1,659
Views
3
CrossRef citations to date
0
Altmetric
Articles

Securing cyber space: the obligation of States to prevent harmful international cyber operations

References

  • Baezner, Maria, and Patrice Robin. 2017. Cyber and Information Warfare in the Ukrainian Conflict. Zurich: Center for Security Studies.
  • Bannelier-Christakis, Karine. 2014. “Cyber Diligence: A Low-intensity Due Diligence Principle for Low-intensity Cyber Operations?” Baltic Yearbook of International Law Online 14: 23–39. doi: 10.1163/22115897-90000104
  • Birnie, Patricia, Alan Boyle, and Catherine Redgwell. 2009. International Law of the Environment. Oxford: Oxford University Press.
  • Brenner, Susan W. 2007. “At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare.” Journal of Criminal Law and Criminology 97 (2): 379–475.
  • Buchan, Russell. 2012. “Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?” Journal of Conflict and Security Law 17 (2): 212–227. doi: 10.1093/jcsl/krs014
  • Buchan, Russell. 2016. “Cyberspace, Non-state Actors and the Obligation to Prevent Transboundary Harm.” Journal of Conflict and Security Law 21 (3): 429–453. doi: 10.1093/jcsl/krw011
  • Cartwright, James E. 2010. Memorandum for Chiefs of the Military Services Commanders of the Combatant Commands Directors of the Joint Staff Directorates. Washington, DC. http://www.nsci-va.org/CyberReferenceLib/2010-11-joint%20Terminology%20for%20Cyberspace%20Operations.pdf.
  • Couzigou, Irène. 2016. “The Challenges Posed by Cyber-attacks to the Law on Self-defence.” In International Law and … , edited by Reinisch August, Footer Mary, and Binder Christin, 245–260. Oxford: Hart Publishing.
  • Crawford, James. 2006. The Creation of States in International Law. Oxford: Clarendon Press.
  • Dörr, Olivier. 2015. “Obligations of the State of Origin of a Cyber Security Incident.” German Yearbook of International Law 58: 85–99.
  • Henriksen, Anders. 2015. “Lawful State Responses to Low-level Cyber-attacks.” Nordic Journal of International Law 84 (2): 323–351. doi: 10.1163/15718107-08402008
  • Hern, Alex. 2017. “NHS Could Have Avoided WannaCry Hack With ‘Basic IT Security’, Says Report.” Guardian, October 27.
  • Johnson, David R, and David Post. 1996. “Law and Borders – The Rise of Law in Cyberspace.” Stanford Law Review 48: 1367–1402. doi: 10.2307/1229390
  • Kerschischnig, Goerg. 2012. Cyberthreats and International Law. The Hague: Eleven International Publishing.
  • Kittrich, Jan. 2009. “Can Self-defense Serve as an Appropriate Tool Against International Terrorism?” Maine Law Review 61: 133–169.
  • Koivurora, Timo. 2017. “Due Diligence.” In Online Max Planck Encyclopedia of Public International Law, edited by Rüdiger Wolfrum. Oxford: Oxford University Press.
  • Kolb, Robert. 2015. “Reflections on Due Diligence Duties and Cyberspace.” German Yearbook of International Law 58: 113–128.
  • Kuehl, Daniel T. 2009. “From Cyberspace to Cyberpower: Defining the Problem.” In Cyberpower and National Security, edited by Franklin D. Kramer, Stuart H. Starr, and Larry K. Wentz, 24–42. Washington, DC: National Defense University Press.
  • Kulesza, Joanna. 2016. Due Diligence in International Law. Leiden: Brill Nijhoff.
  • Lipton, Eric, David E. Sanger, and Scott Schane. 2017. “The Perfect Weapon: How Russian Cyberpower Invaded the U.S.” The New York Times, October 31.
  • Pirker, Benedikt. 2013. “Territorial Sovereignty and Integrity and the Challenges of Cyberspace.” In Peacetime Regime for State Activities in Cyberspace, edited by Ziolkowski Katharina, 189–216. Tallinn: NATO CCD COE Publication.
  • Pisillo-Mazzeschi, Ricardo. 1993. “The Due Diligence Rule and the Nature of International State Responsibility.” German Yearbook of International Law, 36:9–51.
  • Schmitt, Michael N. 2011–2012. “Cyber Operations and the Jus Ad Bellum Revisited.” Villanova Law Review 56: 569–570.
  • Schmitt, Michael N. 2015. “In Defense of Due Diligence in Cyberspace.” The Yale Law Journal Forum 125: 68–81.
  • Schmitt, Michael N., ed. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press.
  • Shackelford, Scott J., Scott Russell, and Andreas Kuehn. 2016. “Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors.” Chicago Journal of International Law 17 (1): 1–50.
  • Tikk, Eneken, Kadri Kaska, Kristel Rünnimeri, Mari Kert, Anna-Maria Talihärm, and Liis Vihul. 2008. Cyber Attacks Against Georgia: Legal Lessons Identified. Tallinn: Cooperative Cyber Defence Centre of Excellence.
  • Trapp, Kimberley N. 2007. “Back to Basics: Necessity, Proportionality, and the Right of Self-defence Against Non-state Terrorist Actors.” International and Comparative Law Quarterly 56 (1): 141–156. doi: 10.1093/iclq/lei153
  • Von Heinegg, Wolff Heintschel. 2013. “Territorial Sovereignty and Neutrality in Cyberspace.” International Law Studies 89: 123–156.
  • Walter, Christian. 2015a. “Obligations of States Before, During and After a Cyber Security Incident.” German Yearbook of International Law 58: 67–86.
  • Walter, Christian. 2015b. “Cyber Security als Herausforderung für das Völkerrecht.” Juristen Zeitung 70: 685–693. doi: 10.1628/002268815X14333286907048
  • Wong, Julia Carrie, and Olivia Solon. 2017. “Massive Ransomware Cyber-attack Hits Nearly 100 Countries Around the World.” Guardian, May 12.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.