Cyber-attacks and the exploitable imperfections of international law:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Leiden ; Boston
Brill Nijhoff
[2015]
|
Schlagworte: | |
Online-Zugang: | Klappentext Inhaltsverzeichnis |
Beschreibung: | XVII, 411 Seiten |
ISBN: | 9789004298330 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | BV042949443 | ||
003 | DE-604 | ||
005 | 20210817 | ||
007 | t | ||
008 | 151027s2015 m||| 00||| eng d | ||
010 | |a 2015023019 | ||
020 | |a 9789004298330 |c hardback : alk. paper |9 978-90-04-29833-0 | ||
035 | |a (OCoLC)931950382 | ||
035 | |a (DE-599)BSZ443494487 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-19 |a DE-739 |a DE-188 |a DE-384 | ||
050 | 0 | |a KZ6718 | |
082 | 0 | |a 341.63 | |
082 | 0 | |a 341.6/3 | |
084 | |a PR 2622 |0 (DE-625)139647: |2 rvk | ||
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
100 | 1 | |a Radziwill, Yaroslav |e Verfasser |0 (DE-588)1081334967 |4 aut | |
240 | 1 | 0 | |a Cyber-attacks and international law |
245 | 1 | 0 | |a Cyber-attacks and the exploitable imperfections of international law |c by Yaroslav Radziwill |
264 | 1 | |a Leiden ; Boston |b Brill Nijhoff |c [2015] | |
300 | |a XVII, 411 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c University of Warwick |d 2014 | ||
650 | 4 | |a Information warfare (International law) | |
650 | 4 | |a Cyberspace operations (Military science) | |
650 | 0 | 7 | |a Völkerrecht |0 (DE-588)4063693-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Völkerrecht |0 (DE-588)4063693-8 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-90-04-29830-9 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
940 | 1 | |n oe | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028375629 |
Datensatz im Suchindex
_version_ | 1804175263531008000 |
---|---|
adam_text | At its current rate, technological development has outpaced corresponding changes in international law. Proposals to remedy this deficiency have been made, in part, by members of the Shanghai Cooperation Organization (led by the Russian Federation), but the United States and select allies have rejected these proposals, arguing that existing international law already provides a suitable comprehensive framework necessary to tackle cyber-warfare.
Cyber-Attacks and the Exploitable Imperfections of International Law does not contest (and, in fact, supports) the idea that contemporary jus ad and
hello, in general, can accommodate cyber-warfare. However, this analysis argues that existing international law contains significant imperfections that can be exploited; gaps, not yet filled, that fail to address future risks posed by cyber-attacks.
Contents
Preface ix Abbreviations x Glossary xiv
1 Introduction x
1.1 Introduction 1
1.2 Objectives and Research Questions 4
1.3 Structure of the Book 9
1.4 Choice of Terminology 11
1.5 Conclusion 14
2 Theoretical Framework 15
2.1 Introduction 15
2.2 Legal Framework 15
2.3 Political Component 28
2.4 Conclusion 39
3 Cyber-Threat 40
3.1 Introduction 40
3.2 The Hypothetical Threat 40
3.3 Reported Cyber-Incidents 57
3.4 Conclusion 83
4 Cyber-Space 85
4.1 Introduction 85
4.2 Territoriality of Cyber-Space 86
4.3 Sovereignty over the Virtual Realm 95
4.4 Jurisdiction in Cyber-Space 109
4.5 Conclusion 123
5 Cyber-Strikes andJus ad Bellum 125
5.1 Introduction 125
5.2 Cyber-Attacks and the Use of Force 126
5.3 Cyber-Attacks and Self-Defense 142
5.4 Cyber-Attacks and Aggression 160
5.5 Conclusion 171
VIII
CONTENTS
6 Humanitarian Law Perspective 173
6.1 Introduction 173
6.2 General Applicability of International Humanitarian Law 174
6.3 Principle of Humanity 181
6.4 Necessity and Proportionality in Jus in Bello 195
6.5 Principle of Distinction 201
6.6 Deception 214
6.7 Principle of Neutrality 218
6.8 Conclusion 223
7 Cyber-Terrorism 225
7.1 Introduction 225
7.2 Terrorism and Cyber-Terrorism as Legal Concepts 226
7.3 Conventional Cyber-Terrorism 243
7.4 Escalated Conventional Cyber-Terrorism: Jus ad Bellum 247
7.5 Archaic Cyber-Terrorism: Jus in Bello 257
7.6 Conclusion 265
8 Role of International Organizations 266
8.1 Introduction 266
8.2 United Nations as Part of the Problem 267
8.3 United Nations as Part of the Solution 277
8.4 Role of Other International Organizations 301
8.5 Conclusion 310
9 Conclusion 312
9.1 Introduction 312
9.2 Validity of the Idea 312
9.3 A Way Forward 321
Appendix 1—Toolkit of a Modern-Day Cracker 323 Appendix 2—Normative Model for Command Authorities (fus ad Bellum) 330
Appendix 3—Direct Participation in Hostilities: A List of Academic Examples 332 Bibliography 337 Index 400
|
any_adam_object | 1 |
author | Radziwill, Yaroslav |
author_GND | (DE-588)1081334967 |
author_facet | Radziwill, Yaroslav |
author_role | aut |
author_sort | Radziwill, Yaroslav |
author_variant | y r yr |
building | Verbundindex |
bvnumber | BV042949443 |
callnumber-first | K - Law |
callnumber-label | KZ6718 |
callnumber-raw | KZ6718 |
callnumber-search | KZ6718 |
callnumber-sort | KZ 46718 |
callnumber-subject | KZ - Law of Nations |
classification_rvk | PR 2622 PZ 3700 |
ctrlnum | (OCoLC)931950382 (DE-599)BSZ443494487 |
dewey-full | 341.63 341.6/3 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 341 - Law of nations |
dewey-raw | 341.63 341.6/3 |
dewey-search | 341.63 341.6/3 |
dewey-sort | 3341.63 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02209nam a22004932c 4500</leader><controlfield tag="001">BV042949443</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210817 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">151027s2015 m||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2015023019</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789004298330</subfield><subfield code="c">hardback : alk. paper</subfield><subfield code="9">978-90-04-29833-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)931950382</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ443494487</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KZ6718</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">341.63</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">341.6/3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PR 2622</subfield><subfield code="0">(DE-625)139647:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Radziwill, Yaroslav</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1081334967</subfield><subfield code="4">aut</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Cyber-attacks and international law</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-attacks and the exploitable imperfections of international law</subfield><subfield code="c">by Yaroslav Radziwill</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Leiden ; Boston</subfield><subfield code="b">Brill Nijhoff</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 411 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">University of Warwick</subfield><subfield code="d">2014</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare (International law)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Völkerrecht</subfield><subfield code="0">(DE-588)4063693-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Völkerrecht</subfield><subfield code="0">(DE-588)4063693-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-90-04-29830-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028375629</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV042949443 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:13:31Z |
institution | BVB |
isbn | 9789004298330 |
language | English |
lccn | 2015023019 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028375629 |
oclc_num | 931950382 |
open_access_boolean | |
owner | DE-12 DE-19 DE-BY-UBM DE-739 DE-188 DE-384 |
owner_facet | DE-12 DE-19 DE-BY-UBM DE-739 DE-188 DE-384 |
physical | XVII, 411 Seiten |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Brill Nijhoff |
record_format | marc |
spelling | Radziwill, Yaroslav Verfasser (DE-588)1081334967 aut Cyber-attacks and international law Cyber-attacks and the exploitable imperfections of international law by Yaroslav Radziwill Leiden ; Boston Brill Nijhoff [2015] XVII, 411 Seiten txt rdacontent n rdamedia nc rdacarrier Dissertation University of Warwick 2014 Information warfare (International law) Cyberspace operations (Military science) Völkerrecht (DE-588)4063693-8 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Information warfare (DE-588)4461975-3 s Völkerrecht (DE-588)4063693-8 s DE-604 Erscheint auch als Online-Ausgabe 978-90-04-29830-9 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Klappentext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Radziwill, Yaroslav Cyber-attacks and the exploitable imperfections of international law Information warfare (International law) Cyberspace operations (Military science) Völkerrecht (DE-588)4063693-8 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4063693-8 (DE-588)4461975-3 (DE-588)4113937-9 |
title | Cyber-attacks and the exploitable imperfections of international law |
title_alt | Cyber-attacks and international law |
title_auth | Cyber-attacks and the exploitable imperfections of international law |
title_exact_search | Cyber-attacks and the exploitable imperfections of international law |
title_full | Cyber-attacks and the exploitable imperfections of international law by Yaroslav Radziwill |
title_fullStr | Cyber-attacks and the exploitable imperfections of international law by Yaroslav Radziwill |
title_full_unstemmed | Cyber-attacks and the exploitable imperfections of international law by Yaroslav Radziwill |
title_short | Cyber-attacks and the exploitable imperfections of international law |
title_sort | cyber attacks and the exploitable imperfections of international law |
topic | Information warfare (International law) Cyberspace operations (Military science) Völkerrecht (DE-588)4063693-8 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare (International law) Cyberspace operations (Military science) Völkerrecht Information warfare Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028375629&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT radziwillyaroslav cyberattacksandinternationallaw AT radziwillyaroslav cyberattacksandtheexploitableimperfectionsofinternationallaw |