27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6. References<br />

Alexandru Nitu<br />

Barkham, J. (2001), Information Warfare and International Law on the Use of Force, New York University Journal<br />

of International Law and Politics, vol. 34, pp. 57-113.<br />

Brownlie, I. (1963), International Law and the Use of Force by States, Clarendon Press, Oxford<br />

Charter of the United Nations and Statute of the International Court of Justice (1985), United Nations,<br />

Department of Public Information<br />

DiCenso, D. (2000), Information Operations: An Act of War?, Air & Space Power Chronicles. Available at<br />

http://www.airpower.maxwell.af.mil/airchronicles/cc.html.<br />

Dörmann, K. (2004), Applicability of the Additional Protocols to Computer Network Attacks, International Expert<br />

<strong>Conference</strong> on Computer Network Attacks and the Applicability of International Humanitarian Law,<br />

Stockholm, Available at http://www.icrc.org/web/eng/siteeng0.nsf/html/68LG92<br />

Greenberg, L.T., Goodman, S.E., Soo Hoo, K.J. (1998), Information Warfare and International Law, National<br />

Defense University Press. Available at http://www.iwar.org.uk/law/resources/iwlaw/iwilindex.htm<br />

Hollis, Duncan B. (2007), Why States Need an International Law for Information Operations. Lewis & Clark Law<br />

Review, Vol. 11, p. 1023, Temple University Legal Studies Research Paper No. 2008-43. Available at<br />

http://ssrn.com/abstract=1083889<br />

Joint Chiefs of Staff (1998), Joint Doctrine for Information Operations, Joint Publication 3-13.<br />

Pictet, J. (1952), Commentary on the Geneva Convention for the Amelioration of the Condition of the Wounded<br />

and Sick in Armed Forces in the Field, International Committee of the Red Cross, Geneva.<br />

Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of<br />

International Armed Conflicts (Protocol I), 8 June 1977. Available at http://www.icrc.org<br />

Schmitt, Michael N. (1999), Computer Network Attack and the Use of Force in International Law: Thoughts on a<br />

Normative Framework, Columbia Journal of Transnational Law, Vol. 37, 1998-99. Available at:<br />

http://ssrn.com/abstract=1603800<br />

Shackelford, S.J. (2009), From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Berkeley<br />

Journal of International Law, Vol. 25, No. 3, pp. 191-250.<br />

206

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!