There is no doubt that cyber operations can play a significant role in the conduct of warfare. In fact, an ongoing cyber arms race among states and non-state actors evokes fears among some of a looming ‘digital Pearl Harbour’ or a ‘digital 9/11’. Given these fears, there have been calls for the elaboration of a ‘Digital Geneva Convention’ to protect civilians from the harmful consequences of cyberattacks. In this context, this article focuses on one specific aspect of cyber operations during situations of armed conflict: cyberterrorism as a method of warfare. It examines the extent to which international humanitarian law (IHL), which was primarily designed to govern kinetic means and methods of warfare, applies to cyberterrorism. In so doin...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
War and international humanitarian law (IHL) exist and evolve in a synergistic relationship. On the ...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
Technology plays an important role in everyday life. Technological advancement can be found in every...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
This article addresses the problem of international lawenforcement within the War on Cyberterrorism....
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States sh...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
War and international humanitarian law (IHL) exist and evolve in a synergistic relationship. On the ...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
This article addresses the problem of international law enforcement within the War on Cyberterrorism...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
Technology plays an important role in everyday life. Technological advancement can be found in every...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
This article addresses the problem of international lawenforcement within the War on Cyberterrorism....
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States sh...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...
This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack,...