Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-lj6df Total loading time: 0 Render date: 2024-11-07T21:25:55.632Z Has data issue: false hasContentIssue false

Select Bibliography

Published online by Cambridge University Press:  28 February 2020

François Delerue
Affiliation:
Institut de Recherche stratégique de l’École militaire
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Select Bibliography

Antolin-Jenkins, VM, ‘Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places’ (2005) 51 Naval Law Review 132Google Scholar
Bannelier-Christakis, K, ‘Cyber Diligence: A Low-Intensity Due Diligence Principle for Low-Intensity Cyber Operations?’ (2015) 14 Baltic Yearbook of International Law 23Google Scholar
Bannelier-Christakis, K, ‘Obligations de diligence dans le cyberespace: qui a peur de la cyber-diligence?’ [2017] Revue belge de droit international 612Google Scholar
Bannelier-Christakis, K and Christakis, T, Cyber-Attacks – Prevention-Reactions: The Role of States and Private Actors (Les Cahiers de la Revue Défense Nationale 2017)Google Scholar
Benatar, M, ‘The Use of Cyber Force: Need for Legal Justification’ (2009) 1 Goettingen Journal of International Law 375Google Scholar
Brenner, SW, ‘“At Light Speed”: Attribution and Response to Cybercrime/Terrorism/Warfare’ (2007) 97 The Journal of Criminal Law and Criminology (1973-) 379Google Scholar
Brenner, SW, Cyberthreats: The Emerging Fault Lines of the Nation State (Oxford University Press 2009)Google Scholar
Buchan, R, Cyber Espionage and International Law (Bloomsbury Publishing 2018)Google Scholar
Buchan, R and Tsagourias, N, ‘Cyber War and International Law’ (2012) 17 Journal of Conflict and Security Law 183Google Scholar
Cîrlig, C-C, Cyber Defence in the EU: Preparing for Cyber Warfare? (Briefing, European Parliamentary Research Service 2014)Google Scholar
Clark, D, Berson, T and Lin, HS (eds), At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues (National Academies Press 2014)Google Scholar
Corn, GP and Taylor, R, ‘Sovereignty in the Age of Cyber’ (2017) 111 AJIL Unbound 207Google Scholar
Danet, D, Cattaruzza, A and Taillat, S (eds), La Cyberdéfense – Politique de l’espace numérique (Armand Colin 2018)Google Scholar
Delerue, F, Analyse du Manuel de Tallinn 2.0 sur le droit international applicable aux cyber-opérations (DGRIS, ministère des Armées 2017)Google Scholar
Delerue, F, ‘The Right to Respond? States and the Cyber Arena’ (2018) 17 Turkish Policy Quarterly 145155Google Scholar
Delerue, F, ‘The Application of the Norms of International Law to Cyber Operations: Reinterpretation or Contestation of International Law?’ (2019) 52(3) Israel Law Review 295326Google Scholar
Delerue, F, ‘Attribution to a State of Cyber Operations Conducted by Non-state Actors’ in Carpanelli, Elena and Lazzerini, Nicole, Use and Misuse of New Technologies: Contemporary Challenges under International and European Law (Springer 2019)Google Scholar
Delerue, F and Géry, A, ‘État des lieux et perspectives sur les normes de comportement responsable des États et mesures de confiance dans le domaine numérique’ (CEIS – Note Stratégique 2017)Google Scholar
Dinniss, HH, Cyber Warfare and the Laws of War (Cambridge Studies in International and Comparative Law, Cambridge University Press 2012)Google Scholar
Dinstein, Y, ‘Computer Network Attacks and Self-Defense’ (2002) 76 International Law Studies 99Google Scholar
Finkelstein, C, Govern, K and Ohlin, JD, Cyber War: Law and Ethics for Virtual Conflicts (Oxford University Press 2015)Google Scholar
Finnemore, M and Hollis, DB, ‘Constructing Norms for Global Cybersecurity’ (2016) 110 American Journal of International Law 425Google Scholar
Foltz, AC, ‘Stuxnet, Schmitt Analysis, and the Cyber “Use-of-Force” Debate’ (2012) 67 Joint Force Quarterly 40Google Scholar
Franzese, PW, ‘Sovereignty in Cyberspace: Can It Exist’ (2009) 64 Air Force Law Review 1Google Scholar
Ghappour, A, ‘Tallinn, Hacking, and Customary International Law’ (2017) 111 AJIL Unbound 224Google Scholar
Goldsmith, J, ‘How Cyber Changes the Laws of War’ (2013) 24 European Journal of International Law 129Google Scholar
Hathaway, OA et al, ‘The Law of Cyber-Attack’ (2012) 100 California Law Review 817Google Scholar
Heinegg von Heintschel, W, ‘Chapter 1: The Tallinn Manual and International Cyber Security Law’ (2012) 15 Yearbook of International Humanitarian Law 3Google Scholar
Heinegg von Heintschel, W, ‘Territorial Sovereignty and Neutrality in Cyberspace’ (2013) 89 International Law Studies 123Google Scholar
Heintze, H-J and Thielbörger, P (eds), From Cold War to Cyber War: The Evolution of the International Law of Peace and Armed Conflict over the Last 25 Years (Springer 2017)Google Scholar
Hinkle, KC, ‘Countermeasures in the Cyber Context: One More Thing to Worry About’ (2011) 37 The Yale Journal of International Law Online 11Google Scholar
Hollis, DB, ‘Why States Need an International Law for Information Operations’ (2007) 11 Lewis & Clark Law Review 1023Google Scholar
Hollis, DB, ‘An e-SOS for Cyberspace’ (2011) 52 Harvard International Law Journal 373Google Scholar
Hunker, J, Margulies, J and Hutchinson, B, Role and Challenges for Sufficient Cyber-Attack Attribution (2008)Google Scholar
Ingber, R, ‘Interpretation Catalysts in Cyberspace’ (2016) 95 Texas Law Review 1531Google Scholar
Jensen, ET, ‘Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right to Self-Defense’ (2002) 38 Stanford Journal of International Law 207Google Scholar
Jensen, ET, ‘Cyber Sovereignty: The Way Ahead’ (2015) 50 Texas International Law Journal 273Google Scholar
Jensen, ET, ‘State Obligations in Cyber Operations’ (2015) 14 Baltic Yearbook of International Law 71CrossRefGoogle Scholar
Jensen, ET, ‘The Tallinn Manual 2.0: Highlights and Insights’ [2017] BYU Law Research Paper No 17-10Google Scholar
Jensen, ET and Watts, S, ‘A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer?’ (2016) 95 Texas Law Review 1555Google Scholar
Johnson, DR and Post, D, ‘Law and Borders: The Rise of Law in Cyberspace’ (1995) 48 Stanford Law Review 1367Google Scholar
Joyner, CC and Lotrionte, C, ‘Information Warfare as International Coercion: Elements of a Legal Framework’ (2001) 12 European Journal of International Law 825Google Scholar
Kaska, K and Vihul, L, International Cyber Incidents: Legal Considerations (NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) 2010)Google Scholar
Kerschischnig, G, Cyberthreats and International Law (Eleven International Publishing 2012)Google Scholar
Kirchner, S, ‘Distributed Denial-of-Service Attacks Under Public International Law: State Responsibility in Cyberwar’ (2009) VIII The IUP Journal of Cyber Law 10Google Scholar
Koh, HH, ‘International Law in Cyberspace’ (2012) 54 Harvard International Law Journal 1Google Scholar
Kozik, AL, ‘The Concept of Sovereignty as a Foundation for Determining the Legality of the Conduct of States in Cyberspace’ (2015) 14 Baltic Yearbook of International Law 93Google Scholar
Kulesza, J, ‘State Responsibility for Cyberattacks on International Peace and Security’ (Social Science Research Network 2010)Google Scholar
Kulesza, J, International Internet Law (Routledge 2012)CrossRefGoogle Scholar
Kulesza, J and Weber, RH, ‘Protecting the Public Core of the Internet’, Briefings from the Research Advisory Group (GCSC Issue Brief No 1, Global Commission on the Stability of Cyberspace 2017)Google Scholar
Lagrange, P, ‘Internet et l’évolution normative du droit international: d’un droit international applicable à l’Internet à un droit international du cyberespace?’, Internet et le droit international (Colloque de Rouen de la Société française pour le droit international, Pedone 2014)Google Scholar
Li, S, ‘When Does Internet Denial Trigger the Right of Armed Self-Defense?’ (2013) 38 Yale Journal of International Law 179Google Scholar
Lixinski, L, ‘Legal Implications of the Privatization of Cyber Warfare’ in Nuno Gomes de Andrade, Norberto and Tomé Féteira, Lúcio (eds), New Technologies and Human Rights: Challenges to Regulation (Routledge 2016)Google Scholar
Marauhn, T and Stein, T, ‘Völkerrechtliche Aspekte von Informationsoperationen’ (2000) 60 Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 1Google Scholar
Margulies, P, ‘Sovereignty and Cyber Attacks: Technology’s Challenge to the Law of State Responsibility’ (2013) 14 Melbourne Journal of International Law 1Google Scholar
Norodom, A-T and Grange, M (eds), Cyberattaques et droit international: Problèmes choisis (Pedone 2019)Google Scholar
O’Connell, ME, ‘Cyber Security without Cyber War’ (2012) 17 Journal of Conflict and Security Law 187Google Scholar
Ohlin, JD, ‘Did Russian Cyber Interference in the 2016 Election Violate International Law’ (2016) 95 Texas Law Review 1579Google Scholar
Poposka, V, ‘Right to Life and Cyber Warfare: Applicability of Legal Regimes during Counterterrorist Operations (International Humanitarian Law)’ in Hadji-Janev, Metodi and Bogdanoski, Mitko (eds), Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (IGI Global 2016)Google Scholar
Porcedda, MG, ‘Transatlantic Approaches to Cybersecurity and Cybercrime’ in Pawlak, Patryk (ed), The EU-US Security and Justice Agenda in Action (EU Institute for Security Studies 2011)Google Scholar
Radziwill, Y, Cyber-Attacks and the Exploitable Imperfection of International Law (Brill & Martinus Nijhoff Publishers 2015)Google Scholar
Rid, T, Cyber War Will Not Take Place (Oxford University Press 2013)Google Scholar
Rid, T and Buchanan, B, ‘Attributing Cyber Attacks’ (2015) 38 Journal of Strategic Studies 4Google Scholar
Roscini, M, ‘Threats of Armed Force and Contemporary International Law’ (2007) 54 Netherlands International Law Review 229Google Scholar
Roscini, M, ‘World Wide Warfare – Jus ad bellum and the Use of Cyber Force’ (2010) 14 Max Planck Yearbook of United Nations Law 85Google Scholar
Roscini, M, Cyber Operations and the Use of Force in International Law (Oxford University Press 2014)Google Scholar
Roscini, M, ‘Cyber Operations as a Use of Force’ in Tsagourias, Nicholas and Buchan, Russell (eds), Research Handbook on International Law and Cyberspace (Edward Elgar Publishing 2015)Google Scholar
Roscini, M, ‘Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations’ (2015) 50 Texas International Law Journal 233Google Scholar
Sanger, DE, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (Crown 2012)Google Scholar
Schaller, C, ‘Beyond Self-Defense and Countermeasures: A Critical Assessment of the Tallinn Manual’s Conception of Necessity’ (2016) 95 Texas Law Review 1619Google Scholar
Schmitt, MN, ‘Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework’ (1999) 37 Columbia Journal of Transnational Law 1998Google Scholar
Schmitt, MN, ‘Wired Warfare: Computer Network Attack and Jus in Bello’ (2002) 84 International Review of the Red Cross 365Google Scholar
Schmitt, MN, ‘Cyber Operations and the Jus Ad Bellum Revisited’ (2011) 56 Villanova Law Review 569Google Scholar
Schmitt, MN, ‘Cyber Operations and the Jus in Bello: Key Issues’ (2011) 87 International Law Studies 89Google Scholar
Schmitt, MN, ‘Classification of Cyber Conflict’ (2012) 17 Journal of Conflict and Security Law 245Google Scholar
Schmitt, MN, ‘International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed’ (2012) 54 Harvard International Law Journal Online 13Google Scholar
Schmitt, MN (ed), The Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press 2013)Google Scholar
Schmitt, MN, ‘“Below the Threshold” Cyber Operations: The Countermeasures Response Option and International Law’ (2014) 54 Virginia Journal of International Law 697Google Scholar
Schmitt, MN, ‘The Law of Cyber Warfare: Quo Vadis?’ (2014) 25 Stanford Law & Policy Review 269Google Scholar
Schmitt, MN, ‘Rewired Warfare: Rethinking the Law of Cyber Attack’ (2014) International Review of the Red Cross 1Google Scholar
Schmitt, MN, ‘In Defense of Due Diligence in Cyberspace’ (2015) 125 The Yale Law Journal Forum 68Google Scholar
Schmitt, MN, ‘Grey Zones in the International Law of Cyberspace’ (2017) 42 The Yale Journal of International Law Online 1Google Scholar
Schmitt, MN, ‘Peacetime Cyber Responses and Wartime Cyber Operations under International Law: An Analytical Vade Mecum’ (2017) 8 Harvard National Security Journal 239Google Scholar
Schmitt, MN, ‘Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law’ (2018) 19 Chicago Journal of International Law 30Google Scholar
Schmitt, MN and Pitts, MC, ‘Cyber Countermeasures and Effects on Third Parties: The International Legal Regime’ (2015) 14 Baltic Yearbook of International Law 1Google Scholar
Schmitt, MN and Vihul, L, Proxy Wars in Cyberspace: The Evolving International Law of Attribution (Fletcher Security 2014)Google Scholar
Schmitt, MN and Vihul, L, ‘Respect for Sovereignty in Cyberspace Symposium: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations’ (2016) 95 Texas Law Review 1639Google Scholar
Schmitt, MN and Vihul, L, ‘Sovereignty in Cyberspace: Lex Lata Vel Non?’ (2017) 111 AJIL Unbound 213Google Scholar
Schmitt, MN and Vihul, L (eds), The Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (2nd edn, Cambridge University Press 2017)Google Scholar
Shackelford, SJ, ‘From Nuclear War to Net War: Analogizing Cyber Attacks in International Law’ (2009) 27 Berkley Journal of International Law 192Google Scholar
Shackelford, SJ, ‘In Search of Cyber Peace: A Response to the Cybersecurity Act of 2012’ (2012) 64 Stanford Law Review Online 106Google Scholar
Shackelford, SJ, Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (Cambridge University Press 2014)Google Scholar
Shackelford, SJ, ‘Toward a Global Cybersecurity Standard of Care? Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices’ (2015) 50 Texas International Law Journal 303Google Scholar
Shackelford, SJ, ‘The Law of Cyber Peace’ (2017) 18 Chicago Journal of International Law [i] 147Google Scholar
Shackelford, SJ and Craig, AN, ‘Beyond the New Digital Divide: Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity’ (2014) 50 Stanford Journal of International Law 119Google Scholar
Russell, S and Kuehn, A, Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors (Research Paper No 15–64, Kelley School of Business 2015)Google Scholar
Silver, DB, ‘Computer Network Attack as a Use of Force under Article 2(4) of the United Nations Charter’ (2002) 76 International Law Studies 73Google Scholar
Sklerov, MJ, ‘Solving the Dilemma of State Responses to Cyberattacks: A Justification for the Use of Active Defenses against States Who Neglect Their Duty to Prevent’ (2009) 201 Military Law Review 1Google Scholar
Spector, P, ‘In Defense of Sovereignty, in the Wake of Tallinn 2.0’ (2017) 111 AJIL Unbound 219Google Scholar
Tikk, E et al, ‘Cyber Attacks Against Georgia: Legal Lessons Identified’ (NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) 2008)Google Scholar
Tikk, E and Kaska, K, ‘Legal Cooperation to Investigate Cyber Incidents: Estonian Case Study and Lessons’, 9th European Conference on Information Warfare and Security, Thessaloniki, Greece (Academic Publishing Limited 2010)Google Scholar
Tsagourias, N, ‘Chapter 2: The Tallinn Manual on the International Law Applicable to Cyber Warfare: A Commentary on Chapter II – The Use of Force’ (2012) 15 Yearbook of International Humanitarian Law 19Google Scholar
Tsagourias, N, ‘Cyber Attacks, Self-Defence and the Problem of Attribution’ (2012) 17 Journal of Conflict and Security Law 229Google Scholar
Tsagourias, N, ‘The Law Applicable to Countermeasures against Low-Intensity Cyber Operations’ (2015) 14 Baltic Yearbook of International Law 105Google Scholar
Tsagourias, N and Buchan, R, Research Handbook on International Law and Cyberspace (Edward Elgar Publishing 2015)Google Scholar
Walker, PA, ‘Traditional Military Activities in Cyberspace: Preparing for “Netwar”’ (2010) 22 Florida Journal of International Law 333Google Scholar
Watts, S, ‘Low-Intensity Cyber Operations and the Principle of Non-intervention’ (2015) 14 Baltic Yearbook of International Law 137Google Scholar
Waxman, MC, ‘Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)’ (2011) 36 Yale Journal of International Law 421Google Scholar
Waxman, MC, ‘Regulating Resort to Force: Form and Substance of the UN Charter Regime’ (2013) 24 European Journal of International Law 151Google Scholar
Waxman, MC, ‘Self-Defensive Force against Cyber Attacks: Legal, Strategic and Political Dimensions’ (2013) 89 International Law Studies 109Google Scholar
Woltag, J-C, Cyber Warfare: Military Cross-Border Computer Network Operations under International Law (Intersentia 2014)Google Scholar
Zetter, K, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (Crown 2014)Google Scholar
Ziolkowski, K, ‘Computer Network Operations and the Law of Armed Conflict’ (2010) 49 Military Law and Law of War Review 47Google Scholar
Ziolkowski, K (ed), Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) 2013)Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×