Peacekeeping is an essential tool at the disposal of the United Nations for the maintenance of international peace and security. The growing relevance of cyber technologies presents itself as an opportunity to adapt peacekeeping to the challenges of a rapidly evolving security landscape. This article introduces the notion of "cyber-peacekeeping," defined as the incorporation and use of cyber capabilities by peacekeepers. It discusses the legal basis for cyber-peacekeeping and the foundational principles of consent, impartiality, and use of defensive force. The article examines the use of lethal force by cyber-peacekeepers under the law of armed conflict paradigm. It considers the circumstances under which cyber peacekeepers become a party t...
Proceedings of the 10th International Conference on Internet, Law & Politics, July 2014This article ...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Peacekeeping is an essential tool at the disposal of the United Nations for the maintenance of inter...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical confli...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This article presents a novel way to conceptualize the protection of data in situations of armed con...
This is the final version. Available from Taylor via the DOI in this record. The bright lines betwee...
This article explores the intersection of autonomous cyber capabilities and two primary rules of int...
Proceedings of the 10th International Conference on Internet, Law & Politics, July 2014This article ...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...
Peacekeeping is an essential tool at the disposal of the United Nations for the maintenance of inter...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical confli...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
Cyberphysical societies are becoming reliant upon the cyber domain for everyday life. With cyber war...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
This article presents a novel way to conceptualize the protection of data in situations of armed con...
This is the final version. Available from Taylor via the DOI in this record. The bright lines betwee...
This article explores the intersection of autonomous cyber capabilities and two primary rules of int...
Proceedings of the 10th International Conference on Internet, Law & Politics, July 2014This article ...
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to...
There is a growing consensus in the literature on the applicability of the jus ad bellum to cyber-at...