Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics holds that if the effects or consequences of such intrusions are sufficiently damaging, international humanitarian law (IHL) should generally govern them--and recourse to armed force may also be justified against states responsible for these actions under the jus ad bellum. This Article argues, however, that there are serious problems and perils in relying on analogies with physical armed force to extend these legal regimes to most events in cyberspace. Armed conflict models applied to the use of information as a weapon and a target are instead likely to generate legal phantoms in cyberspace--that is, situations in which numerous policy questio...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics hold...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
This article presents a novel way to conceptualize the protection of data in situations of armed con...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyberwarfare, military activities in cyberspace conducted by a state against another state and inten...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
Cyber exploitation is a new means of intelligence gathering. It refers to unauthorized access to com...
A Dissertation Submitted in Partial Fulfillment of the Requirements for the Award of the Degree of B...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics hold...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Power outages, manipulations of data, and interruptions of Internet access are all possible effects ...
This article presents a novel way to conceptualize the protection of data in situations of armed con...
The increasing number of cyberattacks has transformed ‘Cyberspace ’ into a “battlefield”, bringing o...
The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, ...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyberwarfare, military activities in cyberspace conducted by a state against another state and inten...
This report examines the militarization of cyberspace and considers ways to prevent the Internet fro...
Cyber exploitation is a new means of intelligence gathering. It refers to unauthorized access to com...
A Dissertation Submitted in Partial Fulfillment of the Requirements for the Award of the Degree of B...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...