Cyberwarfare is a warfare with information technology that has developed. It has not been regulated in humanitarian law. Cyber attacks have been carried out by several countries by ignoring the Just War Theory. This article aims to analyze the implementation of the Just War theory in cyber warfare according to international humanitarian law in the case of conflict between the Russian and Georgia in 2008. The research method use the normative juridical and using secondary data sources. Qualitative data using deductive conclusion method. Based on the research results, it is known that the just war theory including jus ad bellum, jus in bello and jus post bellum is not applied in cyberwarfare. The Russian’s cyber attack against Georgia vi...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
INTRODUCTION. The article analyses the problem of cyber espionage in the context of armed conflict i...
This study explores the policies of the North Atlantic Treaty Organization (NATO) and Indonesia in t...
Cyber warfare merupakan bentuk perang baru yang memanfaatkan malware komputer sebagai senjata dan c...
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States sh...
This Independent Study project is centered around an ethical exploration of cyber warfare. The quest...
LLM (International Aspects of Law), North-West University, Potchefstroom CampusThe purpose of this r...
IVAN HILMI ALVIANTO, Hukum Internasional, Fakultas Hukum UniversitasBrawijaya, Juli 2013, Tinjauan M...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
ABSTRACTTechnological development has given rise to new means and methods of warfare such as cyber-a...
Agus Khairi Pratama Putra, Setyo Widagdo, Patricia Audrey Ruslijanto Fakultas Hukum Universitas Braw...
Proceedings of the 10th International Conference on Internet, Law & Politics, July 2014This article ...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
The paper is presenting the examination of the cyberwarfare phenomenon in its legal context. The cyb...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
INTRODUCTION. The article analyses the problem of cyber espionage in the context of armed conflict i...
This study explores the policies of the North Atlantic Treaty Organization (NATO) and Indonesia in t...
Cyber warfare merupakan bentuk perang baru yang memanfaatkan malware komputer sebagai senjata dan c...
According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States sh...
This Independent Study project is centered around an ethical exploration of cyber warfare. The quest...
LLM (International Aspects of Law), North-West University, Potchefstroom CampusThe purpose of this r...
IVAN HILMI ALVIANTO, Hukum Internasional, Fakultas Hukum UniversitasBrawijaya, Juli 2013, Tinjauan M...
This chapter examines the application of international humanitarian law to cyber warfare in the sens...
ABSTRACTTechnological development has given rise to new means and methods of warfare such as cyber-a...
Agus Khairi Pratama Putra, Setyo Widagdo, Patricia Audrey Ruslijanto Fakultas Hukum Universitas Braw...
Proceedings of the 10th International Conference on Internet, Law & Politics, July 2014This article ...
Cyber warfare is an emerging form of warfare not explicitly addressed by existing international law....
The paper is presenting the examination of the cyberwarfare phenomenon in its legal context. The cyb...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
INTRODUCTION. The article analyses the problem of cyber espionage in the context of armed conflict i...