as a form of dispute settlement generally as a last resort. B...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyber-attacks-efforts to alter, disrupt, or destroy computer systems, networks, or the information o...
LLM (International Aspects of Law), North-West University, Potchefstroom CampusThe purpose of this r...
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
The article considers the applicability of existing international rules on the use of force to cyber...
Abstract. Article 2(4) of the UN Charter provides that nation-states will refrain from the threat or...
Paper Presented at the University of Toronto Political Science Undergraduate Research Conference 201...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
The authors concentrate on the legal framework for cyber operations. Analysing this framework, cover...
Technological advance is a double edge sword. Computer systems that monitor and control industrial i...
Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear cent...
In international law discourse on cyber attacks, there has been much focus on the threshold for the ...
The use of force is resorted by States as a form of dispute settlement generally as a last resort. B...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyber-attacks-efforts to alter, disrupt, or destroy computer systems, networks, or the information o...
LLM (International Aspects of Law), North-West University, Potchefstroom CampusThe purpose of this r...
There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fa...
The article considers the applicability of existing international rules on the use of force to cyber...
Abstract. Article 2(4) of the UN Charter provides that nation-states will refrain from the threat or...
Paper Presented at the University of Toronto Political Science Undergraduate Research Conference 201...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyber operations possess unique attributes that pose significant challenges for the application of i...
The authors concentrate on the legal framework for cyber operations. Analysing this framework, cover...
Technological advance is a double edge sword. Computer systems that monitor and control industrial i...
Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear cent...
In international law discourse on cyber attacks, there has been much focus on the threshold for the ...