Cyber operations and international law
著者
書誌事項
Cyber operations and international law
(Cambridge studies in international and comparative law, 146)
Cambridge University Press, 2020
大学図書館所蔵 件 / 全8件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references (p. 502-508) and index
内容説明・目次
内容説明
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.
目次
- 1. Does international law matter in cyberspace? Part I. Attribution: 2. Attribution to a machine or a human: a technical process
- 3. The question of evidence: from technical to legal attribution
- 4. Attribution to a state
- Conclusion of Part I
- Part II. The Lawfulness of Cyber Operations: 5. Internationally wrongful cyber acts: cyber operations breaching norms of international law
- 6. The threshold of cyber warfare: from use of cyber force to cyber armed attack
- 7. Circumstances precluding or attenuating the wrongfulness of unlawful cyber operations
- 8. Cyber operations and the principle of due diligence
- Conclusion of Part II
- Part III. Remedies against State-Sponsored Cyber Operations: 9. State responsibility and the consequences of an internationally wrongful cyber operation
- 10. Measures of self-help against state-sponsored cyber operations
- Conclusion of Part III
- Conclusion.
「Nielsen BookData」 より