, to see if you have full access to this publication.
Book Titles No access
Das Kampfführungsrecht im internationalen Cyberkrieg
- Authors:
- Publisher:
- 10.12.2018
Keywords
Search publication
Bibliographic data
- Publication year
- 2018
- Publication date
- 10.12.2018
- ISBN-Print
- 978-3-8487-5103-7
- ISBN-Online
- 978-3-8452-9305-9
- Publisher
- Nomos, Baden-Baden
- Series
- Kölner Schriften zum Friedenssicherungsrecht - Cologne Studies on International Peace and Security Law - Études colonaises sur le droit de la paix et de la sécurité internationale
- Volume
- 10
- Language
- German
- Pages
- 265
- Product type
- Book Titles
Table of contents
ChapterPages
- Titelei/Inhaltsverzeichnis No access Pages 1 - 18
- Einleitung: Problemaufriss und Gang der Arbeit No access Pages 19 - 23
- Informationstechnologien und Kriegsführung No access
- Struktur und völkerrechtlicher Status des Cyberspace No access
- Cyberkriegsführung und Computernetzwerkoperationen No access
- Verschiedene Formen von Computernetzwerkoperationen No access
- Estland 2007 No access
- Georgien 2008 No access
- Stuxnet und das iranische Atomprogramm 2010 No access
- Spionage: Das Bundestag-Intranet 2015 No access
- Ukraine 2014-2016 No access
- Die Besonderheiten der Cyberkriegsführung No access
- Der Begriff und die Zielsetzung des Konfliktsvölkerrechts No access
- Das Verbot überflüssiger Verletzungen und unnötiger Leiden No access
- Der Grundsatz des gutgläubigen und ehrwürdigen Verhaltens No access
- Das Gebot der diskriminierenden Kriegsführung No access
- Der Verhältnismäßigkeitsgrundsatz No access
- Vertrags- und Gewohnheitsrecht im internationalen Konflikt No access
- Voraussetzungen völkergewohnheitsrechtlicher Geltung No access
- Der Menschenrechtsschutz und das Konfliktsvölkerrecht No access
- Generelle Anwendbarkeit des Konfliktsvölkerrechts No access
- Der Anwendungsbereich des Kampfführungsrechts No access
- Der Gewaltbegriff im Friedenssicherungs- und Konfliktsvölkerrecht No access
- Instrument-Based v. Consequence-Based Approach No access
- Typische Auswirkungen einer Gewaltanwendung No access
- Direktheit des Schadens No access
- Unmittelbarkeit No access
- Vorhersehbarkeit (Foreseeability und Adäquanztheorie) No access
- Normative Bewertung des Einzelfalls No access
- Kriterien im Rahmen des Unmittelbarkeitsansatzes No access
- Die Bedeutung der Intention des Angreifers No access
- Intensitätsschwelle No access
- Daten als Objekte No access
- Target-Based Approach No access
- Bank- und Finanzinfrastrukturen No access
- Militär/Staatsverwaltung No access
- Zwischenergebnis No access
- Die Identifizierungsproblematik im Cyberspace No access
- Die Kriterien der Staatenverantwortlichkeit No access
- Das Kriterium der Konfliktklassifizierung No access
- Die Vorzugswürdigkeit eines einheitlichen Zurechnungsmaßstabs No access
- Overall Control über Hackergruppen? No access
- Beweisstandard und Beweislast No access
- Zwischenergebnis No access
- Computernetzwerkoperationen neben konventioneller Kriegsführung No access
- Der völkerrechtliche Gewaltbegriff und der konfliktsvölkerrechtliche Angriffsbegriff No access
- Ein Angriff als Hürde zum Schutz? No access
- Die Ausnahme: Das Verbot menschlicher Schutzschilder No access
- Die Angriffsdefinition No access
- Militärische Objekte No access
- Beschränkung des Angriffs auf die militärisch genutzte Komponente eines Objekts? No access
- Medizinische Objekte No access
- Lebensnotwendige Objekte für die Zivilbevölkerung No access
- Anlagen und Einrichtungen, die gefährliche Kräfte enthalten No access
- Besonderer Schutzstatus für ausgewählte Infrastrukturen? No access
- Der Verhältnismäßigkeitsgrundsatz No access
- Exkurs: Militärische Notwendigkeit als ein allgemeiner Verhältnismäßigkeitsmaßstab? No access
- Die Pflicht der Verwendung des mildesten Mittels zur Minimierung von Kollateralschäden No access
- Die Pflicht zur Warnung No access
- Die Schutzpflichten des Angegriffenen – Pflicht zur Trennung ziviler und militärischer Infrastrukturen No access
- Generelle Grenzen No access
- Angriffe zum Zweck der Schreckensverbreitung No access
- Psychische Leiden und der Angriffsbegriff No access
- Androhungen eines Angriffs No access
- Zwischenergebnis No access
- Die Kennzeichnungspflicht im Allgemeinen No access
- Die Identifizierungsfunktion von IP-/E-Mail-Adressen und domains No access
- Missbrauch von anerkannten Schutzzeichen No access
- Verwendung des Emblems der VN und neutraler Kennzeichen No access
- Verwendung gegnerischer Kennzeichen No access
- Eingriffe in die gegenerische Kommunikation No access
- Vortäuschen einer zivilen Urheberschaft No access
- Ergebnisse der Arbeit No access
- Gesamtbetrachtung No access
- Literaturverzeichnis No access Pages 237 - 253
- Rechtsprechungsverzeichnis No access Pages 254 - 258
- Dokumentenverzeichnis No access Pages 259 - 265
Bibliography (308 entries)
No match found. Try another term.
- Akande, Dapo, Classification of Armed Conflicts: Relevant Legal Concepts, in: Wilmshurst, Elizabeth (Hrsg.), International Law and the Classification of Conflicts, Oxford 2012, S. 32-79 (zitiert als: Akande, in: Wilmshurst). Open Google Scholar
- Akande, Dapo, Clearing the Fog of War? The ICRC’s Interpretative Guidance on Direct Participation in Hostilities, International and Comparative Law Quarterly 59 (2010), S. 180-192. Open Google Scholar
- Ariav, Roee, Hardly the Tadić of Targeting: Missed opportunities in the ICTY’s Gotovina Judgments, Israel Law Review 48 (2015), S. 329-355. Open Google Scholar
- Arimatsu, Louise, A Treaty for Governing Cyber-weapons: potential Benefits and practical Limitations, in: Czosseck, C/Ottis, Ryan/Ziolkowski, Katharina (Hrsg.), 4th International Conference on Cyber Conflict, Tallinn 2012, S. 91-110 (zitiert als: Arimatsu, CyCon 2012). Open Google Scholar
- Arimatsu, Louise, Classifying cyber warfare, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015 (Arimatsu, in: Tsagourias/Buchan). Open Google Scholar
- Arkin, William M., Cyber Warfare and the Environment, Vermont Law Review 25 (2001), S. 779-791. Open Google Scholar
- Baker, Christopher D., Tolerance of International Espionage: A Functional Approach, American University International Law Review 19 (2004), S. 1091-1113. Open Google Scholar
- Bannelier-Christakis, Karine, Is the principle of distinction still relevant in cyberwarfare?, in: Tsagourias, Nicholas /Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 343-365 (zitiert als: Bannelier-Christakis, in: Tsagourias/Buchan). Open Google Scholar
- Barber, Rebecca J., The Proportionality Equation: Balancing Military Objectives with Civilian Lives in Armed Conflict in Afghanistan, Journal of Conflict and Security Law 15 (2010), S. 467-500. Open Google Scholar
- Barkham, Jason, Information Warfare and International Law on the Use of Force, New York University Journal of International Law and Politics 34 (2001). S. 57-114. Open Google Scholar
- Bartels, Rogier, Dealing with the Principle of Proportionality in Armed Conflict in Retrospect: The Application of the Principles in International Criminal Trials, Israel Law Review 46 (2013), S. 217-315. Open Google Scholar
- Baruch, Pnina Sharvit/Neuman, Noam, Warning Civilians Prior to Attack under International Law: Theory and Practice, International Law Studies 87 (2011), S. 359-412. Open Google Scholar
- Benatar, Marco, The Use of Cyber Force: Need for Legal Justification?, Goettingen Journal of International Law 1 (2009), S. 375-396. Open Google Scholar
- Bill, Brian J., The Rendulic ‚Rule’: Military Necessity, Commander’s Knowledge, and Methods of Warfare, Yearbook of International Humanitarian Law 12 (2009), S. 119-155. Open Google Scholar
- Blank, Laurie R., Defining the Battlefield in Contemporary Conflict and Counterterrorism: Understanding the Parameters of the Zone of Combat, Georgia Journal of International and Comparative Law 39 (2010), S. 1-38. Open Google Scholar
- Blank, Laurie R., International Law and Cyber Threats from Non-State Actors, International Law Studies 89 (2013), S. 406-437. Open Google Scholar
- Boothby, William, Cyber Deception and Autonomous Attack – Is There a Legal Problem?, in: Podins, Karlis/Stinissen, Jan/Maybaum, Markus (Hrsg.), 5th International Cyber Conference on Cyber Conflict, Tallinn 2013, S. 245-261 (zitiert als: Boothby, CyCon 2013). Open Google Scholar
- Boothby, William, Methods and Means of Cyber Warfare, International Law Studies 89 (2013), S. 387-405. Open Google Scholar
- Boothby, William, The Law of Targeting, Oxford 2012 (zitiert als: Boothby, Targeting). Open Google Scholar
- Boothby, William, Weapons and the Law of Armed Conflict, 2. Aufl., Oxford 2016 (zitiert als: Boothby, Weapons). Open Google Scholar
- Bothe Michael, Effective control during invasion: a practical view on the application threshold of the law of occupation, International Review of the Red Cross 94 (2012), S. 37-41. Open Google Scholar
- Bothe, Michael, Friedenssicherung und Kriegsrecht, in: Graf Vitzthum, Wolfgang (Hrsg.), Völkerrecht, 5. Aufl., Göttingen 2010, S. 639-740 (zitiert als: Bothe, in: Graf Vitzthum). Open Google Scholar
- Bothe, Michael/Partsch, Karl Josef/Solf, Waldemar A. (Hrsg.), New Rules for Victims of Armed Conflicts - Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949, Den Haag 1982, (zitiert als: Bothe/Partsch/Solf). Open Google Scholar
- Bothe, Michael/Partsch, Karl Josef/Solf, Waldemar A., Die Genfer Konferenz über humanitäres Völkerrecht: Verlauf und Ergebnisse, Zeitschrift für ausländisches und öffentliches Recht und Völkerrecht 38 (1978), S. 1-159. Open Google Scholar
- van Boven, Theo, Categories of Rights, in: Moeckli, Daniel/Shah, Sangeeta/Sivakumaran, Sandesh (Hrsg.), International Human Rights Law, 2. Aufl., Oxford 2014, S. 143-156 (zitiert als: van Boven, in: Moeckli/Shah/Sivakumaran). Open Google Scholar
- de Brabandere, Eric, Propaganda, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. VIII, S. 507-514 (zitiert als: de Brabandere, MPEPIL). Open Google Scholar
- Brownlie, Ian, International Law and the Use of Force by States, Oxford 1963, (zitiert als: Brownlie). Open Google Scholar
- Buchan, Russell, Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions, Journal of Conflict and Security Law 17 (2012), S. 211-227. Open Google Scholar
- Buchan, Russell, Cyber espionage and international law, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 168-189 (zitiert als: Buchan, in Tsagourias/Buchan). Open Google Scholar
- Buchan, Russell, Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm, Journal of Conflict and Security Law 21 (2016), S. 429-453. Open Google Scholar
- Carnahan, Burrus M., Lincoln, Lieber and the Laws of War: The Origins and Limits of the Principle of Military Necessity, American Journal of International Law 92 (1998), S. 213-231. Open Google Scholar
- Carswell, Andrew J., Classifying the conflict: a soldier’s dilemma, International Review of the Red Cross 91 (2009), S. 143-161. Open Google Scholar
- Cassese, Antonio, The Martens Clause: Half a Loaf or Simply Pie in the Sky?, European Journal of International Law 11 (2000), S. 187-216. Open Google Scholar
- Castellanos-Jankiewicz, León, Causation and International State Responsibility, Amsterdam Center of International Law Research Paper No 07 (2012), URL: http://www.s haresproject.nl/publication/causation-and-international-state-responsibility/, besucht am: 5.8. 2018. Open Google Scholar
- Cathcart, Blaise, Legal Dimensions of Special Forces and Information Operations, in: Gill, Terry/Fleck, Dieter (Hrsg.), The Handbook of the International Law of Military Operations, S. 395-414 (zitiert als: Cathcart, in: Gill/Fleck). Open Google Scholar
- Chainoglou, Kalliopi, Psychological Warfare, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. VIII, S. 559-565 (zitiert als: Chainoglou, MPEPIL). Open Google Scholar
- Clapham, Andrew, The Concept of International Armed Conflict, in: Clapham, Andrew/Gaeta, Paola/ Sassòli, Marco (Hrsg.), The 1949 Geneva Conventions – A Commentary, Oxford 2015, S. 3-26 (zitiert als: Clapham, in: Clapham/Gaeta/Sassòli). Open Google Scholar
- Clark, David D./Landau, Susan, Untangling Attribution, in: National Research Council, Proceeding of a Workshop on Deterring Cyberattacks - Informing Strategies and Developing Options for U.S. Policy, Washington 2010, S. 25-40 (zitiert als: Clark/Landau, in: National Research Council). Open Google Scholar
- Condorelli, Luigi/Kreß, Claus, The Rules of Attribution: General Considerations, in: Crawford, James/Pellet, Alain/Olleson, Simon (Hrsg.), The Law of International Responsibility. Oxford Commentaries on International Law, Oxford 2010, S. 219-236 (zitiert als: Condorelli/Kreß, in: Crawford/Pellet/Olleson). Open Google Scholar
- Condron, Sean M., Getting It Right: Protecting American Critical Infrastructure in Cyberspace, Harvard Journal of Law and Technology 20 (2007), S. 403-422. Open Google Scholar
- Corn, Geoffrey S./Blank, Laurie R./Jenks, Chris/Jensen, Eric Talbot, Belligerent Targeting and the Invalidity of a Least Harmful Means Test, International Law Studies 89 (2013), S. 536-626. Open Google Scholar
- Cottier, Michael, Article 8 – War Crimes, Introduction/General Remarks, in: Triffterer, Otto/Ambos, Kai (Hrsg.), Commentary on the Rome Statute of the International Criminal Court, 3. Aufl., München 2016, S. 283-299 (zitiert als: Cottier, in: Triffterer/Ambos). Open Google Scholar
- Crawford, Emily/Pert, Alison, International Humanitarian Law, Cambridge 2015 (zitiert als: Crawford/Pert). Open Google Scholar
- Crawford, James, State Responsibility: The General Part, Cambridge 2013 (zitiert als: Crawford). Open Google Scholar
- Czosseck, Christian, State Actors and their Proxies in Cyberspace, in: Ziolkowski, Katherina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 1-24 (zitiert als: Czosseck, in: Ziolkowski). Open Google Scholar
- Deeks, Ashley, The Geography of Cyber Conflict: through a Glass Darkly, International Law Studies 89 (2013), S. 1-20. Open Google Scholar
- Del Mar, Katherine, The Requirement of ‘Belonging’ under International Humanitarian Law, European Journal of International Law 21 (2010), S. 105-124. Open Google Scholar
- Dev, Priyanka R., “Use of Force” and Armed Attack” Thresholds in cyber Conflict: the Looming Gaps and Growing Need for Formal U.N. Response, Texas International Law Journal 50 (2015), S. 381-401. Open Google Scholar
- Dinstein, Yoram, Collateral Damage and the Principle of Proportionality, in: Wippman, David/Evangelista, Matthew (Hrsg.), New Wars, New Laws?, Ardsley 2004, S. 211-224 (zitiert als: Dinstein, in: Wippman/Evangelista). Open Google Scholar
- Dinstein, Yoram, Computer Network Attacks and Self-Defense, International Law Studies 76 (2002), S. 99-119. Open Google Scholar
- Dinstein, Yoram, Discussion on “Dual-Purpose” Targets, Legal and Ethical lessons of NATO’s Kosovo Campaign, International Law Studies 78 (2002), S. 218f. Open Google Scholar
- Dinstein, Yoram, The Conduct of Hostilities under the Law of International Armed Conflict, 3. Aufl., Cambridge 2016 (zitiert als: Dinstein, Conduct of Hostilities). Open Google Scholar
- Dinstein, Yoram, The erga omnes Applicability of Human Rights, Archiv des Völkerrechts 30 (1992), S. 16-21. Open Google Scholar
- Dinstein, Yoram, The Principle of Distinction and Cyber War in International Armed Conflicts, Journal of Conflict and Security Law 17 (2012), S. 261-277. Open Google Scholar
- Dinstein, Yoram, War, Aggression and Self-Defence, 6. Aufl., New York 2017 (zitiert als: Dinstein, War). Open Google Scholar
- Dittmar, Falko, Angriffe auf Computernetzwerke. Ius ad bellum und ius in bello, Berlin 2005 (zitiert als: Dittmar). Open Google Scholar
- Döge, Jenny, Cyber Warfare, Archiv des Völkerrechts 48 (2010), S. 486-501. Open Google Scholar
- Dörmann, Knut, Elements of War Crimes under the Rome Statute of the International Criminal Court, Cambridge 2003 (zitiert als: Dörmann). Open Google Scholar
- Dörmann, Knut, The Applicability of the Additional Protocol to Computer Network Attack; An ICRC Viewpoint, in: Byström, Karin (Hrsg.), Proceedings of the Conference, International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, 17.-19. November 2004, Stockholm, Sweden, Stockholm 2005, S. 139-153 (zitiert als: Dörmann, in: International Expert Conference Stockholm 2004). Open Google Scholar
- Doswald-Beck, Louise (Hrsg.), San Remo Manual on International Law Applicable to Armed Conflicts at Sea, Cambridge 1994 (zitiert als: San Remo Manual). Open Google Scholar
- Doswald-Beck, Louise, Some Thoughts on Computer Network Attack and the International Law of Armed Conflict, International Law Studies 76 (2002), S. 163-185. Open Google Scholar
- Dröge, Cordula, Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians, International Review of the Red Cross 94 (2012), S. 533-578. Open Google Scholar
- Dröge, Cordula, The Interplay between International Humanitarian Law and International Human Rights Law in Situations of Armed Conflict, Israel Law Review 40 (2007) S. 310-355. Open Google Scholar
- Dunbar, N. C. H., Military Necessity in War Crimes Trials, British Yearbook of International Law 29 (1952), S. 442-452. Open Google Scholar
- Dupuy, Pierre-Marie, Evolutionary Interpretations of Treaties: Between Memory and Prophecy, in: Cannizzaro, Enzo (Hrsg.), The Law of Treaties Beyond the Vienna Convention, Oxford 2011, S. 123-137 (zitiert als: Dupuy, in: Cannizzaro). Open Google Scholar
- Dupuy, Pierre-Marie/Viñuales, Jorge E., International Environmental Law, Cambridge 2015 (zitiert als: Dupuy/Viñuales). Open Google Scholar
- Eagleton, Clyde, The Responsibility of States in International Law, New York 1928 (zitiert als: Eagleton). Open Google Scholar
- Estreicher, Samuel, Privileging Asymmetric Warfare (Part II)?: The “Proportionality” Principle under International Humanitarian Law, Chicago Journal of International Law 12 (2011), S. 143-157. Open Google Scholar
- Feil, Jessica, Cyberwar and Unmanned Aerial Vehicles, Case Western Reserve Journal of International Law 45 (2012), S. 513-544. Open Google Scholar
- Fenrick, William J., Attacking the Enemy Civilians as a Punishable Offense, Duke Journal of Comparative & International Law 7 (1997), S. 539-569. Open Google Scholar
- Fenrick, William J., Riding the Rhino: Attempting to Develop Usable Legal Standards for Combat Activities, Boston College International and Comparative Law Review 30 (2007), S. 111-137. Open Google Scholar
- Ferraro, Tristan, IKRK, Occupation and other Forms of Administration of Foreign Territory, Report Expert Meeting, Geneva 2012, URL: https://www.icrc.org/eng/assets/files/ publications/icrc-002-4094.pdf, besucht am: 5.8.2018 (zitiert als: IKRK, Report Occupation). Open Google Scholar
- Fleck, Dieter, Ruses of War and Prohibition of Perfidy, Revue de droit penal militaire et de droit de la guerre 13 (1974), S. 269-314. Open Google Scholar
- Fleck, Dieter, Searching for International Rules Applicable to Cyber Warfare – A Critical First Assessment of the New Tallinn Manual, Journal of Conflict and Security Law 18 (2013), S. 331-351. Open Google Scholar
- Franzese, Partick W., Sovereignty in Cyberspace: Can It Exist?, Air Force Law Review 64 (2009), S. 1-42. Open Google Scholar
- Gardam, Judith, Necessity, Proportionality and the Use of Force by States, Cambridge 2004 (zitiert als: Gardam). Open Google Scholar
- Gasser, Hans-Peter/Melzer, Nils, Humanitäres Völkerrecht, 2. Aufl., Genf 2012 (zitiert als: Gasser/Melzer). Open Google Scholar
- Gaycken, Sandro, Cyberwar – Das Internet als Kriegsschauplatz, München 2011 (zitiert als. Gaycken). Open Google Scholar
- Geers, Kenneth (Hrsg.), Cyber War in Perspective: Russian Aggression Against Ukraine, Tallinn 2015 (zitiert als: Geers). Open Google Scholar
- Geiß, Robin, Cyber-Warfare: Implications for Non-international Armed Conflicts, International Law Studies 89 (2013), S. 627-645. Open Google Scholar
- Geiß, Robin, The Obligation to Respect and to Ensure Respect for the Conventions, in: Clapham, Andrew/Gaeta, Paola/ Sassòli, Marco (Hrsg.), The 1949 Geneva Conventions – A Commentary, Oxford 2015, S. 111-134 (zitiert als: Geiß, in: Clapham/Gaeta/ Sassòli). Open Google Scholar
- Geiß, Robin, War and Law in Cyberspace. The Conduct of Hostilities in and Via Cyberspace, American Society for International Law Proceedings 2010, S. 371-374 (zitiert als: Geiß, ASIL Proceedings 2010). Open Google Scholar
- Geiß, Robin/Lahmann, Henning, Cyber Warfare: Applying the Principle of Distinction in an Interconnected Space, Israel Law Review 45 (2012), S. 381399. Open Google Scholar
- Gervais, Michael, Cyber Attacks and the Laws of War, Journal of Law & Cyber Warfare 1 (2012), S. 8-98. Open Google Scholar
- Gill Terry D., International humanitarian law applied to cyber-warfare: precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 366-379 (zitiert als: Gill, in: Tsagourias/Buchan). Open Google Scholar
- Gill, Terry D., Chivalry: A Principle of the Law of Armed Conflict?, in: Matthee, Mariëlle/Toebes, Brigit/Brus, Marcel (Hrsg.), Armed Conflict and International Law: In Search of the Human Face, Den Haag 2013, S. 33-51 (zitiert als: Gill, in: Matthee/Toebes/Brus). Open Google Scholar
- Gill, Terry D., Non-intervention in the Cyber Context, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for State Activities in Cyber Space, Tallinn 2013, S. 217-238 (zitiert als: Gill, in: Ziolkowski). Open Google Scholar
- Gill, Terry D./Ducheine, Paul A.L., Anticipatory Self-Defense in the Cyber Context, International Law Studies 89 (2013), S. 438-471. Open Google Scholar
- Gimmerthal, Michael, Kriegslist und Perfidieverbot im Zusatzprotokoll vom 10. Juni 1977 zu den vier Genfer Rotkreuz-Abkommen von 1949 (Zusatzprotokoll I), Bochum 1990 (zitiert als: Gimmerthal). Open Google Scholar
- Gisel, Laurent, Can the incidental killing of military doctors never be excessive?, International Review of the Red Cross 95 (2013), S. 215-230. Open Google Scholar
- Glennon, Michael J., The Road ahead: Gaps, Leaks and Drips, International Law Studies 89 (2013), S. 362-386. Open Google Scholar
- Goddard, David S., Applying the European Convention on Human Rights to the Use of Force: Al-Saadoon, International Law Studies 91 (2015), S. 402-424. Open Google Scholar
- Goldman, Robert K., Extraterritorial Application of human rights to life and personal liberty, including habeas corpus, during situations of armed conflict, in: Kolb, Robert/Gaggioli, Gloria (Hrsg.) Research handbook on human rights and humanitarian law, Cheltenham 2013, S. 104-124 (zitiert als: Goldman, in: Kolb/Gaggioli). Open Google Scholar
- Goldsmith, Jack, How Cyber Changes the Laws of War, European Journal of International Law 24 (2013), S. 129-138. Open Google Scholar
- Graham, David E., Cyber Threats and the Law of War, Journal of National Security Law and Policy 4 (2010), S. 87-102. Open Google Scholar
- Gray, Christine, International Law and the Use of Force, Cambridge 2008 (zitiert als: Gray). Open Google Scholar
- Gray, Christine, Targeted Killings: Recent US Attempts to Create a Legal Framework, University of Cambridge Law Faculty Legal Studies Research Paper Series 52 (2013), URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2330257, besucht am: 4.8. 2018. Open Google Scholar
- Green, James A., The regulation of cyber warfare under the jus ad bellum, in: Green, James A. (Hrsg.), Cyber Warfare: A multidisciplinary analysis, London 2015, S. 96-124 (zitiert als: Green, in: Green). Open Google Scholar
- Green, Leslie C., The Contemporary Law of Armed Conflict, 3. Aufl., Manchester 2008 (zitiert als: Green). Open Google Scholar
- Greenberg, Lawrence T./Goodman, Seymour E./Soo Hoo, Kevin J., Information Warfare and International Law, National Defence University Press 1998 (zitiert als: Greenberg/Goodman/Soo Hoo). Open Google Scholar
- Greenwood, Christopher, Historical Developments and Legal Basis, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 2. Aufl., Oxford 2008, S. 1-44 (zitiert als: Greenwood, in: Fleck). Open Google Scholar
- Greenwood, Christopher, Scope of Application of Humanitarian Law, in: Fleck, Dieter, The Handbook of International Humanitarian Law, 2. Aufl., Oxford 2008, S. 45-78 (zitiert als: Greenwood, in: Fleck). Open Google Scholar
- Greenwood, Christopher, The Law of Weaponry at the Start of the New Millennium, in: Greenwood, Christopher, Essays on War in International Law, London 2006, S. 223-274 (zitiert als: Greenwood, in: Greenwood). Open Google Scholar
- Griebel, Jörn/Plücken, Milan, New Developments Regarding the Rules of Attribution? The International court of Justice’s Decision in Bosnia v. Serbia, Leiden Journal of International Law 21 (2008), S. 601-622. Open Google Scholar
- Handler, Stephanie Gosnell, The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare, Stanford Journal of International Law 48 (2012), S. 209-237. Open Google Scholar
- Harrison Dinniss, Heather, Cyber Warfare and the Law of War, Cambridge 2012 (zitiert als: Harrison Dinniss). Open Google Scholar
- Hart, Herbert L.A./Honoré, Anthony, Causation in the law, 2. Aufl. Oxford 1985, Nachdruck 2002 (zitiert als: Hart/Honoré). Open Google Scholar
- Haslam, Emily, Information Warfare: Technological Changes and International Law, Journal of Conflict and Security Law 5 (2000), S. 157-175. Open Google Scholar
- Hathaway, Oona A./Crootof, Rebecca/ Levitz, Philip/ Nix, Haley/Nowlan, Aileen/Spiegel, Julia, The Law of Cyber-Attack, California Law Review 100 (2012), S. 817-886. Open Google Scholar
- Hayashi, Nobuo, Requirements of Military Necessity in International Humanitarian Law and International Criminal Law, Boston University International Law Journal 28 (2010), S. 39-140. Open Google Scholar
- Heintschel von Heinegg, The Law of Armed Conflict at Sea, in: Dieter Fleck (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 463-547 (zitiert als: Heintschel von Heinegg, in: Fleck). Open Google Scholar
- Heintschel von Heinegg, Wolff, Auslegung völkerrechtlicher Verträge, in: Ipsen, Knut (Hrsg.), Völkerrecht, 6. Aufl., München 2014, S. 407-415 (zitiert als: Heintschel von Heinegg, in: Ipsen). Open Google Scholar
- Heintschel von Heinegg, Wolff, Informationskrieg und Völkerrecht, in: Epping, Volker/Fischer, Horst/Heintschel von Heinegg, Wolff (Hrsg.), Brücken bauen und begehen, München 2000, S. 129-155. (zitiert als: Heintschel von Heinegg, in: Epping/Fischer/ Heintschel von Heinegg). Open Google Scholar
- Heintschel von Heinegg, Wolff, Naval Blockade, International Law Studies 75 (2000), S. 203-230. Open Google Scholar
- Heintschel von Heinegg, Wolff, Territorial Sovereignty and Neutrality in Cyberspace, International Law Studies 89 (2013), S. 123-156. Open Google Scholar
- Heintze, Hans-Joachim, On the relationship between human rights law protection and international humanitarian law, International Review of the Red Cross 86 (2004), S. 789-814. Open Google Scholar
- Henckaerts, Jean-Marie/ Doswald-Beck, Louise, IKRK, Customary International Humanitarian Law, Cambridge 2005 (zitiert als: IKRK Customary Law Study). Open Google Scholar
- Henderson, Ian, The Contemporary Law of Targeting, Leiden 2009 (zitiert als: Henderson). Open Google Scholar
- Henderson, Ian, The use of cyber force: Is the jus ad bellum ready?, Questions of International Law, Zoom-in 27 (2016), S. 3-11. Open Google Scholar
- Hollis, Duncan B., Why States Need an International Law for Information Operations, Lewis & Clark Law Review 11 (2007), S. 1023-1062. Open Google Scholar
- Honoré, Antony, Causation in the law, in: Zalta, Edward N. (Hrsg.) Stanford Encyclopedia of Philosophy, Stanford 2010, URL: http://plato.stanford.edu/entries/causation-law/, besucht am: 4.8.2018 (zitiert als: Honoré, Stan. Ency. Philo.). Open Google Scholar
- Huntley, Tood C, Controlling the Use of Force in Cyber Space: The Application of the Law of Armed Conflict During a Time of Fundamental Change in the Nature of Warfare, Naval Law Review 60 (2010), S. 1-40. Open Google Scholar
- Ipsen, Knut, Bewaffneter Konflikt und Neutralität, in: Ipsen, Knut (Hrsg.), Völkerrecht, 6. Aufl., München 2014, S. 1175-1258 (zitiert als: Ipsen, in: Ipsen). Open Google Scholar
- Ipsen, Knut, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 79-113 (zitiert als: Ipsen, in: Fleck). Open Google Scholar
- Jenkins, Ryan, Is Stuxnet Physical? Does It Matter?, 12 Journal of Military Ethics 1 (2013), S. 68-79. Open Google Scholar
- Jensen, Eric Talbot, Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, Stanford Journal of International Law 38 (2002), S. 207-240. Open Google Scholar
- Jensen, Eric Talbot, Cyber Attacks: Proportionality and Precautions in Attack, International Law Studies 89 (2013), S. 198-217. Open Google Scholar
- Jensen, Eric Talbot, Cyber Warfare and Precautions Against the Effects of Attacks, Texas Law Review 88 (2010), S. 1533-1569. Open Google Scholar
- Jensen, Eric Talbot, Unexpected Consequences from Knock-on Effects: A Different Standard for Computer Network Operations?, American University Law Review 18 (2003), S. 1145-1188. Open Google Scholar
- Jinks, Derek, The Applicability of the Geneva Conventions to the “Global War on Terrorism”, Virginia Law Journal of International Law 46 (2005), S. 165-195. Open Google Scholar
- Joseph, Sarah/Fletcher, Adam, Scope of Application, in: Moeckli, Daniel/Shah, Sangeeta/ Sivakumaran, Sandesh (Hrsg.), International Human Rights Law, 2. Aufl., Oxford 2014, S. 117-139 (zitiert als: Joseph/Fletcher, in: Moeckli/Shah/Sivakumaran). Open Google Scholar
- Joyner, Christopher/Lotrionte, Catherine, Information Warfare as International Coercion: Elements of a Legal Framework, European Journal of International Law 12 (2001), S. 825-865. Open Google Scholar
- Jupillat, Nicolas, From the Cuchoo’s Egg to Global Surveillance: Cyber Espionage that Becomes Prohibited Intervention, North Carolina Journal of International Law 42 (2017), S. 933-988. Open Google Scholar
- Kälin, Walter/Künzli, Jörg, Universeller Menschnrechtsschutz – Der Schutz der Individuums auf globaler und regionaler Ebene, 3. Aufl., Basel 2013 (zitiert als: Kälin/Künzli). Open Google Scholar
- Kalshoven, Frits/Zegveld, Liesbeth, Constraints on the Waging of War. An Introduction to International Humanitarian Law, 4. Aufl., Cambridge 2011 (zitiert als: Kalshoven/Zeg-veld). Open Google Scholar
- Kanuck, Sean P., Information Warfare: New Challenges for Public International Law, Harvard International Law Journal 37 (1996), S. 272-292. Open Google Scholar
- Kanuck, Sean P., Sovereign Discourse on Cyber Conflict under International Law, Texas Law Review 88 (2010), S. 1571-1597. Open Google Scholar
- Kapaun, Nina, Völkerrechtliche Bewertung gezielter Tötungen nicht-staatlicher Akteure, Köln 2014 (zitiert als: Kapaun). Open Google Scholar
- Kearney, Michael G., Propaganda in the jurisprudence of the International Criminal Tribunal for the former Yugoslavia, in: Dojčinović, Predrag (Hrsg.), Propaganda, War Crime Trials and International Law. From the Speaker’s Corner to War Crimes, New York 2012, S. 231-253 (zitiert als: Kearney, in: Dojčinović). Open Google Scholar
- Keller, Patrick, „Cyberkrieg“ – Eine sicherheitspolitische Aufgabe ersten Ranges, Politische Meinung 59 (2014), S. 74-78. Open Google Scholar
- Kelsey, Jeffrey T. G., Hacking into International Humanitarian Law: The Principle of Distinction and Neutrality in the Age of Cyber Warfare, Michigan Law Review 106 (2008), S. 1427-1452. Open Google Scholar
- Kerschischnig, Georg, Cyberthreats and international law, Den Haag 2012 (zitiert als: Kerschischnig). Open Google Scholar
- Kilovaty, Ido, Rethinking the Prohibition on the Use of Force in the Lights of Economic Cyber Warfare: Towards a Broader Scope of Article 2 (4) of the UN Charter, Journal of Law and Cyber Warfare 4 (2015), S. 210-244. Open Google Scholar
- Kirchner, Stefan, Distributed Denial-of Service Attacks Under Public International Law: State Responsibility in Cyberwar, IUP Journal of Cyber Law 3 (2009), 10-23. Open Google Scholar
- Kleffner, Jann K., Scope of Application of International Humanitarian Law, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 43-78 (zitiert als: Kleffner, in: Fleck). Open Google Scholar
- Kleinwächter, Wolfgang, Wer regiert das Internet? Internet Governance auf dem Prüfstand, Zeitschrift für die Verneinten Nationen und ihre Sonderorganisationen 2 (2016), S. 67-72. Open Google Scholar
- Knake, Robert, Untangling Attribution: Moving to Accountability in Cyberspace (2010), URL: http://science.house.gov/sites/republicans.science.house.gov/files/documents/heari ngs/071510_Knake.pdf, besucht am: 30.11.2012 (zitiert als: Knake). Open Google Scholar
- Kohl, Uta, Jurisdiction in cyberspace, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 30-54 (zitiert als: Kohl, in: Tsagourias/Buchan). Open Google Scholar
- Kolb, Robert, Advanced Introduction to International Humanitarian Law, Cheltenham 2014 (zitiert als: Kolb). Open Google Scholar
- Kreß Claus, The State Conduct Element, in: Kreß, Claus/Barriga, Stefan (Hrsg.) The Crime of Aggression: A Commentary, Bd. 1, Cambridge 2016, S. 412-564 (zitiert als: Kreß, in: Kreß/Barriga). Open Google Scholar
- Kreß, Claus, The 1999 Crisis in East Timor and the Threshold of the Law on War Crimes, Criminal Law Forum 13 (2002), S. 409-470. Open Google Scholar
- Kreß, Claus, War Crimes Committed in Non-International Armed Conflict and the Emerging System of international Criminal Justice, Israel Yearbook on Human Rights 30 (2000), S. 103-177. Open Google Scholar
- Kretzmer, David, Targeted Killing of Suspected Terrorists: Extra-Judicial Executions of Legitimate Means of Defence, European Journal of International Law 16 (2005), S. 171-212. Open Google Scholar
- Krieger, Heike, Krieg gegen anonymous, Völkerrechtliche Regelungsmöglichkeiten bei unsicherer Zurechnung im Cyberwar, Archiv des Völkerrechts 50 (2012), S. 1-20. Open Google Scholar
- Lange, Hermann/Schiemann, Gottfried, Schadensersatz, 3. Aufl., Tübingen 2003 (zitiert als: Lange/Schiemann). Open Google Scholar
- Lawson, F.H./Markensinis B.S., Tortious Liability for unintentional harm in the Common law and Civil law, Cambridge 1982 (zitiert als: Lawson/Markensinis). Open Google Scholar
- Lewis, James Andrew, ‘Compelling Opponents to Our Will’: The Role of Cyber warfare in Ukraine, in: Geers, Kenneth (Hrsg.), Cyber War in Perspective: Russian Aggression Against Ukraine, Tallinn 2015, S. 39-47 (zitiert als: Lewis, in: Geers). Open Google Scholar
- Li, Sheng, When Does Internet Denial Trigger the Right of Armed Self-defense?, Yale Journal of International Law 38 (2013), S. 179-216. Open Google Scholar
- Libicki, Martin C., Cyberspace is not a Warfighting Domain, I/S: A Journal of Law and Policy for the Information Society 8 (2012), S. 321-336. Open Google Scholar
- Liivoja, Rain/McCormack, Tim, Chapter 3: Law in the Virtual Battlespace: The Tallinn Manual and the Jus in Bello, Yearbook of International Humanitarian Law 15 (2012), S. 45-58. Open Google Scholar
- Linaki, Evangelia, Cyber Warfare and International Humanitarian Law: a Matter of Applicability, Humanitäres Völkerrecht-Informationsschriften 27 (2014), S. 169-175. Open Google Scholar
- Lubell, Noam, Challenges in applying human rights to armed conflict, International Review of the Red Cross 87 (2005), S. 737-754. Open Google Scholar
- Lubell, Noam, Extraterritorial Use of Force Against Non-State Actors, Oxford, 2010 (zitiert als: Lubell). Open Google Scholar
- Lubell, Noam, Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?, International Law Studies 89 (2013), S. 696-743. Open Google Scholar
- de Luca, Christopher D., The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors, Pace International Law Review Online Companion 3 (2013), S. 278-315. Open Google Scholar
- Lueder, Karl, Krieg und Kriegsrecht im Allgemeinen, in: von Holtzendorff, Franz (Hrsg.), Handbuch des Völkerrechts, Bd. 4, Die Staatsstreitigkeiten und ihre Entscheidung, Hamburg 1889, S. 169-367 (zitiert als: Lueder, in: von Holtzendorff). Open Google Scholar
- Lynn, William F., Defending a new Domain: The Pentagon’s Cyberstrategy, Foreign Affairs 89 (2010), S. 97-108. Open Google Scholar
- Mačak, Kubo, Decoding Articles 8 of the International Law Commission’s Article on State Responsibility: Attribution of Cyber Operations by Non-State Actors, Journal of Conflict and Security Law 21 (2016), S. 405-428. Open Google Scholar
- Mačak, Kubo, Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Law, Israel Law Review 48 (2015), S. 55-80. Open Google Scholar
- Maslen, Stuart Casey, Non-kinetic-energy weapons termed ‚non-lethal’ URL: http://www. geneva-academy.ch/docs/projets/Non-Kinetic-EnergyOctober2010.pdf, besucht am: 27. 3.2013 (zitiert als: Maslen). Open Google Scholar
- McDonald, Avril, Declarations of War and the Belligerent Parties: International Law Governing Hostilities between States and Transnational Terrorist Networks, Netherlands International Law Review 54 (2007), S. 279-314. Open Google Scholar
- McGavarn, Wolfgang, Intended Consequences: Regulating Cyber Attacks, Tulane Journal of Technology and Intellectual Property 12 (2009), S. 259-275. Open Google Scholar
- Mégret, Frédéric, Nature of Obligations, in: Moeckli/Shah/Sivakumaran (Hrsg.), International Human Rights Law, 2. Aufl., Oxford 2014, S. 96-118 (Mégret, in: Moeckli/Shah/Sivakumaran). Open Google Scholar
- Melzer, Nils, Cyber operations and jus in bello, United Nations Institute for Disarmament Research, disarmament forum 4 (2011), URL: http://www.unidir.org/files/publications/ pdfs/confronting-cyberconflict-en-317.pdf, besucht am: 4.8.2018 (zitiert als: Melzer, Cyber operations). Open Google Scholar
- Melzer, Nils, Cyberwarfare and International Law, United Nations Institute for Disarmament Research, Ideas for Peace and Security-Resources 2011, URL: http://unidir.org/ files/publications/pdfs/cyberwarfare-and-international-law-382.pdf, besucht am: 4.8. 2018 (zitiert als: Melzer, Cyberwarfare). Open Google Scholar
- Melzer, Nils, Targeted Killing in International Law, Oxford 2008 (zitiert als: Melzer). Open Google Scholar
- Meron, Theodor, Classification of Armed Conflict in the Former Yugoslavia: Nicaragua’s Fallout, American Journal of International Law 92 (1998), S. 236-242. Open Google Scholar
- Meron, Theodor, Human Rights and Humanitarian Norms as Customary Law, Oxford 1989, Nachdruck 2011 (zitierte: Meron). Open Google Scholar
- Meron, Theodor, Humanization of International Law, American Journal of International Law 94 (2000), S. 239-278. Open Google Scholar
- Meron, Theodor, The Martens Clause, Principle of Humanity, and Dictates of Public Conscience, American Journal of International Law 94 (2000), S. 78-89. Open Google Scholar
- Meyer, Richard V., The Privilege of Belligerency and Formal Declarations of War, in: Finkelstein, Claire/Ohlin, Jens David/Altman, Andrew (Hrsg), Targeted Killings, Oxford 2012, S. 183-219 (zitiert als: Meyer, in: Finkelstein/Ohlin/Altman). Open Google Scholar
- Meyrowitz, Henri, Les armes psychochimiques et le droit international, Annuaire Français de Droit International 10 (1964), S. 81-126. Open Google Scholar
- Meyrowitz, Henri, The Principle of Superfluous Injury or Unnecessary Suffering, International Review of the Red Cross 34 (1994), S. 98-122. Open Google Scholar
- Milanovic, Marko, Extraterritorial Application of Human Rights Treaties, Oxford 2013 (zitiert als: Milanovic). Open Google Scholar
- Milanovic, Marko/Hadzi-Vidanovic, Vidan, A Taxonomy of Armed Conflict, in: White, Nigel D./Henderson, Christian (Hrsg.), Research handbook on international conflict and security law, Cheltenham 2013, S. 256-314 (zitiert als: Milanovic/ Hadzi-Vidanovic, in: White/Henderson). Open Google Scholar
- Miyazaki, Shigeki, The Martens Clause and International Humanitarian Law, in: Swinarski, Christophe (Hrsg.), Studies and Essays on International Humanitarian Law and the Red Cross Principles, Genf 1984, S. 432-444 (zitiert als: Miyazaki, in: Swinarski). Open Google Scholar
- Moir, Lindsay, The Law of Internal Armed Conflict, Cambridge 2002 (zitiert als: Moir). Open Google Scholar
- Newton, Michael A., Proportionality and Precaution in Cyber Attacks, in: Saxon, Dan (Hrsg.), International Humanitarian Law and the Changing Technology of War, Den Haag 2013), S. 229-249 (zitiert als: Newton, in: Saxon). Open Google Scholar
- Nguyen, Reese, Navigating Jus Ad Bellum in the Age of Cyber Warfare, California Law Review 101 (2013), S. 1079-1130. Open Google Scholar
- O’Brien, William V., The Jus in Bello in Revolutionary War and Counterinsurgency, Virgina Journal of International Law 16 (1978), S. 193-242. Open Google Scholar
- O’Connell, Mary Ellen, Historical Development and Legal Basis, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 1-42 (zitiert als: O’Connell, in: Fleck). Open Google Scholar
- O’Connell, Mary Ellen, When is War Not a War? The Myth of the Global War on Terror, International Law Students Association Journal of International and Comparative Law 12 (2006), S. 535-539. Open Google Scholar
- Oellers-Frahm, Karin, Comment: The erga omnes Applicability of Human Rights, Archiv des Völkerrechts 30 (1992), S. 28-37. Open Google Scholar
- Oeter, Stefan, Comment: Is the Principle of Distinction Outdated?, in: Heintschel von Heinegg, Wolff/Epping, Volker (Hrsg.) International Humanitarian Law Facing New Challenges – symposium in Honour of Knut Ipsen, Berlin 2007 (zitiert als: Oeter, in: Heintschel von Heinegg/Epping). Open Google Scholar
- Oeter, Stefan, Methods and Means of Combat, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 115-230 (zitiert als: Oeter, in: Fleck). Open Google Scholar
- Otto, Roland, Targeted Killings and International Law, Heidelberg 2012 (zitiert als: Otto). Open Google Scholar
- Parameswaran, Katherina, Besatzungsrecht im Wandel – Aktuelle Herausforderungen des Rechts der militärischen Besetzung, Baden-Baden 2008 (zitiert als: Parameswaran). Open Google Scholar
- Parks, W. Hays, Air War and the Law of War, Air Force Law Review 32 (1990), S. 1-226. Open Google Scholar
- Payne, Thomas, Teaching Old Law New tricks: Applying and Adapting State Responsibility to Cyber Operations, Lewis & Clark Law Review 20 (2016), S. 683-715. Open Google Scholar
- Pictet, Jean S. (Hrsg.), IKRK, The Geneva Conventions of 12 August 1949: Commentary Bd. I (1952); Bd. II (1960); Bd. III (1960); Bd. IV (1958) (zitiert als: IKRK Kommentar GK Bd.). Open Google Scholar
- Pictet, Jean, Development and Principles of International Humanitarian Law, Dordrecht 1985 (zitiert als: Pictet). Open Google Scholar
- Pirker, Benedikt, Territorial Sovereignty and Integrity and the Challenges of Cyberspace, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 189-216 (zitiert als: Pirker, in: Ziolkowski). Open Google Scholar
- Pool, Phillip, War of the Cyber World: The Law of Cyber Warfare, International Lawyer 47 (2013), S. 299-323. Open Google Scholar
- Program Humanitarian Policy and Conflict Research at Harvard University, Commentary on the HCPR Manual on International Law Applicable to Air and Missiles Warfare, March 2010, URL: http://ihlresearch.org/amw/Commentary%20on%20the%20HPCR% 20Manual.pdf, besucht am: 8.2.2016 (zitiert als: Commentary, HPCR Manual). Open Google Scholar
- Program on Humanitarian Policy and Conflict Research at Harvard University, HPCR Manual on International Law Applicable to Air and Missile Warfare, 15.5.2009, URL: http://ihlresearch.org/amw/HPCR%20Manual.pdf, besucht am: 12.4.2016 (zitiert als: HPCR Manual). Open Google Scholar
- Pun, Darien, Rethinking Espionage in the Modern Era, Chicago Journal of International Law 18 (2017), S. 353-391. Open Google Scholar
- Radziwill, Yaroslav, Cyber-Attacks and the Exploitable Imperfections of International Law, Leiden 2015 (zitiert als: Radziwill). Open Google Scholar
- Rensmann, Thilo, Die Humanisierung des Völkerrechts durch das ius in bello – Von der Martens’schen Klausel zur ”Responsibility to Protect“ –, Zeitschrift für ausländisches und öffentliches Recht und Völkerrecht 68 (2008), S. 111-118. Open Google Scholar
- Richmond, Jeremy, Evolving Battelfields: Does Stuxnet Demonstrate a Need for Modifications to the Law of Armed Conflict, Fordham International Law Journal 35 (2012), S. 842-894. Open Google Scholar
- Roberts, Adam, The equal application of the laws of war: a principle under pressure, International Review of the Red Cross 90 (2008), S. 931-962. Open Google Scholar
- Roberts, Adam/Guelff, Richard, Documents on the Laws of War, 3. Aufl., Oxford 2000 (zitiert als: Roberts/Guelff). Open Google Scholar
- Robertson, Horace B., Self-Defense against Computer Network Attack under International Law, International Law Studies 76 (2002), S. 121-145. Open Google Scholar
- Rogers, A. P. V., Law on the Battelfield, 3. Aufl., Manchester 2012 (zitiert als: Rogers). Open Google Scholar
- Roscini, Marco, Cyber Opeations and the Use of Force in International Law, Oxford 2014 (zitiert als: Roscini). Open Google Scholar
- Roscini, Marco, World Wide Warfare-Jus ad bellum and the Use of Cyber Force, Max Planck Yearbook of United Nations Law 14 (2010), S. 85-130. Open Google Scholar
- Rusinova, Vera, Perfidy, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. VIII, S. 245-250 (zitiert als: Rusinova, MPEPIL). Open Google Scholar
- Russell, Alison Lawlor, Cyber Blockades, Washington 2014 (zitiert als: Russell). Open Google Scholar
- Ruys, Tom, ‘Armed Attack’ and Article 51 of the UN Charter: Evolutions in Customary Law and Practice, Cambridge 2010 (zitiert als: Ruys). Open Google Scholar
- Ruys, Tom, The Meaning of “Force” and the Boundaries of the Jus Ad Bellum: Are “Minimal” Uses of Force Excluded from UN Charter Article 2 (4)?, The American Journal of International Law 108 (2014), S. 159-219. Open Google Scholar
- Salter, Michael, Reinterpretation Competing Interpretations of the Scope and Potential of the Martens Clause, Journal of Conflict and Security Law 17 (2012), S. 403-437. Open Google Scholar
- Salter, Michael, Reinterpreting Competing Interpretations of the Scope and Potential of the Martens Clause, Journal of Conflict and Security Law 17 (2012), S. 403-437. Open Google Scholar
- Sandoz, Yves/Swinarski, Christophe/Zimmermann, Bruno (Hrsg.), Commentary on the Additional Protocols of June 1977 to the Geneva Conventions of 12 August 1949, Genf 1987 (zitiert als: IKRK Kommentar ZP I/II). Open Google Scholar
- Sassòli Marco, Targeting: The Scope and Utility of the Concept of “Military Objectives“ for the Protection of Civilians in Contemporary Armed Conflict, in: Wippman, David/Evangelista, Matthew (Hrsg.), New Wars, New Laws?, Ardsley 2004, S. 181-210 (zitiert als: Sassòli, in: Wippman/Evangelista). Open Google Scholar
- Sassòli Marco, The Concept and the Beginning of Occupation, in: Clapham, Andrew/Gaeta, Paola/ Sassòli, Marco (Hrsg.), The 1949 Geneva Conventions – A Commentary, Oxford 2015, S. 1389-1419 (zitiert als: Sassòli, in: Clapham/Gaeta/Sassòli). Open Google Scholar
- Saxon, Dan, Violations of International Humanitarian Law by Non-State Actors during Cyberwarfare: Challenges for Investigation and Prosecution, Journal of Conflict and Security Law 21 (2016), S. 555-574. Open Google Scholar
- Schaap, Arie J., Cyber Warfare Operations: Development and Use Under International Law, Air Force Law Review 64 (2009), S. 121-173. Open Google Scholar
- Schiffbauer, Björn, Vorbeugende Selbstverteidigung im Völkerrecht – Eine systematische Ermittlung des gegenwärtigen friedenssicherungsrechtlichen Besitzstandes aus völkerrechtsdogmatischer und praxisanalytischer Sicht, Berlin 2012 (zitiert als: Schiffbauer). Open Google Scholar
- Schindler, Dietrich, Human Rights and Humanitarian Law: Interrelationship of the Laws, American University Law Review 31 (1982), S. 935-977. Open Google Scholar
- Schmitt, Michael N. (Hrsg.), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Cambridge 2013 (zitiert als: Tallinn Manual) Open Google Scholar
- Schmitt, Michael N. (Hrsg.), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge 2013 (zitiert als: Tallinn Manual I). Open Google Scholar
- Schmitt, Michael N., “Attack” as a Term of art in International Law: The Cyber Operation Context, in: Czosseck, C/Ottis, Ryan/Ziolkowski, Katharina (Hrsg.), 4th International Conference on Cyber Conflict. Tallinn 2012, S. 283-293 (zitiert als: Schmitt, CyCon 2012). Open Google Scholar
- Schmitt, Michael N., Classification in Future Conflict, in: Wilmshurst, Elizabeth (Hrsg.), International Law and the Classification of Conflicts, Oxford 2012, S. 455-477 (zitiert als: Schmitt, in: Wilmshurst). Open Google Scholar
- Schmitt, Michael N., Classification of Cyber Conflict, Journal of Conflict and Security Law 17 (2012), S. 245-260. Open Google Scholar
- Schmitt, Michael N., Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Columbia Law Journal of Transnational Law 37 (1999), S. 885-937. Open Google Scholar
- Schmitt, Michael N., Cyber Activities and the Law of Countermeasures, in: Ziolkowski, Katherina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 659-690 (zitiert als: Schmitt, in: Ziolkowski). Open Google Scholar
- Schmitt, Michael N., Cyber Operations and the Jus ad bellum, Revisited, Villanova Law Review 56 (2011), S. 569-606. Open Google Scholar
- Schmitt, Michael N., Cyber Operations and the Jus in bello: Key Issues, Israel Yearbook on Human Rights 41 (2011), S. 113-135. Open Google Scholar
- Schmitt, Michael N., Fault Lines in the Law of Attack, in: Breau, Susan C./Jachec-Neale (Hrsg.), Agnieszka, Testing the Boundaries of International Humanitarian Law, London 2006, S. 277-307 (zitiert als: Schmitt, in: Breau/Jachec-Neale). Open Google Scholar
- Schmitt, Michael N., Human Shields in International Humanitarian Law, Columbia Journal of Transnational Law 47 (2009), S. 292-338. Open Google Scholar
- Schmitt, Michael N., Military Necessity and Humanity in International Law: Preserving the Delicate Balance, Virginia Journal of International Law 50 (2010), S. 795-839. Open Google Scholar
- Schmitt, Michael N., Targeting and Humanitarian Law: Current Issues, International Law Studies 80 (2006), S. 151-194. Open Google Scholar
- Schmitt, Michael N., The Law of Cyber Targeting, 7 Tallinn Paper - A NATO CCD COE Publications on Strategic Cyber Security (2015), URL: https://ccdcoe.org/sites/default/ files/multimedia/pdf/TP_07_2015.pdf, besucht am: 19.7.2016 (zitiert als: Schmitt, Cyber Targeting). Open Google Scholar
- Schmitt, Michael N., The Law of Cyber Warfare: Quo Vadis?, Stanford Law & Policy Review 25 (2014), S. 269-300. Open Google Scholar
- Schmitt, Michael N., The Notion of ‘Objects’ During Cyber Operations: A Riposte in Defence of Interpretative and Applicative Precision, Israel Law Review 48 (2015), S. 81-109. Open Google Scholar
- Schmitt, Michael N., Wired Warfare: Computer Network Attack and the Jus in Bello, International Law Studies 76 (2002), S. 187-218. Open Google Scholar
- Schmitt, Michael N./Vihul, Liis, Proxy Wars in Cyberspace: The Evolving International Law of Attribution, Fletcher Security Review 1 (2014), S. 55-73. Open Google Scholar
- Schmitt, Michael N./Watts, Sean, State Opinio Juris and International Humanitarian Law Pluralism, International Law Studies 91 (2015), S. 171-215. Open Google Scholar
- Schulze, Sven-Hendrik, Cyber-„War“ – Testfall der Staatenverantwortlichkeit, Tübingen 2015 (zitiert als: Schulz). Open Google Scholar
- Scott, Roger D., Legal Aspects of Information Warfare: Military Disruption of Telecommunication, Naval Law Review 45 (1998), S. 57-76. Open Google Scholar
- Shackelford, Scott J., From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Berkeley Journal of International Law 27 (2009), S. 192-252. Open Google Scholar
- Shackelford, Scott J./Andres, Richard B., State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem, Georgetown Journal of International Law 42 (2011), S. 971-1016. Open Google Scholar
- Shackelford, Scott J./Russell, Scott/Kuehn, Andreas, Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors, Chicago Journal of International Law 17 (2016), S. 1-47. Open Google Scholar
- Sharp, Walter Gary, Cyber Space and the Use of Force, North Falls Church 1999 (zitiert als: Sharp). Open Google Scholar
- Shaw, Malcom N., International Law, 7. Aufl., Cambridge 2014 (zitiert als: Shaw). Open Google Scholar
- Shelton, Dinah, Righting Wrongs: Reparations in the Articles on States Responsibility, American Journal of International Law 96 (2002), S. 833-856. Open Google Scholar
- Shue, Henry/Wippman, David, Limiting Attacks on Dual-Use Facilities Performing Indispensable Civilian Functions, Cornell International Law Journal 35 (2002), S. 559-579. Open Google Scholar
- Shulman, Mark R., Discrimination in the Laws of Information Warfare, Columbia Journal of Transnational Law 37 (1999), S. 939-968. Open Google Scholar
- Silver, David, Computer Network Attack as a use of Force under Article 2 (4) of the United Nations Charter, International Law Studies 76 (2002), S. 73-97. Open Google Scholar
- Singer, Peter/Friedman, Allan, Cybersecurity and Cyberwarfare, New York 2014 (zitiert als: Singer/Friedman). Open Google Scholar
- Sklerov, Matthew J., Solving the Dilemma of state Response to Cyberattcks: A Justification for the Use of Active Defenses against States who neglect their duty to prevent, Military Law Review 201 (2009), S. 1-85. Open Google Scholar
- Skogly, Sigrun I., Beyond National Borders: States’ Human Rights Obligation in International Cooperation, Antwerpen 2006 (zitiert als: Skogly). Open Google Scholar
- Skogly, Sigrun I., Extraterritoriality: universal human rights without universal obligations?, in: Joseph, Sarah/McBeth, Adam (Hrsg.), Research handbook on international human rights law, Cheltenham 2010 (zitiert als: Skogly, in: Joseph/McBeth). Open Google Scholar
- Solis, Gary D., The Law of Armed Conflict. International Humanitarian Law in War, Cambridge 2010, (zitiert als: Solis). Open Google Scholar
- Sommario, Emanuele, Applying the ius in bello in the cyber domain: Navigating between lex lata und lex ferenda, Question of International Law, Zoom-in 27 (2016), S. 13-23. Open Google Scholar
- Sorel, Jean-Marc/Boré Eveno, Valérie, Article 31. General rule of Interpretation, in: Corten, Oliver/Klein, Pierre (Hrsg.), The Vienna Convention on the Law of Treaties. A Commentary, Bd. 1, Oxford 2011, S. 804-837 (zitiert als: Sorel/Boré Eveno, in: Corten/Klein). Open Google Scholar
- Spinedi, Marina, On the Non-Attribution of the Bosnian Serbs’ Conduct to Serbia, Journal of International Criminal Justice 5 (2007), S. 829-838. Open Google Scholar
- Spoerri, Philip, The Law of Occupation, in: Clapham, Andrew/Gaeta, Paola (Hrsg.), The Oxford Handbook of International Law in Armed Conflict, Oxford 2004, S. 182-205 (zitiert als: Spoerri, in Clapham/Gaeta). Open Google Scholar
- Stadlmeier, Sigmar/Unger, Walter J., Cyber War und Cyber Terrorismus aus völkerrechtlicher Sicht, in: Kirchmair, Lando/Schmalenbach, Kirsten (Hrsg.), Aktuelle Herausforderungen des Völkerrechts, Frankfurt am Main 2012, S. 63-80 (zitiert als: Stadlmeier/Unger, in: Kirchmair/Schmalenbach). Open Google Scholar
- Stein, Torsten/Marauhn, Thilo, Völkerrechtliche Aspekte von Informationsoperationen, Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 60 (2000), S. 1-40. Open Google Scholar
- Stevenson, Angus, Oxford Dictionary of English, 3. Aufl., Oxford 2010 (zitiert als: Oxford Dictionary). Open Google Scholar
- Stinissen, Jan, A Legal Framework for Cyber Operations in Ukraine, in: Geers, Kenneth (Hrsg.), Cyber War in Perspective: Russian Aggression Against Ukraine, Tallinn 2015, S. 123-134 (zitiert als: Stinissen, in: Geers). Open Google Scholar
- Swanson, Lesley, The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict, Loyola of Los Angeles International and Comparative Law Review 32 (2010), S. 303-333. Open Google Scholar
- Taft, William H., Self-defense and the Oil Platforms Decision, Yale Journal of International Law 29 (2004), S. 295-306. Open Google Scholar
- Talmon, Stefan, The Responsibility of Outside Powers for Acts of Secessionist Entities, International and Comparative Law Quarterly 58 (2009), S. 493-517. Open Google Scholar
- Tams, Christian J., Enforcing Obligations Erga Omnes in International Law, Cambridge 2005 (zitiert als: Tams). Open Google Scholar
- Tams, Christian J., The Use of Force against Terrorists, European Journal of International Law 20 (2009), S. 359-397. Open Google Scholar
- Terry, James P., Responding to Attacks on Computer Infrastructure, What Targets? What Rules of Engagement?, International Law Studies 76 (2002), S. 421-437. Open Google Scholar
- Theeuwen, Wieteke, Cyberspace Operations in International Armed Conflict: The Principles of Distinction and Proportionality in Relation to Military Objects, Humanitäres Völkerrecht-Informationsschriften 26 (2013), S. 188-194. Open Google Scholar
- Thümmel, Juliane, Computernetzwerkoperationen innerhalb internationaler bewaffneter Konflikte, Baden-Baden 2013 (zitiert als: Thümmel). Open Google Scholar
- Tikk, Eneken/Kaska, Kadri/Vihul, Liis, International Cyber Incidents: Legal Considerations, Tallinn 2010 (zitiert als: Tikk/Kaska/Vihul). Open Google Scholar
- Timmermann, Wiebke Kristin, Incitement, Instigation, Hate Speech and War Propaganda in International Law, online: http://www.geneva-academy.ch/docs/memoires/me moire_ ti mmermann.pdf, besucht am: 6.2.2016 (zitiert als: Timmermann). Open Google Scholar
- Todd, Graham H., Armed Attack in Cyberspace: Deterring Asymmetric Warfare with an Asymmetric Definition, Air Force Law Review 64 (2009), S. 65-102. Open Google Scholar
- Tomuschat, Christian, Human Rights. Between Idealism and Realism, 3. Aufl., Oxford 2014 (zitiert als: Tomuschat). Open Google Scholar
- Traeger, Ludwig, Der Kausalbegriff im Straf- und Zivilrecht, Marburg 1904 (zitiert als: Traeger). Open Google Scholar
- Tsagourias, Nicholas, Chapter 2: The Tallinn Manual on International Law Applicable to Cyber Warfare: A Commentary on Chapter II – The Use of Force, Yearbook of International Humanitarian Law 15 (2012), S. 9-43. Open Google Scholar
- Tsagourias, Nicholas, Cyber attacks, self-defence and the problem of attribution, Journal of Conflict and Security Law 17 (2012), S. 229-244. Open Google Scholar
- Tsagourias, Nicholas, The legal status of cyberspace, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 13-29 (zitiert als: Tsagourias, in: Tsagourias/Buchan). Open Google Scholar
- Turns, David, Cyber war and the Concept of ‘Attack’ in International Humanitarian Law, in: Saxon, Dan (Hrsg.), International Humanitarian Law and the Changing Technology of War, Den Haag 2013, S. 209-227 (zitiert als: Turns, in: Saxon). Open Google Scholar
- Turns, David, Military Manuals and the Customary Law of Armed Conflict, in: Hayashi, Nubuo (Hrsg.), National Military Manuals, 2. Aufl., Oslo 2010, S. 65-77. (Turns, in: Hayashi). Open Google Scholar
- Vité, Sylvain, Typology of Armed Conflicts in International Humanitarian Law: Legal Concepts and Actual Situations, International Review of the Red Cross 91 (2009), S. 69-94. Open Google Scholar
- Walton, Beatrice A., Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law, Yale Law Journal 216 (2017), S. 1460-1519. Open Google Scholar
- Watkin, Kenneth, Use of force during occupation: law enforcement and conduct of hostilities, International Review of the Red Cross 94 (2012), S. 267-315. Open Google Scholar
- Watts, Sean, Law-of-War Perfidy, Military Law Review 219 (2014), S. 106-175. Open Google Scholar
- Watts, Sean, Low-intensity Computer Attack and Self-Defense, International Law Studies 87 (2011), S. 59-87. Open Google Scholar
- Waxman, Matthew C., Cyber-Attacks and the Use of Force: back to the Future of Article 2 (4), Yale Journal of International Law 36 (2011), S. 421-460. Open Google Scholar
- Wedgwood, Ruth G., Proportionality; Cyberwar, and the Law of War, International Law Studies 76 (2002), S. 219-232. Open Google Scholar
- Werle, Gerhard/Jeßberger, Florian, Völkerstrafrecht, 4. Aufl., Tübingen 2016 (zitiert als: Werle/Jeßberger). Open Google Scholar
- Wilmshurst, Elizabeth, The Chatham House Principles of International Law on the Use of Force in Self-Defence, International and Comparative Law Quarterly 55 (2006), S. 963-972 (zitiert als: Wilmshurst, Chatham House Principles Self-Defence). Open Google Scholar
- Wilt (van der), Harmen, War Crimes and the Requirement of a Nexus with an Armed Conflict, Journal of International Criminal Justice 10 (2012), S. 1113-1128. Open Google Scholar
- Woltag, Johann-Christoph, Computer Network Operations Below the Level of Armed Conflict, European Society of International Law – Conference Paper Series 1 (2011), S. 1-18. Open Google Scholar
- Woltag, Johann-Christoph, Cyber Warfare – Military Cross-Border Computer Network Operations under International Law, Cambridge 2014 (zitiert als: Woltag). Open Google Scholar
- Woltag, Johann-Christoph, Cyber Warfare, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. II, S. 988-994 (zitiert als: Woltag, MPEPIL). Open Google Scholar
- Yntema, Hessel E., The Treaties with Germany and Compensation for War Damage, Columbia Law Review 24 (1924), S. 134-153. Open Google Scholar
- Yoo, Christopher, Cyber espionage or Cyber War?: International Law, Domestic law, and Self-Protective Measures (2015). Faculty Scholarship Paper 1540, URL: https:// www.la w.upenn.edu/live/news/5493-scholarship-news---may-2015#.Vlxj_On5xz8, besucht am: 5.8.2018 (zitiert als: Yoo). Open Google Scholar
- Ziolkowski, Katharina, General Principles of International Law as Applicable in Cyberspace, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 135-188 (zitiert als: Ziolkowski, General Principles). Open Google Scholar
- Ziolkowski, Katharina, Peacetime Cyber Espionage – New Tendencies in Public International Law, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 425-464 (zitiert als: Ziolkowski, Cyber Espionage). Open Google Scholar
- Ziolkowski, Katharina, Stuxnet-Legal Considerations, Humanitäres Völkerrecht-Informa-tionsschriften 25 (2012), S. 139-147. Open Google Scholar
- Zwanenburg, Marten, Challeging the Pictet Theory, International Review of the Red Cross 94 (2012), S. 30-36. Open Google Scholar





