Unilateral remedies to cyber operations: self-defence, countermeasures, necessity, and the question of attribution
Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a state faces when considering a reaction to a malicious cyber operation conducted by an adversarial st...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2020
|
Schlagworte: | |
Online-Zugang: | BSB01 UBG01 Volltext |
Zusammenfassung: | Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a state faces when considering a reaction to a malicious cyber operation conducted by an adversarial state. While often invoked in political debates and widely analysed in international legal scholarship, self-defence and countermeasures will often remain unavailable to states in situations of cyber emergency due to the pervasive problem of reliable and timely attribution of cyber operations to state actors. Analysing the legal questions surrounding attribution in detail, the book presents the necessity defence as an evidently available alternative. However, the shortcomings of the doctrine as based in customary international law that render it problematic as a remedy for states are examined in-depth. In light of this, the book concludes by outlining a special emergency regime for cyberspace |
Beschreibung: | Title from publisher's bibliographic system (viewed on 02 Apr 2020) The spectre of cyberwar -- Terminology -- International legal framework -- Self-defence -- Countermeasures -- Necessity -- Transnational cybersecurity, unilateral remedies, and the rule of law -- "Such incidents might recur at any time" : the intervention convention -- Possible elements of the cyber emergency regime -- Concluding remarks |
Beschreibung: | 1 Online-Ressource (xi, 325 Seiten) |
ISBN: | 9781108807050 |
DOI: | 10.1017/9781108807050 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046696790 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 200428s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781108807050 |c Online |9 978-1-108-80705-0 | ||
024 | 7 | |a 10.1017/9781108807050 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781108807050 | ||
035 | |a (OCoLC)1154000232 | ||
035 | |a (DE-599)BVBBV046696790 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 | ||
082 | 0 | |a 341.63 | |
084 | |a PR 2354 |0 (DE-625)139577: |2 rvk | ||
100 | 1 | |a Lahmann, Henning Christian |d 1981- |0 (DE-588)1113027703 |4 aut | |
245 | 1 | 0 | |a Unilateral remedies to cyber operations |b self-defence, countermeasures, necessity, and the question of attribution |c Henning Lahmann |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2020 | |
300 | |a 1 Online-Ressource (xi, 325 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 02 Apr 2020) | ||
500 | |a The spectre of cyberwar -- Terminology -- International legal framework -- Self-defence -- Countermeasures -- Necessity -- Transnational cybersecurity, unilateral remedies, and the rule of law -- "Such incidents might recur at any time" : the intervention convention -- Possible elements of the cyber emergency regime -- Concluding remarks | ||
520 | |a Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a state faces when considering a reaction to a malicious cyber operation conducted by an adversarial state. While often invoked in political debates and widely analysed in international legal scholarship, self-defence and countermeasures will often remain unavailable to states in situations of cyber emergency due to the pervasive problem of reliable and timely attribution of cyber operations to state actors. Analysing the legal questions surrounding attribution in detail, the book presents the necessity defence as an evidently available alternative. However, the shortcomings of the doctrine as based in customary international law that render it problematic as a remedy for states are examined in-depth. In light of this, the book concludes by outlining a special emergency regime for cyberspace | ||
650 | 4 | |a Cyberwarfare (International law) | |
650 | 4 | |a Self-defense (International law) | |
650 | 4 | |a Unilateral acts (International law) | |
650 | 0 | 7 | |a Völkerrecht |0 (DE-588)4063693-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Staat |0 (DE-588)4056618-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Selbstverteidigung |0 (DE-588)4054440-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 0 | 1 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |D s |
689 | 0 | 2 | |a Staat |0 (DE-588)4056618-3 |D s |
689 | 0 | 3 | |a Selbstverteidigung |0 (DE-588)4054440-0 |D s |
689 | 0 | 4 | |a Völkerrecht |0 (DE-588)4063693-8 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-10847-986-8 |
856 | 4 | 0 | |u https://doi.org/10.1017/9781108807050 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032107431 | ||
966 | e | |u https://doi.org/10.1017/9781108807050 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/9781108807050 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181420986335232 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Lahmann, Henning Christian 1981- |
author_GND | (DE-588)1113027703 |
author_facet | Lahmann, Henning Christian 1981- |
author_role | aut |
author_sort | Lahmann, Henning Christian 1981- |
author_variant | h c l hc hcl |
building | Verbundindex |
bvnumber | BV046696790 |
classification_rvk | PR 2354 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9781108807050 (OCoLC)1154000232 (DE-599)BVBBV046696790 |
dewey-full | 341.63 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 341 - Law of nations |
dewey-raw | 341.63 |
dewey-search | 341.63 |
dewey-sort | 3341.63 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
discipline_str_mv | Rechtswissenschaft |
doi_str_mv | 10.1017/9781108807050 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03636nmm a2200565zc 4500</leader><controlfield tag="001">BV046696790</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200428s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781108807050</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-108-80705-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/9781108807050</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781108807050</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1154000232</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046696790</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">341.63</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PR 2354</subfield><subfield code="0">(DE-625)139577:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lahmann, Henning Christian</subfield><subfield code="d">1981-</subfield><subfield code="0">(DE-588)1113027703</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Unilateral remedies to cyber operations</subfield><subfield code="b">self-defence, countermeasures, necessity, and the question of attribution</subfield><subfield code="c">Henning Lahmann</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 325 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 02 Apr 2020)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The spectre of cyberwar -- Terminology -- International legal framework -- Self-defence -- Countermeasures -- Necessity -- Transnational cybersecurity, unilateral remedies, and the rule of law -- "Such incidents might recur at any time" : the intervention convention -- Possible elements of the cyber emergency regime -- Concluding remarks</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a state faces when considering a reaction to a malicious cyber operation conducted by an adversarial state. While often invoked in political debates and widely analysed in international legal scholarship, self-defence and countermeasures will often remain unavailable to states in situations of cyber emergency due to the pervasive problem of reliable and timely attribution of cyber operations to state actors. Analysing the legal questions surrounding attribution in detail, the book presents the necessity defence as an evidently available alternative. However, the shortcomings of the doctrine as based in customary international law that render it problematic as a remedy for states are examined in-depth. In light of this, the book concludes by outlining a special emergency regime for cyberspace</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberwarfare (International law)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Self-defense (International law)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unilateral acts (International law)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Völkerrecht</subfield><subfield code="0">(DE-588)4063693-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Staat</subfield><subfield code="0">(DE-588)4056618-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Selbstverteidigung</subfield><subfield code="0">(DE-588)4054440-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Staat</subfield><subfield code="0">(DE-588)4056618-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Selbstverteidigung</subfield><subfield code="0">(DE-588)4054440-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Völkerrecht</subfield><subfield code="0">(DE-588)4063693-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-10847-986-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/9781108807050</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032107431</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781108807050</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/9781108807050</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046696790 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:26:53Z |
indexdate | 2024-07-10T08:51:23Z |
institution | BVB |
isbn | 9781108807050 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032107431 |
oclc_num | 1154000232 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG |
owner_facet | DE-12 DE-473 DE-BY-UBG |
physical | 1 Online-Ressource (xi, 325 Seiten) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO UBG_PDA_CBO |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Lahmann, Henning Christian 1981- (DE-588)1113027703 aut Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution Henning Lahmann Cambridge Cambridge University Press 2020 1 Online-Ressource (xi, 325 Seiten) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 02 Apr 2020) The spectre of cyberwar -- Terminology -- International legal framework -- Self-defence -- Countermeasures -- Necessity -- Transnational cybersecurity, unilateral remedies, and the rule of law -- "Such incidents might recur at any time" : the intervention convention -- Possible elements of the cyber emergency regime -- Concluding remarks Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a state faces when considering a reaction to a malicious cyber operation conducted by an adversarial state. While often invoked in political debates and widely analysed in international legal scholarship, self-defence and countermeasures will often remain unavailable to states in situations of cyber emergency due to the pervasive problem of reliable and timely attribution of cyber operations to state actors. Analysing the legal questions surrounding attribution in detail, the book presents the necessity defence as an evidently available alternative. However, the shortcomings of the doctrine as based in customary international law that render it problematic as a remedy for states are examined in-depth. In light of this, the book concludes by outlining a special emergency regime for cyberspace Cyberwarfare (International law) Self-defense (International law) Unilateral acts (International law) Völkerrecht (DE-588)4063693-8 gnd rswk-swf Cyberattacke (DE-588)1075612675 gnd rswk-swf Gegenmaßnahme (DE-588)4445317-6 gnd rswk-swf Staat (DE-588)4056618-3 gnd rswk-swf Selbstverteidigung (DE-588)4054440-0 gnd rswk-swf Cyberattacke (DE-588)1075612675 s Gegenmaßnahme (DE-588)4445317-6 s Staat (DE-588)4056618-3 s Selbstverteidigung (DE-588)4054440-0 s Völkerrecht (DE-588)4063693-8 s DE-604 Erscheint auch als Druck-Ausgabe 978-1-10847-986-8 https://doi.org/10.1017/9781108807050 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Lahmann, Henning Christian 1981- Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution Cyberwarfare (International law) Self-defense (International law) Unilateral acts (International law) Völkerrecht (DE-588)4063693-8 gnd Cyberattacke (DE-588)1075612675 gnd Gegenmaßnahme (DE-588)4445317-6 gnd Staat (DE-588)4056618-3 gnd Selbstverteidigung (DE-588)4054440-0 gnd |
subject_GND | (DE-588)4063693-8 (DE-588)1075612675 (DE-588)4445317-6 (DE-588)4056618-3 (DE-588)4054440-0 |
title | Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution |
title_auth | Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution |
title_exact_search | Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution |
title_exact_search_txtP | Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution |
title_full | Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution Henning Lahmann |
title_fullStr | Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution Henning Lahmann |
title_full_unstemmed | Unilateral remedies to cyber operations self-defence, countermeasures, necessity, and the question of attribution Henning Lahmann |
title_short | Unilateral remedies to cyber operations |
title_sort | unilateral remedies to cyber operations self defence countermeasures necessity and the question of attribution |
title_sub | self-defence, countermeasures, necessity, and the question of attribution |
topic | Cyberwarfare (International law) Self-defense (International law) Unilateral acts (International law) Völkerrecht (DE-588)4063693-8 gnd Cyberattacke (DE-588)1075612675 gnd Gegenmaßnahme (DE-588)4445317-6 gnd Staat (DE-588)4056618-3 gnd Selbstverteidigung (DE-588)4054440-0 gnd |
topic_facet | Cyberwarfare (International law) Self-defense (International law) Unilateral acts (International law) Völkerrecht Cyberattacke Gegenmaßnahme Staat Selbstverteidigung |
url | https://doi.org/10.1017/9781108807050 |
work_keys_str_mv | AT lahmannhenningchristian unilateralremediestocyberoperationsselfdefencecountermeasuresnecessityandthequestionofattribution |