This thesis examined the relationship between cyber operations and armed attacks to determine when the right of self-defence is triggered by cyber operations. The research question for this thesis was under what circumstances a cyber operation is considered a cyber attack and what kind of self-defence the targeted victim State can use. The thesis concluded that it is not the weaponry used, but the scale and effects of an operation that determines whether it amounts to an armed attack or not. Thus, cyber operations can be amount to armed attacks i.e., cyber attacks if the scale and effects caused by the operations are severe enough. However, the thesis concluded that there are certain challenges regarding the determination of the severity t...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – includin...
When does a cyber-attack (or threat of cyber-attack) give rise to a right of self-defense – includin...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
This article will examine the question of whether the right of self-defense under contemporary inter...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
As States increasingly rely on cyber technology, the threat of international cyberattacks perpetrate...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – includin...
When does a cyber-attack (or threat of cyber-attack) give rise to a right of self-defense – includin...
Cyber attacks are becoming increasingly common as a tool for conducting foreign and security policy....
The last two decades have witnessed increased activity by states within the ‘fifth dimension’ (cyber...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
This article examines the conditions under which a cyber attack can trigger a State’s right to self-...
Cyber is hot. Although the international community, scientists, military and NATO primarily focus on...
This article will examine the question of whether the right of self-defense under contemporary inter...
The internet has changed the rules of many industries, and war is no exception. But can a computer v...
As States increasingly rely on cyber technology, the threat of international cyberattacks perpetrate...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber...
This paper discusses cyber warfare and its intersection with the law of armed conflict. Cyberspace c...