, to see if you have full access to this publication.
Book Titles No access

Das Kampfführungsrecht im internationalen Cyberkrieg

Authors:
Publisher:
 10.12.2018

Keywords



Bibliographic data

Publication year
2018
Publication date
10.12.2018
ISBN-Print
978-3-8487-5103-7
ISBN-Online
978-3-8452-9305-9
Publisher
Nomos, Baden-Baden
Series
Kölner Schriften zum Friedenssicherungsrecht - Cologne Studies on International Peace and Security Law - Études colonaises sur le droit de la paix et de la sécurité internationale
Volume
10
Language
German
Pages
265
Product type
Book Titles

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis No access Pages 1 - 18
  2. Einleitung: Problemaufriss und Gang der Arbeit No access Pages 19 - 23
      1. Informationstechnologien und Kriegsführung No access
      2. Struktur und völkerrechtlicher Status des Cyberspace No access
      3. Cyberkriegsführung und Computernetzwerkoperationen No access
      4. Verschiedene Formen von Computernetzwerkoperationen No access
        1. Estland 2007 No access
        2. Georgien 2008 No access
        3. Stuxnet und das iranische Atomprogramm 2010 No access
        4. Spionage: Das Bundestag-Intranet 2015 No access
        5. Ukraine 2014-2016 No access
      5. Die Besonderheiten der Cyberkriegsführung No access
      1. Der Begriff und die Zielsetzung des Konfliktsvölkerrechts No access
        1. Das Verbot überflüssiger Verletzungen und unnötiger Leiden No access
        2. Der Grundsatz des gutgläubigen und ehrwürdigen Verhaltens No access
        3. Das Gebot der diskriminierenden Kriegsführung No access
        4. Der Verhältnismäßigkeitsgrundsatz No access
        1. Vertrags- und Gewohnheitsrecht im internationalen Konflikt No access
        2. Voraussetzungen völkergewohnheitsrechtlicher Geltung No access
      2. Der Menschenrechtsschutz und das Konfliktsvölkerrecht No access
    1. Generelle Anwendbarkeit des Konfliktsvölkerrechts No access
      1. Der Anwendungsbereich des Kampfführungsrechts No access
          1. Der Gewaltbegriff im Friedenssicherungs- und Konfliktsvölkerrecht No access
          2. Instrument-Based v. Consequence-Based Approach No access
          3. Typische Auswirkungen einer Gewaltanwendung No access
            1. Direktheit des Schadens No access
            2. Unmittelbarkeit No access
            3. Vorhersehbarkeit (Foreseeability und Adäquanztheorie) No access
            4. Normative Bewertung des Einzelfalls No access
            5. Kriterien im Rahmen des Unmittelbarkeitsansatzes No access
          4. Die Bedeutung der Intention des Angreifers No access
          5. Intensitätsschwelle No access
            1. Daten als Objekte No access
            2. Target-Based Approach No access
      2. Bank- und Finanzinfrastrukturen No access
      3. Militär/Staatsverwaltung No access
        1. Zwischenergebnis No access
          1. Die Identifizierungsproblematik im Cyberspace No access
            1. Die Kriterien der Staatenverantwortlichkeit No access
            2. Das Kriterium der Konfliktklassifizierung No access
            3. Die Vorzugswürdigkeit eines einheitlichen Zurechnungsmaßstabs No access
            4. Overall Control über Hackergruppen? No access
            5. Beweisstandard und Beweislast No access
          2. Zwischenergebnis No access
    2. Computernetzwerkoperationen neben konventioneller Kriegsführung No access
      1. Der völkerrechtliche Gewaltbegriff und der konfliktsvölkerrechtliche Angriffsbegriff No access
      2. Ein Angriff als Hürde zum Schutz? No access
      3. Die Ausnahme: Das Verbot menschlicher Schutzschilder No access
      4. Die Angriffsdefinition No access
      1. Militärische Objekte No access
      2. Beschränkung des Angriffs auf die militärisch genutzte Komponente eines Objekts? No access
        1. Medizinische Objekte No access
        2. Lebensnotwendige Objekte für die Zivilbevölkerung No access
        3. Anlagen und Einrichtungen, die gefährliche Kräfte enthalten No access
        4. Besonderer Schutzstatus für ausgewählte Infrastrukturen? No access
    1. Der Verhältnismäßigkeitsgrundsatz No access
          1. Exkurs: Militärische Notwendigkeit als ein allgemeiner Verhältnismäßigkeitsmaßstab? No access
          2. Die Pflicht der Verwendung des mildesten Mittels zur Minimierung von Kollateralschäden No access
        1. Die Pflicht zur Warnung No access
      1. Die Schutzpflichten des Angegriffenen – Pflicht zur Trennung ziviler und militärischer Infrastrukturen No access
      1. Generelle Grenzen No access
        1. Angriffe zum Zweck der Schreckensverbreitung No access
          1. Psychische Leiden und der Angriffsbegriff No access
          2. Androhungen eines Angriffs No access
    2. Zwischenergebnis No access
    1. Die Kennzeichnungspflicht im Allgemeinen No access
    2. Die Identifizierungsfunktion von IP-/E-Mail-Adressen und domains No access
      1. Missbrauch von anerkannten Schutzzeichen No access
      2. Verwendung des Emblems der VN und neutraler Kennzeichen No access
      3. Verwendung gegnerischer Kennzeichen No access
      1. Eingriffe in die gegenerische Kommunikation No access
      2. Vortäuschen einer zivilen Urheberschaft No access
    1. Ergebnisse der Arbeit No access
    2. Gesamtbetrachtung No access
  3. Literaturverzeichnis No access Pages 237 - 253
  4. Rechtsprechungsverzeichnis No access Pages 254 - 258
  5. Dokumentenverzeichnis No access Pages 259 - 265

Bibliography (308 entries)

  1. Akande, Dapo, Classification of Armed Conflicts: Relevant Legal Concepts, in: Wilmshurst, Elizabeth (Hrsg.), International Law and the Classification of Conflicts, Oxford 2012, S. 32-79 (zitiert als: Akande, in: Wilmshurst). Open Google Scholar
  2. Akande, Dapo, Clearing the Fog of War? The ICRC’s Interpretative Guidance on Direct Participation in Hostilities, International and Comparative Law Quarterly 59 (2010), S. 180-192. Open Google Scholar
  3. Ariav, Roee, Hardly the Tadić of Targeting: Missed opportunities in the ICTY’s Gotovina Judgments, Israel Law Review 48 (2015), S. 329-355. Open Google Scholar
  4. Arimatsu, Louise, A Treaty for Governing Cyber-weapons: potential Benefits and practical Limitations, in: Czosseck, C/Ottis, Ryan/Ziolkowski, Katharina (Hrsg.), 4th International Conference on Cyber Conflict, Tallinn 2012, S. 91-110 (zitiert als: Arimatsu, CyCon 2012). Open Google Scholar
  5. Arimatsu, Louise, Classifying cyber warfare, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015 (Arimatsu, in: Tsagourias/Buchan). Open Google Scholar
  6. Arkin, William M., Cyber Warfare and the Environment, Vermont Law Review 25 (2001), S. 779-791. Open Google Scholar
  7. Baker, Christopher D., Tolerance of International Espionage: A Functional Approach, American University International Law Review 19 (2004), S. 1091-1113. Open Google Scholar
  8. Bannelier-Christakis, Karine, Is the principle of distinction still relevant in cyberwarfare?, in: Tsagourias, Nicholas /Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 343-365 (zitiert als: Bannelier-Christakis, in: Tsagourias/Buchan). Open Google Scholar
  9. Barber, Rebecca J., The Proportionality Equation: Balancing Military Objectives with Civilian Lives in Armed Conflict in Afghanistan, Journal of Conflict and Security Law 15 (2010), S. 467-500. Open Google Scholar
  10. Barkham, Jason, Information Warfare and International Law on the Use of Force, New York University Journal of International Law and Politics 34 (2001). S. 57-114. Open Google Scholar
  11. Bartels, Rogier, Dealing with the Principle of Proportionality in Armed Conflict in Retrospect: The Application of the Principles in International Criminal Trials, Israel Law Review 46 (2013), S. 217-315. Open Google Scholar
  12. Baruch, Pnina Sharvit/Neuman, Noam, Warning Civilians Prior to Attack under International Law: Theory and Practice, International Law Studies 87 (2011), S. 359-412. Open Google Scholar
  13. Benatar, Marco, The Use of Cyber Force: Need for Legal Justification?, Goettingen Journal of International Law 1 (2009), S. 375-396. Open Google Scholar
  14. Bill, Brian J., The Rendulic ‚Rule’: Military Necessity, Commander’s Knowledge, and Methods of Warfare, Yearbook of International Humanitarian Law 12 (2009), S. 119-155. Open Google Scholar
  15. Blank, Laurie R., Defining the Battlefield in Contemporary Conflict and Counterterrorism: Understanding the Parameters of the Zone of Combat, Georgia Journal of International and Comparative Law 39 (2010), S. 1-38. Open Google Scholar
  16. Blank, Laurie R., International Law and Cyber Threats from Non-State Actors, International Law Studies 89 (2013), S. 406-437. Open Google Scholar
  17. Boothby, William, Cyber Deception and Autonomous Attack – Is There a Legal Problem?, in: Podins, Karlis/Stinissen, Jan/Maybaum, Markus (Hrsg.), 5th International Cyber Conference on Cyber Conflict, Tallinn 2013, S. 245-261 (zitiert als: Boothby, CyCon 2013). Open Google Scholar
  18. Boothby, William, Methods and Means of Cyber Warfare, International Law Studies 89 (2013), S. 387-405. Open Google Scholar
  19. Boothby, William, The Law of Targeting, Oxford 2012 (zitiert als: Boothby, Targeting). Open Google Scholar
  20. Boothby, William, Weapons and the Law of Armed Conflict, 2. Aufl., Oxford 2016 (zitiert als: Boothby, Weapons). Open Google Scholar
  21. Bothe Michael, Effective control during invasion: a practical view on the application threshold of the law of occupation, International Review of the Red Cross 94 (2012), S. 37-41. Open Google Scholar
  22. Bothe, Michael, Friedenssicherung und Kriegsrecht, in: Graf Vitzthum, Wolfgang (Hrsg.), Völkerrecht, 5. Aufl., Göttingen 2010, S. 639-740 (zitiert als: Bothe, in: Graf Vitzthum). Open Google Scholar
  23. Bothe, Michael/Partsch, Karl Josef/Solf, Waldemar A. (Hrsg.), New Rules for Victims of Armed Conflicts - Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949, Den Haag 1982, (zitiert als: Bothe/Partsch/Solf). Open Google Scholar
  24. Bothe, Michael/Partsch, Karl Josef/Solf, Waldemar A., Die Genfer Konferenz über humanitäres Völkerrecht: Verlauf und Ergebnisse, Zeitschrift für ausländisches und öffentliches Recht und Völkerrecht 38 (1978), S. 1-159. Open Google Scholar
  25. van Boven, Theo, Categories of Rights, in: Moeckli, Daniel/Shah, Sangeeta/Sivakumaran, Sandesh (Hrsg.), International Human Rights Law, 2. Aufl., Oxford 2014, S. 143-156 (zitiert als: van Boven, in: Moeckli/Shah/Sivakumaran). Open Google Scholar
  26. de Brabandere, Eric, Propaganda, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. VIII, S. 507-514 (zitiert als: de Brabandere, MPEPIL). Open Google Scholar
  27. Brownlie, Ian, International Law and the Use of Force by States, Oxford 1963, (zitiert als: Brownlie). Open Google Scholar
  28. Buchan, Russell, Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions, Journal of Conflict and Security Law 17 (2012), S. 211-227. Open Google Scholar
  29. Buchan, Russell, Cyber espionage and international law, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 168-189 (zitiert als: Buchan, in Tsagourias/Buchan). Open Google Scholar
  30. Buchan, Russell, Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm, Journal of Conflict and Security Law 21 (2016), S. 429-453. Open Google Scholar
  31. Carnahan, Burrus M., Lincoln, Lieber and the Laws of War: The Origins and Limits of the Principle of Military Necessity, American Journal of International Law 92 (1998), S. 213-231. Open Google Scholar
  32. Carswell, Andrew J., Classifying the conflict: a soldier’s dilemma, International Review of the Red Cross 91 (2009), S. 143-161. Open Google Scholar
  33. Cassese, Antonio, The Martens Clause: Half a Loaf or Simply Pie in the Sky?, European Journal of International Law 11 (2000), S. 187-216. Open Google Scholar
  34. Castellanos-Jankiewicz, León, Causation and International State Responsibility, Amsterdam Center of International Law Research Paper No 07 (2012), URL: http://www.s haresproject.nl/publication/causation-and-international-state-responsibility/, besucht am: 5.8. 2018. Open Google Scholar
  35. Cathcart, Blaise, Legal Dimensions of Special Forces and Information Operations, in: Gill, Terry/Fleck, Dieter (Hrsg.), The Handbook of the International Law of Military Operations, S. 395-414 (zitiert als: Cathcart, in: Gill/Fleck). Open Google Scholar
  36. Chainoglou, Kalliopi, Psychological Warfare, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. VIII, S. 559-565 (zitiert als: Chainoglou, MPEPIL). Open Google Scholar
  37. Clapham, Andrew, The Concept of International Armed Conflict, in: Clapham, Andrew/Gaeta, Paola/ Sassòli, Marco (Hrsg.), The 1949 Geneva Conventions – A Commentary, Oxford 2015, S. 3-26 (zitiert als: Clapham, in: Clapham/Gaeta/Sassòli). Open Google Scholar
  38. Clark, David D./Landau, Susan, Untangling Attribution, in: National Research Council, Proceeding of a Workshop on Deterring Cyberattacks - Informing Strategies and Developing Options for U.S. Policy, Washington 2010, S. 25-40 (zitiert als: Clark/Landau, in: National Research Council). Open Google Scholar
  39. Condorelli, Luigi/Kreß, Claus, The Rules of Attribution: General Considerations, in: Crawford, James/Pellet, Alain/Olleson, Simon (Hrsg.), The Law of International Responsibility. Oxford Commentaries on International Law, Oxford 2010, S. 219-236 (zitiert als: Condorelli/Kreß, in: Crawford/Pellet/Olleson). Open Google Scholar
  40. Condron, Sean M., Getting It Right: Protecting American Critical Infrastructure in Cyberspace, Harvard Journal of Law and Technology 20 (2007), S. 403-422. Open Google Scholar
  41. Corn, Geoffrey S./Blank, Laurie R./Jenks, Chris/Jensen, Eric Talbot, Belligerent Targeting and the Invalidity of a Least Harmful Means Test, International Law Studies 89 (2013), S. 536-626. Open Google Scholar
  42. Cottier, Michael, Article 8 – War Crimes, Introduction/General Remarks, in: Triffterer, Otto/Ambos, Kai (Hrsg.), Commentary on the Rome Statute of the International Criminal Court, 3. Aufl., München 2016, S. 283-299 (zitiert als: Cottier, in: Triffterer/Ambos). Open Google Scholar
  43. Crawford, Emily/Pert, Alison, International Humanitarian Law, Cambridge 2015 (zitiert als: Crawford/Pert). Open Google Scholar
  44. Crawford, James, State Responsibility: The General Part, Cambridge 2013 (zitiert als: Crawford). Open Google Scholar
  45. Czosseck, Christian, State Actors and their Proxies in Cyberspace, in: Ziolkowski, Katherina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 1-24 (zitiert als: Czosseck, in: Ziolkowski). Open Google Scholar
  46. Deeks, Ashley, The Geography of Cyber Conflict: through a Glass Darkly, International Law Studies 89 (2013), S. 1-20. Open Google Scholar
  47. Del Mar, Katherine, The Requirement of ‘Belonging’ under International Humanitarian Law, European Journal of International Law 21 (2010), S. 105-124. Open Google Scholar
  48. Dev, Priyanka R., “Use of Force” and Armed Attack” Thresholds in cyber Conflict: the Looming Gaps and Growing Need for Formal U.N. Response, Texas International Law Journal 50 (2015), S. 381-401. Open Google Scholar
  49. Dinstein, Yoram, Collateral Damage and the Principle of Proportionality, in: Wippman, David/Evangelista, Matthew (Hrsg.), New Wars, New Laws?, Ardsley 2004, S. 211-224 (zitiert als: Dinstein, in: Wippman/Evangelista). Open Google Scholar
  50. Dinstein, Yoram, Computer Network Attacks and Self-Defense, International Law Studies 76 (2002), S. 99-119. Open Google Scholar
  51. Dinstein, Yoram, Discussion on “Dual-Purpose” Targets, Legal and Ethical lessons of NATO’s Kosovo Campaign, International Law Studies 78 (2002), S. 218f. Open Google Scholar
  52. Dinstein, Yoram, The Conduct of Hostilities under the Law of International Armed Conflict, 3. Aufl., Cambridge 2016 (zitiert als: Dinstein, Conduct of Hostilities). Open Google Scholar
  53. Dinstein, Yoram, The erga omnes Applicability of Human Rights, Archiv des Völkerrechts 30 (1992), S. 16-21. Open Google Scholar
  54. Dinstein, Yoram, The Principle of Distinction and Cyber War in International Armed Conflicts, Journal of Conflict and Security Law 17 (2012), S. 261-277. Open Google Scholar
  55. Dinstein, Yoram, War, Aggression and Self-Defence, 6. Aufl., New York 2017 (zitiert als: Dinstein, War). Open Google Scholar
  56. Dittmar, Falko, Angriffe auf Computernetzwerke. Ius ad bellum und ius in bello, Berlin 2005 (zitiert als: Dittmar). Open Google Scholar
  57. Döge, Jenny, Cyber Warfare, Archiv des Völkerrechts 48 (2010), S. 486-501. Open Google Scholar
  58. Dörmann, Knut, Elements of War Crimes under the Rome Statute of the International Criminal Court, Cambridge 2003 (zitiert als: Dörmann). Open Google Scholar
  59. Dörmann, Knut, The Applicability of the Additional Protocol to Computer Network Attack; An ICRC Viewpoint, in: Byström, Karin (Hrsg.), Proceedings of the Conference, International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law, 17.-19. November 2004, Stockholm, Sweden, Stockholm 2005, S. 139-153 (zitiert als: Dörmann, in: International Expert Conference Stockholm 2004). Open Google Scholar
  60. Doswald-Beck, Louise (Hrsg.), San Remo Manual on International Law Applicable to Armed Conflicts at Sea, Cambridge 1994 (zitiert als: San Remo Manual). Open Google Scholar
  61. Doswald-Beck, Louise, Some Thoughts on Computer Network Attack and the International Law of Armed Conflict, International Law Studies 76 (2002), S. 163-185. Open Google Scholar
  62. Dröge, Cordula, Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians, International Review of the Red Cross 94 (2012), S. 533-578. Open Google Scholar
  63. Dröge, Cordula, The Interplay between International Humanitarian Law and International Human Rights Law in Situations of Armed Conflict, Israel Law Review 40 (2007) S. 310-355. Open Google Scholar
  64. Dunbar, N. C. H., Military Necessity in War Crimes Trials, British Yearbook of International Law 29 (1952), S. 442-452. Open Google Scholar
  65. Dupuy, Pierre-Marie, Evolutionary Interpretations of Treaties: Between Memory and Prophecy, in: Cannizzaro, Enzo (Hrsg.), The Law of Treaties Beyond the Vienna Convention, Oxford 2011, S. 123-137 (zitiert als: Dupuy, in: Cannizzaro). Open Google Scholar
  66. Dupuy, Pierre-Marie/Viñuales, Jorge E., International Environmental Law, Cambridge 2015 (zitiert als: Dupuy/Viñuales). Open Google Scholar
  67. Eagleton, Clyde, The Responsibility of States in International Law, New York 1928 (zitiert als: Eagleton). Open Google Scholar
  68. Estreicher, Samuel, Privileging Asymmetric Warfare (Part II)?: The “Proportionality” Principle under International Humanitarian Law, Chicago Journal of International Law 12 (2011), S. 143-157. Open Google Scholar
  69. Feil, Jessica, Cyberwar and Unmanned Aerial Vehicles, Case Western Reserve Journal of International Law 45 (2012), S. 513-544. Open Google Scholar
  70. Fenrick, William J., Attacking the Enemy Civilians as a Punishable Offense, Duke Journal of Comparative & International Law 7 (1997), S. 539-569. Open Google Scholar
  71. Fenrick, William J., Riding the Rhino: Attempting to Develop Usable Legal Standards for Combat Activities, Boston College International and Comparative Law Review 30 (2007), S. 111-137. Open Google Scholar
  72. Ferraro, Tristan, IKRK, Occupation and other Forms of Administration of Foreign Territory, Report Expert Meeting, Geneva 2012, URL: https://www.icrc.org/eng/assets/files/ publications/icrc-002-4094.pdf, besucht am: 5.8.2018 (zitiert als: IKRK, Report Occupation). Open Google Scholar
  73. Fleck, Dieter, Ruses of War and Prohibition of Perfidy, Revue de droit penal militaire et de droit de la guerre 13 (1974), S. 269-314. Open Google Scholar
  74. Fleck, Dieter, Searching for International Rules Applicable to Cyber Warfare – A Critical First Assessment of the New Tallinn Manual, Journal of Conflict and Security Law 18 (2013), S. 331-351. Open Google Scholar
  75. Franzese, Partick W., Sovereignty in Cyberspace: Can It Exist?, Air Force Law Review 64 (2009), S. 1-42. Open Google Scholar
  76. Gardam, Judith, Necessity, Proportionality and the Use of Force by States, Cambridge 2004 (zitiert als: Gardam). Open Google Scholar
  77. Gasser, Hans-Peter/Melzer, Nils, Humanitäres Völkerrecht, 2. Aufl., Genf 2012 (zitiert als: Gasser/Melzer). Open Google Scholar
  78. Gaycken, Sandro, Cyberwar – Das Internet als Kriegsschauplatz, München 2011 (zitiert als. Gaycken). Open Google Scholar
  79. Geers, Kenneth (Hrsg.), Cyber War in Perspective: Russian Aggression Against Ukraine, Tallinn 2015 (zitiert als: Geers). Open Google Scholar
  80. Geiß, Robin, Cyber-Warfare: Implications for Non-international Armed Conflicts, International Law Studies 89 (2013), S. 627-645. Open Google Scholar
  81. Geiß, Robin, The Obligation to Respect and to Ensure Respect for the Conventions, in: Clapham, Andrew/Gaeta, Paola/ Sassòli, Marco (Hrsg.), The 1949 Geneva Conventions – A Commentary, Oxford 2015, S. 111-134 (zitiert als: Geiß, in: Clapham/Gaeta/ Sassòli). Open Google Scholar
  82. Geiß, Robin, War and Law in Cyberspace. The Conduct of Hostilities in and Via Cyberspace, American Society for International Law Proceedings 2010, S. 371-374 (zitiert als: Geiß, ASIL Proceedings 2010). Open Google Scholar
  83. Geiß, Robin/Lahmann, Henning, Cyber Warfare: Applying the Principle of Distinction in an Interconnected Space, Israel Law Review 45 (2012), S. 381­399. Open Google Scholar
  84. Gervais, Michael, Cyber Attacks and the Laws of War, Journal of Law & Cyber Warfare 1 (2012), S. 8-98. Open Google Scholar
  85. Gill Terry D., International humanitarian law applied to cyber-warfare: precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 366-379 (zitiert als: Gill, in: Tsagourias/Buchan). Open Google Scholar
  86. Gill, Terry D., Chivalry: A Principle of the Law of Armed Conflict?, in: Matthee, Mariëlle/Toebes, Brigit/Brus, Marcel (Hrsg.), Armed Conflict and International Law: In Search of the Human Face, Den Haag 2013, S. 33-51 (zitiert als: Gill, in: Matthee/Toebes/Brus). Open Google Scholar
  87. Gill, Terry D., Non-intervention in the Cyber Context, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for State Activities in Cyber Space, Tallinn 2013, S. 217-238 (zitiert als: Gill, in: Ziolkowski). Open Google Scholar
  88. Gill, Terry D./Ducheine, Paul A.L., Anticipatory Self-Defense in the Cyber Context, International Law Studies 89 (2013), S. 438-471. Open Google Scholar
  89. Gimmerthal, Michael, Kriegslist und Perfidieverbot im Zusatzprotokoll vom 10. Juni 1977 zu den vier Genfer Rotkreuz-Abkommen von 1949 (Zusatzprotokoll I), Bochum 1990 (zitiert als: Gimmerthal). Open Google Scholar
  90. Gisel, Laurent, Can the incidental killing of military doctors never be excessive?, International Review of the Red Cross 95 (2013), S. 215-230. Open Google Scholar
  91. Glennon, Michael J., The Road ahead: Gaps, Leaks and Drips, International Law Studies 89 (2013), S. 362-386. Open Google Scholar
  92. Goddard, David S., Applying the European Convention on Human Rights to the Use of Force: Al-Saadoon, International Law Studies 91 (2015), S. 402-424. Open Google Scholar
  93. Goldman, Robert K., Extraterritorial Application of human rights to life and personal liberty, including habeas corpus, during situations of armed conflict, in: Kolb, Robert/Gaggioli, Gloria (Hrsg.) Research handbook on human rights and humanitarian law, Cheltenham 2013, S. 104-124 (zitiert als: Goldman, in: Kolb/Gaggioli). Open Google Scholar
  94. Goldsmith, Jack, How Cyber Changes the Laws of War, European Journal of International Law 24 (2013), S. 129-138. Open Google Scholar
  95. Graham, David E., Cyber Threats and the Law of War, Journal of National Security Law and Policy 4 (2010), S. 87-102. Open Google Scholar
  96. Gray, Christine, International Law and the Use of Force, Cambridge 2008 (zitiert als: Gray). Open Google Scholar
  97. Gray, Christine, Targeted Killings: Recent US Attempts to Create a Legal Framework, University of Cambridge Law Faculty Legal Studies Research Paper Series 52 (2013), URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2330257, besucht am: 4.8. 2018. Open Google Scholar
  98. Green, James A., The regulation of cyber warfare under the jus ad bellum, in: Green, James A. (Hrsg.), Cyber Warfare: A multidisciplinary analysis, London 2015, S. 96-124 (zitiert als: Green, in: Green). Open Google Scholar
  99. Green, Leslie C., The Contemporary Law of Armed Conflict, 3. Aufl., Manchester 2008 (zitiert als: Green). Open Google Scholar
  100. Greenberg, Lawrence T./Goodman, Seymour E./Soo Hoo, Kevin J., Information Warfare and International Law, National Defence University Press 1998 (zitiert als: Greenberg/Goodman/Soo Hoo). Open Google Scholar
  101. Greenwood, Christopher, Historical Developments and Legal Basis, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 2. Aufl., Oxford 2008, S. 1-44 (zitiert als: Greenwood, in: Fleck). Open Google Scholar
  102. Greenwood, Christopher, Scope of Application of Humanitarian Law, in: Fleck, Dieter, The Handbook of International Humanitarian Law, 2. Aufl., Oxford 2008, S. 45-78 (zitiert als: Greenwood, in: Fleck). Open Google Scholar
  103. Greenwood, Christopher, The Law of Weaponry at the Start of the New Millennium, in: Greenwood, Christopher, Essays on War in International Law, London 2006, S. 223-274 (zitiert als: Greenwood, in: Greenwood). Open Google Scholar
  104. Griebel, Jörn/Plücken, Milan, New Developments Regarding the Rules of Attribution? The International court of Justice’s Decision in Bosnia v. Serbia, Leiden Journal of International Law 21 (2008), S. 601-622. Open Google Scholar
  105. Handler, Stephanie Gosnell, The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare, Stanford Journal of International Law 48 (2012), S. 209-237. Open Google Scholar
  106. Harrison Dinniss, Heather, Cyber Warfare and the Law of War, Cambridge 2012 (zitiert als: Harrison Dinniss). Open Google Scholar
  107. Hart, Herbert L.A./Honoré, Anthony, Causation in the law, 2. Aufl. Oxford 1985, Nachdruck 2002 (zitiert als: Hart/Honoré). Open Google Scholar
  108. Haslam, Emily, Information Warfare: Technological Changes and International Law, Journal of Conflict and Security Law 5 (2000), S. 157-175. Open Google Scholar
  109. Hathaway, Oona A./Crootof, Rebecca/ Levitz, Philip/ Nix, Haley/Nowlan, Aileen/Spiegel, Julia, The Law of Cyber-Attack, California Law Review 100 (2012), S. 817-886. Open Google Scholar
  110. Hayashi, Nobuo, Requirements of Military Necessity in International Humanitarian Law and International Criminal Law, Boston University International Law Journal 28 (2010), S. 39-140. Open Google Scholar
  111. Heintschel von Heinegg, The Law of Armed Conflict at Sea, in: Dieter Fleck (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 463-547 (zitiert als: Heintschel von Heinegg, in: Fleck). Open Google Scholar
  112. Heintschel von Heinegg, Wolff, Auslegung völkerrechtlicher Verträge, in: Ipsen, Knut (Hrsg.), Völkerrecht, 6. Aufl., München 2014, S. 407-415 (zitiert als: Heintschel von Heinegg, in: Ipsen). Open Google Scholar
  113. Heintschel von Heinegg, Wolff, Informationskrieg und Völkerrecht, in: Epping, Volker/Fischer, Horst/Heintschel von Heinegg, Wolff (Hrsg.), Brücken bauen und begehen, München 2000, S. 129-155. (zitiert als: Heintschel von Heinegg, in: Epping/Fischer/ Heintschel von Heinegg). Open Google Scholar
  114. Heintschel von Heinegg, Wolff, Naval Blockade, International Law Studies 75 (2000), S. 203-230. Open Google Scholar
  115. Heintschel von Heinegg, Wolff, Territorial Sovereignty and Neutrality in Cyberspace, International Law Studies 89 (2013), S. 123-156. Open Google Scholar
  116. Heintze, Hans-Joachim, On the relationship between human rights law protection and international humanitarian law, International Review of the Red Cross 86 (2004), S. 789-814. Open Google Scholar
  117. Henckaerts, Jean-Marie/ Doswald-Beck, Louise, IKRK, Customary International Humanitarian Law, Cambridge 2005 (zitiert als: IKRK Customary Law Study). Open Google Scholar
  118. Henderson, Ian, The Contemporary Law of Targeting, Leiden 2009 (zitiert als: Henderson). Open Google Scholar
  119. Henderson, Ian, The use of cyber force: Is the jus ad bellum ready?, Questions of International Law, Zoom-in 27 (2016), S. 3-11. Open Google Scholar
  120. Hollis, Duncan B., Why States Need an International Law for Information Operations, Lewis & Clark Law Review 11 (2007), S. 1023-1062. Open Google Scholar
  121. Honoré, Antony, Causation in the law, in: Zalta, Edward N. (Hrsg.) Stanford Encyclopedia of Philosophy, Stanford 2010, URL: http://plato.stanford.edu/entries/causation-law/, besucht am: 4.8.2018 (zitiert als: Honoré, Stan. Ency. Philo.). Open Google Scholar
  122. Huntley, Tood C, Controlling the Use of Force in Cyber Space: The Application of the Law of Armed Conflict During a Time of Fundamental Change in the Nature of Warfare, Naval Law Review 60 (2010), S. 1-40. Open Google Scholar
  123. Ipsen, Knut, Bewaffneter Konflikt und Neutralität, in: Ipsen, Knut (Hrsg.), Völkerrecht, 6. Aufl., München 2014, S. 1175-1258 (zitiert als: Ipsen, in: Ipsen). Open Google Scholar
  124. Ipsen, Knut, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 79-113 (zitiert als: Ipsen, in: Fleck). Open Google Scholar
  125. Jenkins, Ryan, Is Stuxnet Physical? Does It Matter?, 12 Journal of Military Ethics 1 (2013), S. 68-79. Open Google Scholar
  126. Jensen, Eric Talbot, Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, Stanford Journal of International Law 38 (2002), S. 207-240. Open Google Scholar
  127. Jensen, Eric Talbot, Cyber Attacks: Proportionality and Precautions in Attack, International Law Studies 89 (2013), S. 198-217. Open Google Scholar
  128. Jensen, Eric Talbot, Cyber Warfare and Precautions Against the Effects of Attacks, Texas Law Review 88 (2010), S. 1533-1569. Open Google Scholar
  129. Jensen, Eric Talbot, Unexpected Consequences from Knock-on Effects: A Different Standard for Computer Network Operations?, American University Law Review 18 (2003), S. 1145-1188. Open Google Scholar
  130. Jinks, Derek, The Applicability of the Geneva Conventions to the “Global War on Terrorism”, Virginia Law Journal of International Law 46 (2005), S. 165-195. Open Google Scholar
  131. Joseph, Sarah/Fletcher, Adam, Scope of Application, in: Moeckli, Daniel/Shah, Sangeeta/ Sivakumaran, Sandesh (Hrsg.), International Human Rights Law, 2. Aufl., Oxford 2014, S. 117-139 (zitiert als: Joseph/Fletcher, in: Moeckli/Shah/Sivakumaran). Open Google Scholar
  132. Joyner, Christopher/Lotrionte, Catherine, Information Warfare as International Coercion: Elements of a Legal Framework, European Journal of International Law 12 (2001), S. 825-865. Open Google Scholar
  133. Jupillat, Nicolas, From the Cuchoo’s Egg to Global Surveillance: Cyber Espionage that Becomes Prohibited Intervention, North Carolina Journal of International Law 42 (2017), S. 933-988. Open Google Scholar
  134. Kälin, Walter/Künzli, Jörg, Universeller Menschnrechtsschutz – Der Schutz der Individuums auf globaler und regionaler Ebene, 3. Aufl., Basel 2013 (zitiert als: Kälin/Künzli). Open Google Scholar
  135. Kalshoven, Frits/Zegveld, Liesbeth, Constraints on the Waging of War. An Introduction to International Humanitarian Law, 4. Aufl., Cambridge 2011 (zitiert als: Kalshoven/Zeg-veld). Open Google Scholar
  136. Kanuck, Sean P., Information Warfare: New Challenges for Public International Law, Harvard International Law Journal 37 (1996), S. 272-292. Open Google Scholar
  137. Kanuck, Sean P., Sovereign Discourse on Cyber Conflict under International Law, Texas Law Review 88 (2010), S. 1571-1597. Open Google Scholar
  138. Kapaun, Nina, Völkerrechtliche Bewertung gezielter Tötungen nicht-staatlicher Akteure, Köln 2014 (zitiert als: Kapaun). Open Google Scholar
  139. Kearney, Michael G., Propaganda in the jurisprudence of the International Criminal Tribunal for the former Yugoslavia, in: Dojčinović, Predrag (Hrsg.), Propaganda, War Crime Trials and International Law. From the Speaker’s Corner to War Crimes, New York 2012, S. 231-253 (zitiert als: Kearney, in: Dojčinović). Open Google Scholar
  140. Keller, Patrick, „Cyberkrieg“ – Eine sicherheitspolitische Aufgabe ersten Ranges, Politische Meinung 59 (2014), S. 74-78. Open Google Scholar
  141. Kelsey, Jeffrey T. G., Hacking into International Humanitarian Law: The Principle of Distinction and Neutrality in the Age of Cyber Warfare, Michigan Law Review 106 (2008), S. 1427-1452. Open Google Scholar
  142. Kerschischnig, Georg, Cyberthreats and international law, Den Haag 2012 (zitiert als: Kerschischnig). Open Google Scholar
  143. Kilovaty, Ido, Rethinking the Prohibition on the Use of Force in the Lights of Economic Cyber Warfare: Towards a Broader Scope of Article 2 (4) of the UN Charter, Journal of Law and Cyber Warfare 4 (2015), S. 210-244. Open Google Scholar
  144. Kirchner, Stefan, Distributed Denial-of Service Attacks Under Public International Law: State Responsibility in Cyberwar, IUP Journal of Cyber Law 3 (2009), 10-23. Open Google Scholar
  145. Kleffner, Jann K., Scope of Application of International Humanitarian Law, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 43-78 (zitiert als: Kleffner, in: Fleck). Open Google Scholar
  146. Kleinwächter, Wolfgang, Wer regiert das Internet? Internet Governance auf dem Prüfstand, Zeitschrift für die Verneinten Nationen und ihre Sonderorganisationen 2 (2016), S. 67-72. Open Google Scholar
  147. Knake, Robert, Untangling Attribution: Moving to Accountability in Cyberspace (2010), URL: http://science.house.gov/sites/republicans.science.house.gov/files/documents/heari ngs/071510_Knake.pdf, besucht am: 30.11.2012 (zitiert als: Knake). Open Google Scholar
  148. Kohl, Uta, Jurisdiction in cyberspace, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 30-54 (zitiert als: Kohl, in: Tsagourias/Buchan). Open Google Scholar
  149. Kolb, Robert, Advanced Introduction to International Humanitarian Law, Cheltenham 2014 (zitiert als: Kolb). Open Google Scholar
  150. Kreß Claus, The State Conduct Element, in: Kreß, Claus/Barriga, Stefan (Hrsg.) The Crime of Aggression: A Commentary, Bd. 1, Cambridge 2016, S. 412-564 (zitiert als: Kreß, in: Kreß/Barriga). Open Google Scholar
  151. Kreß, Claus, The 1999 Crisis in East Timor and the Threshold of the Law on War Crimes, Criminal Law Forum 13 (2002), S. 409-470. Open Google Scholar
  152. Kreß, Claus, War Crimes Committed in Non-International Armed Conflict and the Emerging System of international Criminal Justice, Israel Yearbook on Human Rights 30 (2000), S. 103-177. Open Google Scholar
  153. Kretzmer, David, Targeted Killing of Suspected Terrorists: Extra-Judicial Executions of Legitimate Means of Defence, European Journal of International Law 16 (2005), S. 171-212. Open Google Scholar
  154. Krieger, Heike, Krieg gegen anonymous, Völkerrechtliche Regelungsmöglichkeiten bei unsicherer Zurechnung im Cyberwar, Archiv des Völkerrechts 50 (2012), S. 1-20. Open Google Scholar
  155. Lange, Hermann/Schiemann, Gottfried, Schadensersatz, 3. Aufl., Tübingen 2003 (zitiert als: Lange/Schiemann). Open Google Scholar
  156. Lawson, F.H./Markensinis B.S., Tortious Liability for unintentional harm in the Common law and Civil law, Cambridge 1982 (zitiert als: Lawson/Markensinis). Open Google Scholar
  157. Lewis, James Andrew, ‘Compelling Opponents to Our Will’: The Role of Cyber warfare in Ukraine, in: Geers, Kenneth (Hrsg.), Cyber War in Perspective: Russian Aggression Against Ukraine, Tallinn 2015, S. 39-47 (zitiert als: Lewis, in: Geers). Open Google Scholar
  158. Li, Sheng, When Does Internet Denial Trigger the Right of Armed Self-defense?, Yale Journal of International Law 38 (2013), S. 179-216. Open Google Scholar
  159. Libicki, Martin C., Cyberspace is not a Warfighting Domain, I/S: A Journal of Law and Policy for the Information Society 8 (2012), S. 321-336. Open Google Scholar
  160. Liivoja, Rain/McCormack, Tim, Chapter 3: Law in the Virtual Battlespace: The Tallinn Manual and the Jus in Bello, Yearbook of International Humanitarian Law 15 (2012), S. 45-58. Open Google Scholar
  161. Linaki, Evangelia, Cyber Warfare and International Humanitarian Law: a Matter of Applicability, Humanitäres Völkerrecht-Informationsschriften 27 (2014), S. 169-175. Open Google Scholar
  162. Lubell, Noam, Challenges in applying human rights to armed conflict, International Review of the Red Cross 87 (2005), S. 737-754. Open Google Scholar
  163. Lubell, Noam, Extraterritorial Use of Force Against Non-State Actors, Oxford, 2010 (zitiert als: Lubell). Open Google Scholar
  164. Lubell, Noam, Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?, International Law Studies 89 (2013), S. 696-743. Open Google Scholar
  165. de Luca, Christopher D., The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors, Pace International Law Review Online Companion 3 (2013), S. 278-315. Open Google Scholar
  166. Lueder, Karl, Krieg und Kriegsrecht im Allgemeinen, in: von Holtzendorff, Franz (Hrsg.), Handbuch des Völkerrechts, Bd. 4, Die Staatsstreitigkeiten und ihre Entscheidung, Hamburg 1889, S. 169-367 (zitiert als: Lueder, in: von Holtzendorff). Open Google Scholar
  167. Lynn, William F., Defending a new Domain: The Pentagon’s Cyberstrategy, Foreign Affairs 89 (2010), S. 97-108. Open Google Scholar
  168. Mačak, Kubo, Decoding Articles 8 of the International Law Commission’s Article on State Responsibility: Attribution of Cyber Operations by Non-State Actors, Journal of Conflict and Security Law 21 (2016), S. 405-428. Open Google Scholar
  169. Mačak, Kubo, Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Law, Israel Law Review 48 (2015), S. 55-80. Open Google Scholar
  170. Maslen, Stuart Casey, Non-kinetic-energy weapons termed ‚non-lethal’ URL: http://www. geneva-academy.ch/docs/projets/Non-Kinetic-EnergyOctober2010.pdf, besucht am: 27. 3.2013 (zitiert als: Maslen). Open Google Scholar
  171. McDonald, Avril, Declarations of War and the Belligerent Parties: International Law Governing Hostilities between States and Transnational Terrorist Networks, Netherlands International Law Review 54 (2007), S. 279-314. Open Google Scholar
  172. McGavarn, Wolfgang, Intended Consequences: Regulating Cyber Attacks, Tulane Journal of Technology and Intellectual Property 12 (2009), S. 259-275. Open Google Scholar
  173. Mégret, Frédéric, Nature of Obligations, in: Moeckli/Shah/Sivakumaran (Hrsg.), International Human Rights Law, 2. Aufl., Oxford 2014, S. 96-118 (Mégret, in: Moeckli/Shah/Sivakumaran). Open Google Scholar
  174. Melzer, Nils, Cyber operations and jus in bello, United Nations Institute for Disarmament Research, disarmament forum 4 (2011), URL: http://www.unidir.org/files/publications/ pdfs/confronting-cyberconflict-en-317.pdf, besucht am: 4.8.2018 (zitiert als: Melzer, Cyber operations). Open Google Scholar
  175. Melzer, Nils, Cyberwarfare and International Law, United Nations Institute for Disarmament Research, Ideas for Peace and Security-Resources 2011, URL: http://unidir.org/ files/publications/pdfs/cyberwarfare-and-international-law-382.pdf, besucht am: 4.8. 2018 (zitiert als: Melzer, Cyberwarfare). Open Google Scholar
  176. Melzer, Nils, Targeted Killing in International Law, Oxford 2008 (zitiert als: Melzer). Open Google Scholar
  177. Meron, Theodor, Classification of Armed Conflict in the Former Yugoslavia: Nicaragua’s Fallout, American Journal of International Law 92 (1998), S. 236-242. Open Google Scholar
  178. Meron, Theodor, Human Rights and Humanitarian Norms as Customary Law, Oxford 1989, Nachdruck 2011 (zitierte: Meron). Open Google Scholar
  179. Meron, Theodor, Humanization of International Law, American Journal of International Law 94 (2000), S. 239-278. Open Google Scholar
  180. Meron, Theodor, The Martens Clause, Principle of Humanity, and Dictates of Public Conscience, American Journal of International Law 94 (2000), S. 78-89. Open Google Scholar
  181. Meyer, Richard V., The Privilege of Belligerency and Formal Declarations of War, in: Finkelstein, Claire/Ohlin, Jens David/Altman, Andrew (Hrsg), Targeted Killings, Oxford 2012, S. 183-219 (zitiert als: Meyer, in: Finkelstein/Ohlin/Altman). Open Google Scholar
  182. Meyrowitz, Henri, Les armes psychochimiques et le droit international, Annuaire Français de Droit International 10 (1964), S. 81-126. Open Google Scholar
  183. Meyrowitz, Henri, The Principle of Superfluous Injury or Unnecessary Suffering, International Review of the Red Cross 34 (1994), S. 98-122. Open Google Scholar
  184. Milanovic, Marko, Extraterritorial Application of Human Rights Treaties, Oxford 2013 (zitiert als: Milanovic). Open Google Scholar
  185. Milanovic, Marko/Hadzi-Vidanovic, Vidan, A Taxonomy of Armed Conflict, in: White, Nigel D./Henderson, Christian (Hrsg.), Research handbook on international conflict and security law, Cheltenham 2013, S. 256-314 (zitiert als: Milanovic/ Hadzi-Vidanovic, in: White/Henderson). Open Google Scholar
  186. Miyazaki, Shigeki, The Martens Clause and International Humanitarian Law, in: Swinarski, Christophe (Hrsg.), Studies and Essays on International Humanitarian Law and the Red Cross Principles, Genf 1984, S. 432-444 (zitiert als: Miyazaki, in: Swinarski). Open Google Scholar
  187. Moir, Lindsay, The Law of Internal Armed Conflict, Cambridge 2002 (zitiert als: Moir). Open Google Scholar
  188. Newton, Michael A., Proportionality and Precaution in Cyber Attacks, in: Saxon, Dan (Hrsg.), International Humanitarian Law and the Changing Technology of War, Den Haag 2013), S. 229-249 (zitiert als: Newton, in: Saxon). Open Google Scholar
  189. Nguyen, Reese, Navigating Jus Ad Bellum in the Age of Cyber Warfare, California Law Review 101 (2013), S. 1079-1130. Open Google Scholar
  190. O’Brien, William V., The Jus in Bello in Revolutionary War and Counterinsurgency, Virgina Journal of International Law 16 (1978), S. 193-242. Open Google Scholar
  191. O’Connell, Mary Ellen, Historical Development and Legal Basis, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 1-42 (zitiert als: O’Connell, in: Fleck). Open Google Scholar
  192. O’Connell, Mary Ellen, When is War Not a War? The Myth of the Global War on Terror, International Law Students Association Journal of International and Comparative Law 12 (2006), S. 535-539. Open Google Scholar
  193. Oellers-Frahm, Karin, Comment: The erga omnes Applicability of Human Rights, Archiv des Völkerrechts 30 (1992), S. 28-37. Open Google Scholar
  194. Oeter, Stefan, Comment: Is the Principle of Distinction Outdated?, in: Heintschel von Heinegg, Wolff/Epping, Volker (Hrsg.) International Humanitarian Law Facing New Challenges – symposium in Honour of Knut Ipsen, Berlin 2007 (zitiert als: Oeter, in: Heintschel von Heinegg/Epping). Open Google Scholar
  195. Oeter, Stefan, Methods and Means of Combat, in: Fleck, Dieter (Hrsg.), The Handbook of International Humanitarian Law, 3. Aufl., Oxford 2013, S. 115-230 (zitiert als: Oeter, in: Fleck). Open Google Scholar
  196. Otto, Roland, Targeted Killings and International Law, Heidelberg 2012 (zitiert als: Otto). Open Google Scholar
  197. Parameswaran, Katherina, Besatzungsrecht im Wandel – Aktuelle Herausforderungen des Rechts der militärischen Besetzung, Baden-Baden 2008 (zitiert als: Parameswaran). Open Google Scholar
  198. Parks, W. Hays, Air War and the Law of War, Air Force Law Review 32 (1990), S. 1-226. Open Google Scholar
  199. Payne, Thomas, Teaching Old Law New tricks: Applying and Adapting State Responsibility to Cyber Operations, Lewis & Clark Law Review 20 (2016), S. 683-715. Open Google Scholar
  200. Pictet, Jean S. (Hrsg.), IKRK, The Geneva Conventions of 12 August 1949: Commentary Bd. I (1952); Bd. II (1960); Bd. III (1960); Bd. IV (1958) (zitiert als: IKRK Kommentar GK Bd.). Open Google Scholar
  201. Pictet, Jean, Development and Principles of International Humanitarian Law, Dordrecht 1985 (zitiert als: Pictet). Open Google Scholar
  202. Pirker, Benedikt, Territorial Sovereignty and Integrity and the Challenges of Cyberspace, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 189-216 (zitiert als: Pirker, in: Ziolkowski). Open Google Scholar
  203. Pool, Phillip, War of the Cyber World: The Law of Cyber Warfare, International Lawyer 47 (2013), S. 299-323. Open Google Scholar
  204. Program Humanitarian Policy and Conflict Research at Harvard University, Commentary on the HCPR Manual on International Law Applicable to Air and Missiles Warfare, March 2010, URL: http://ihlresearch.org/amw/Commentary%20on%20the%20HPCR% 20Manual.pdf, besucht am: 8.2.2016 (zitiert als: Commentary, HPCR Manual). Open Google Scholar
  205. Program on Humanitarian Policy and Conflict Research at Harvard University, HPCR Manual on International Law Applicable to Air and Missile Warfare, 15.5.2009, URL: http://ihlresearch.org/amw/HPCR%20Manual.pdf, besucht am: 12.4.2016 (zitiert als: HPCR Manual). Open Google Scholar
  206. Pun, Darien, Rethinking Espionage in the Modern Era, Chicago Journal of International Law 18 (2017), S. 353-391. Open Google Scholar
  207. Radziwill, Yaroslav, Cyber-Attacks and the Exploitable Imperfections of International Law, Leiden 2015 (zitiert als: Radziwill). Open Google Scholar
  208. Rensmann, Thilo, Die Humanisierung des Völkerrechts durch das ius in bello – Von der Martens’schen Klausel zur ”Responsibility to Protect“ –, Zeitschrift für ausländisches und öffentliches Recht und Völkerrecht 68 (2008), S. 111-118. Open Google Scholar
  209. Richmond, Jeremy, Evolving Battelfields: Does Stuxnet Demonstrate a Need for Modifications to the Law of Armed Conflict, Fordham International Law Journal 35 (2012), S. 842-894. Open Google Scholar
  210. Roberts, Adam, The equal application of the laws of war: a principle under pressure, International Review of the Red Cross 90 (2008), S. 931-962. Open Google Scholar
  211. Roberts, Adam/Guelff, Richard, Documents on the Laws of War, 3. Aufl., Oxford 2000 (zitiert als: Roberts/Guelff). Open Google Scholar
  212. Robertson, Horace B., Self-Defense against Computer Network Attack under International Law, International Law Studies 76 (2002), S. 121-145. Open Google Scholar
  213. Rogers, A. P. V., Law on the Battelfield, 3. Aufl., Manchester 2012 (zitiert als: Rogers). Open Google Scholar
  214. Roscini, Marco, Cyber Opeations and the Use of Force in International Law, Oxford 2014 (zitiert als: Roscini). Open Google Scholar
  215. Roscini, Marco, World Wide Warfare-Jus ad bellum and the Use of Cyber Force, Max Planck Yearbook of United Nations Law 14 (2010), S. 85-130. Open Google Scholar
  216. Rusinova, Vera, Perfidy, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. VIII, S. 245-250 (zitiert als: Rusinova, MPEPIL). Open Google Scholar
  217. Russell, Alison Lawlor, Cyber Blockades, Washington 2014 (zitiert als: Russell). Open Google Scholar
  218. Ruys, Tom, ‘Armed Attack’ and Article 51 of the UN Charter: Evolutions in Customary Law and Practice, Cambridge 2010 (zitiert als: Ruys). Open Google Scholar
  219. Ruys, Tom, The Meaning of “Force” and the Boundaries of the Jus Ad Bellum: Are “Minimal” Uses of Force Excluded from UN Charter Article 2 (4)?, The American Journal of International Law 108 (2014), S. 159-219. Open Google Scholar
  220. Salter, Michael, Reinterpretation Competing Interpretations of the Scope and Potential of the Martens Clause, Journal of Conflict and Security Law 17 (2012), S. 403-437. Open Google Scholar
  221. Salter, Michael, Reinterpreting Competing Interpretations of the Scope and Potential of the Martens Clause, Journal of Conflict and Security Law 17 (2012), S. 403-437. Open Google Scholar
  222. Sandoz, Yves/Swinarski, Christophe/Zimmermann, Bruno (Hrsg.), Commentary on the Additional Protocols of June 1977 to the Geneva Conventions of 12 August 1949, Genf 1987 (zitiert als: IKRK Kommentar ZP I/II). Open Google Scholar
  223. Sassòli Marco, Targeting: The Scope and Utility of the Concept of “Military Objectives“ for the Protection of Civilians in Contemporary Armed Conflict, in: Wippman, David/Evangelista, Matthew (Hrsg.), New Wars, New Laws?, Ardsley 2004, S. 181-210 (zitiert als: Sassòli, in: Wippman/Evangelista). Open Google Scholar
  224. Sassòli Marco, The Concept and the Beginning of Occupation, in: Clapham, Andrew/Gaeta, Paola/ Sassòli, Marco (Hrsg.), The 1949 Geneva Conventions – A Commentary, Oxford 2015, S. 1389-1419 (zitiert als: Sassòli, in: Clapham/Gaeta/Sassòli). Open Google Scholar
  225. Saxon, Dan, Violations of International Humanitarian Law by Non-State Actors during Cyberwarfare: Challenges for Investigation and Prosecution, Journal of Conflict and Security Law 21 (2016), S. 555-574. Open Google Scholar
  226. Schaap, Arie J., Cyber Warfare Operations: Development and Use Under International Law, Air Force Law Review 64 (2009), S. 121-173. Open Google Scholar
  227. Schiffbauer, Björn, Vorbeugende Selbstverteidigung im Völkerrecht – Eine systematische Ermittlung des gegenwärtigen friedenssicherungsrechtlichen Besitzstandes aus völkerrechtsdogmatischer und praxisanalytischer Sicht, Berlin 2012 (zitiert als: Schiffbauer). Open Google Scholar
  228. Schindler, Dietrich, Human Rights and Humanitarian Law: Interrelationship of the Laws, American University Law Review 31 (1982), S. 935-977. Open Google Scholar
  229. Schmitt, Michael N. (Hrsg.), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Cambridge 2013 (zitiert als: Tallinn Manual) Open Google Scholar
  230. Schmitt, Michael N. (Hrsg.), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge 2013 (zitiert als: Tallinn Manual I). Open Google Scholar
  231. Schmitt, Michael N., “Attack” as a Term of art in International Law: The Cyber Operation Context, in: Czosseck, C/Ottis, Ryan/Ziolkowski, Katharina (Hrsg.), 4th International Conference on Cyber Conflict. Tallinn 2012, S. 283-293 (zitiert als: Schmitt, CyCon 2012). Open Google Scholar
  232. Schmitt, Michael N., Classification in Future Conflict, in: Wilmshurst, Elizabeth (Hrsg.), International Law and the Classification of Conflicts, Oxford 2012, S. 455-477 (zitiert als: Schmitt, in: Wilmshurst). Open Google Scholar
  233. Schmitt, Michael N., Classification of Cyber Conflict, Journal of Conflict and Security Law 17 (2012), S. 245-260. Open Google Scholar
  234. Schmitt, Michael N., Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Columbia Law Journal of Transnational Law 37 (1999), S. 885-937. Open Google Scholar
  235. Schmitt, Michael N., Cyber Activities and the Law of Countermeasures, in: Ziolkowski, Katherina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 659-690 (zitiert als: Schmitt, in: Ziolkowski). Open Google Scholar
  236. Schmitt, Michael N., Cyber Operations and the Jus ad bellum, Revisited, Villanova Law Review 56 (2011), S. 569-606. Open Google Scholar
  237. Schmitt, Michael N., Cyber Operations and the Jus in bello: Key Issues, Israel Yearbook on Human Rights 41 (2011), S. 113-135. Open Google Scholar
  238. Schmitt, Michael N., Fault Lines in the Law of Attack, in: Breau, Susan C./Jachec-Neale (Hrsg.), Agnieszka, Testing the Boundaries of International Humanitarian Law, London 2006, S. 277-307 (zitiert als: Schmitt, in: Breau/Jachec-Neale). Open Google Scholar
  239. Schmitt, Michael N., Human Shields in International Humanitarian Law, Columbia Journal of Transnational Law 47 (2009), S. 292-338. Open Google Scholar
  240. Schmitt, Michael N., Military Necessity and Humanity in International Law: Preserving the Delicate Balance, Virginia Journal of International Law 50 (2010), S. 795-839. Open Google Scholar
  241. Schmitt, Michael N., Targeting and Humanitarian Law: Current Issues, International Law Studies 80 (2006), S. 151-194. Open Google Scholar
  242. Schmitt, Michael N., The Law of Cyber Targeting, 7 Tallinn Paper - A NATO CCD COE Publications on Strategic Cyber Security (2015), URL: https://ccdcoe.org/sites/default/ files/multimedia/pdf/TP_07_2015.pdf, besucht am: 19.7.2016 (zitiert als: Schmitt, Cyber Targeting). Open Google Scholar
  243. Schmitt, Michael N., The Law of Cyber Warfare: Quo Vadis?, Stanford Law & Policy Review 25 (2014), S. 269-300. Open Google Scholar
  244. Schmitt, Michael N., The Notion of ‘Objects’ During Cyber Operations: A Riposte in Defence of Interpretative and Applicative Precision, Israel Law Review 48 (2015), S. 81-109. Open Google Scholar
  245. Schmitt, Michael N., Wired Warfare: Computer Network Attack and the Jus in Bello, International Law Studies 76 (2002), S. 187-218. Open Google Scholar
  246. Schmitt, Michael N./Vihul, Liis, Proxy Wars in Cyberspace: The Evolving International Law of Attribution, Fletcher Security Review 1 (2014), S. 55-73. Open Google Scholar
  247. Schmitt, Michael N./Watts, Sean, State Opinio Juris and International Humanitarian Law Pluralism, International Law Studies 91 (2015), S. 171-215. Open Google Scholar
  248. Schulze, Sven-Hendrik, Cyber-„War“ – Testfall der Staatenverantwortlichkeit, Tübingen 2015 (zitiert als: Schulz). Open Google Scholar
  249. Scott, Roger D., Legal Aspects of Information Warfare: Military Disruption of Telecommunication, Naval Law Review 45 (1998), S. 57-76. Open Google Scholar
  250. Shackelford, Scott J., From Nuclear War to Net War: Analogizing Cyber Attacks in International Law, Berkeley Journal of International Law 27 (2009), S. 192-252. Open Google Scholar
  251. Shackelford, Scott J./Andres, Richard B., State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem, Georgetown Journal of International Law 42 (2011), S. 971-1016. Open Google Scholar
  252. Shackelford, Scott J./Russell, Scott/Kuehn, Andreas, Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors, Chicago Journal of International Law 17 (2016), S. 1-47. Open Google Scholar
  253. Sharp, Walter Gary, Cyber Space and the Use of Force, North Falls Church 1999 (zitiert als: Sharp). Open Google Scholar
  254. Shaw, Malcom N., International Law, 7. Aufl., Cambridge 2014 (zitiert als: Shaw). Open Google Scholar
  255. Shelton, Dinah, Righting Wrongs: Reparations in the Articles on States Responsibility, American Journal of International Law 96 (2002), S. 833-856. Open Google Scholar
  256. Shue, Henry/Wippman, David, Limiting Attacks on Dual-Use Facilities Performing Indispensable Civilian Functions, Cornell International Law Journal 35 (2002), S. 559-579. Open Google Scholar
  257. Shulman, Mark R., Discrimination in the Laws of Information Warfare, Columbia Journal of Transnational Law 37 (1999), S. 939-968. Open Google Scholar
  258. Silver, David, Computer Network Attack as a use of Force under Article 2 (4) of the United Nations Charter, International Law Studies 76 (2002), S. 73-97. Open Google Scholar
  259. Singer, Peter/Friedman, Allan, Cybersecurity and Cyberwarfare, New York 2014 (zitiert als: Singer/Friedman). Open Google Scholar
  260. Sklerov, Matthew J., Solving the Dilemma of state Response to Cyberattcks: A Justification for the Use of Active Defenses against States who neglect their duty to prevent, Military Law Review 201 (2009), S. 1-85. Open Google Scholar
  261. Skogly, Sigrun I., Beyond National Borders: States’ Human Rights Obligation in International Cooperation, Antwerpen 2006 (zitiert als: Skogly). Open Google Scholar
  262. Skogly, Sigrun I., Extraterritoriality: universal human rights without universal obligations?, in: Joseph, Sarah/McBeth, Adam (Hrsg.), Research handbook on international human rights law, Cheltenham 2010 (zitiert als: Skogly, in: Joseph/McBeth). Open Google Scholar
  263. Solis, Gary D., The Law of Armed Conflict. International Humanitarian Law in War, Cambridge 2010, (zitiert als: Solis). Open Google Scholar
  264. Sommario, Emanuele, Applying the ius in bello in the cyber domain: Navigating between lex lata und lex ferenda, Question of International Law, Zoom-in 27 (2016), S. 13-23. Open Google Scholar
  265. Sorel, Jean-Marc/Boré Eveno, Valérie, Article 31. General rule of Interpretation, in: Corten, Oliver/Klein, Pierre (Hrsg.), The Vienna Convention on the Law of Treaties. A Commentary, Bd. 1, Oxford 2011, S. 804-837 (zitiert als: Sorel/Boré Eveno, in: Corten/Klein). Open Google Scholar
  266. Spinedi, Marina, On the Non-Attribution of the Bosnian Serbs’ Conduct to Serbia, Journal of International Criminal Justice 5 (2007), S. 829-838. Open Google Scholar
  267. Spoerri, Philip, The Law of Occupation, in: Clapham, Andrew/Gaeta, Paola (Hrsg.), The Oxford Handbook of International Law in Armed Conflict, Oxford 2004, S. 182-205 (zitiert als: Spoerri, in Clapham/Gaeta). Open Google Scholar
  268. Stadlmeier, Sigmar/Unger, Walter J., Cyber War und Cyber Terrorismus aus völkerrechtlicher Sicht, in: Kirchmair, Lando/Schmalenbach, Kirsten (Hrsg.), Aktuelle Herausforderungen des Völkerrechts, Frankfurt am Main 2012, S. 63-80 (zitiert als: Stadlmeier/Unger, in: Kirchmair/Schmalenbach). Open Google Scholar
  269. Stein, Torsten/Marauhn, Thilo, Völkerrechtliche Aspekte von Informationsoperationen, Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 60 (2000), S. 1-40. Open Google Scholar
  270. Stevenson, Angus, Oxford Dictionary of English, 3. Aufl., Oxford 2010 (zitiert als: Oxford Dictionary). Open Google Scholar
  271. Stinissen, Jan, A Legal Framework for Cyber Operations in Ukraine, in: Geers, Kenneth (Hrsg.), Cyber War in Perspective: Russian Aggression Against Ukraine, Tallinn 2015, S. 123-134 (zitiert als: Stinissen, in: Geers). Open Google Scholar
  272. Swanson, Lesley, The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict, Loyola of Los Angeles International and Comparative Law Review 32 (2010), S. 303-333. Open Google Scholar
  273. Taft, William H., Self-defense and the Oil Platforms Decision, Yale Journal of International Law 29 (2004), S. 295-306. Open Google Scholar
  274. Talmon, Stefan, The Responsibility of Outside Powers for Acts of Secessionist Entities, International and Comparative Law Quarterly 58 (2009), S. 493-517. Open Google Scholar
  275. Tams, Christian J., Enforcing Obligations Erga Omnes in International Law, Cambridge 2005 (zitiert als: Tams). Open Google Scholar
  276. Tams, Christian J., The Use of Force against Terrorists, European Journal of International Law 20 (2009), S. 359-397. Open Google Scholar
  277. Terry, James P., Responding to Attacks on Computer Infrastructure, What Targets? What Rules of Engagement?, International Law Studies 76 (2002), S. 421-437. Open Google Scholar
  278. Theeuwen, Wieteke, Cyberspace Operations in International Armed Conflict: The Principles of Distinction and Proportionality in Relation to Military Objects, Humanitäres Völkerrecht-Informationsschriften 26 (2013), S. 188-194. Open Google Scholar
  279. Thümmel, Juliane, Computernetzwerkoperationen innerhalb internationaler bewaffneter Konflikte, Baden-Baden 2013 (zitiert als: Thümmel). Open Google Scholar
  280. Tikk, Eneken/Kaska, Kadri/Vihul, Liis, International Cyber Incidents: Legal Considerations, Tallinn 2010 (zitiert als: Tikk/Kaska/Vihul). Open Google Scholar
  281. Timmermann, Wiebke Kristin, Incitement, Instigation, Hate Speech and War Propaganda in International Law, online: http://www.geneva-academy.ch/docs/memoires/me moire_ ti mmermann.pdf, besucht am: 6.2.2016 (zitiert als: Timmermann). Open Google Scholar
  282. Todd, Graham H., Armed Attack in Cyberspace: Deterring Asymmetric Warfare with an Asymmetric Definition, Air Force Law Review 64 (2009), S. 65-102. Open Google Scholar
  283. Tomuschat, Christian, Human Rights. Between Idealism and Realism, 3. Aufl., Oxford 2014 (zitiert als: Tomuschat). Open Google Scholar
  284. Traeger, Ludwig, Der Kausalbegriff im Straf- und Zivilrecht, Marburg 1904 (zitiert als: Traeger). Open Google Scholar
  285. Tsagourias, Nicholas, Chapter 2: The Tallinn Manual on International Law Applicable to Cyber Warfare: A Commentary on Chapter II – The Use of Force, Yearbook of International Humanitarian Law 15 (2012), S. 9-43. Open Google Scholar
  286. Tsagourias, Nicholas, Cyber attacks, self-defence and the problem of attribution, Journal of Conflict and Security Law 17 (2012), S. 229-244. Open Google Scholar
  287. Tsagourias, Nicholas, The legal status of cyberspace, in: Tsagourias, Nicholas/Buchan, Russell (Hrsg.), Research handbook on international law and cyberspace, Cheltenham 2015, S. 13-29 (zitiert als: Tsagourias, in: Tsagourias/Buchan). Open Google Scholar
  288. Turns, David, Cyber war and the Concept of ‘Attack’ in International Humanitarian Law, in: Saxon, Dan (Hrsg.), International Humanitarian Law and the Changing Technology of War, Den Haag 2013, S. 209-227 (zitiert als: Turns, in: Saxon). Open Google Scholar
  289. Turns, David, Military Manuals and the Customary Law of Armed Conflict, in: Hayashi, Nubuo (Hrsg.), National Military Manuals, 2. Aufl., Oslo 2010, S. 65-77. (Turns, in: Hayashi). Open Google Scholar
  290. Vité, Sylvain, Typology of Armed Conflicts in International Humanitarian Law: Legal Concepts and Actual Situations, International Review of the Red Cross 91 (2009), S. 69-94. Open Google Scholar
  291. Walton, Beatrice A., Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law, Yale Law Journal 216 (2017), S. 1460-1519. Open Google Scholar
  292. Watkin, Kenneth, Use of force during occupation: law enforcement and conduct of hostilities, International Review of the Red Cross 94 (2012), S. 267-315. Open Google Scholar
  293. Watts, Sean, Law-of-War Perfidy, Military Law Review 219 (2014), S. 106-175. Open Google Scholar
  294. Watts, Sean, Low-intensity Computer Attack and Self-Defense, International Law Studies 87 (2011), S. 59-87. Open Google Scholar
  295. Waxman, Matthew C., Cyber-Attacks and the Use of Force: back to the Future of Article 2 (4), Yale Journal of International Law 36 (2011), S. 421-460. Open Google Scholar
  296. Wedgwood, Ruth G., Proportionality; Cyberwar, and the Law of War, International Law Studies 76 (2002), S. 219-232. Open Google Scholar
  297. Werle, Gerhard/Jeßberger, Florian, Völkerstrafrecht, 4. Aufl., Tübingen 2016 (zitiert als: Werle/Jeßberger). Open Google Scholar
  298. Wilmshurst, Elizabeth, The Chatham House Principles of International Law on the Use of Force in Self-Defence, International and Comparative Law Quarterly 55 (2006), S. 963-972 (zitiert als: Wilmshurst, Chatham House Principles Self-Defence). Open Google Scholar
  299. Wilt (van der), Harmen, War Crimes and the Requirement of a Nexus with an Armed Conflict, Journal of International Criminal Justice 10 (2012), S. 1113-1128. Open Google Scholar
  300. Woltag, Johann-Christoph, Computer Network Operations Below the Level of Armed Conflict, European Society of International Law – Conference Paper Series 1 (2011), S. 1-18. Open Google Scholar
  301. Woltag, Johann-Christoph, Cyber Warfare – Military Cross-Border Computer Network Operations under International Law, Cambridge 2014 (zitiert als: Woltag). Open Google Scholar
  302. Woltag, Johann-Christoph, Cyber Warfare, in: Rüdiger Wolfrum (Hrsg.), Max Planck Encyclopedia of Public International Law, Oxford 2012, Bd. II, S. 988-994 (zitiert als: Woltag, MPEPIL). Open Google Scholar
  303. Yntema, Hessel E., The Treaties with Germany and Compensation for War Damage, Columbia Law Review 24 (1924), S. 134-153. Open Google Scholar
  304. Yoo, Christopher, Cyber espionage or Cyber War?: International Law, Domestic law, and Self-Protective Measures (2015). Faculty Scholarship Paper 1540, URL: https:// www.la w.upenn.edu/live/news/5493-scholarship-news---may-2015#.Vlxj_On5xz8, besucht am: 5.8.2018 (zitiert als: Yoo). Open Google Scholar
  305. Ziolkowski, Katharina, General Principles of International Law as Applicable in Cyberspace, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 135-188 (zitiert als: Ziolkowski, General Principles). Open Google Scholar
  306. Ziolkowski, Katharina, Peacetime Cyber Espionage – New Tendencies in Public International Law, in: Ziolkowski, Katharina (Hrsg.), Peacetime Regime for States Activities in Cyberspace, Tallinn 2013, S. 425-464 (zitiert als: Ziolkowski, Cyber Espionage). Open Google Scholar
  307. Ziolkowski, Katharina, Stuxnet-Legal Considerations, Humanitäres Völkerrecht-Informa-tionsschriften 25 (2012), S. 139-147. Open Google Scholar
  308. Zwanenburg, Marten, Challeging the Pictet Theory, International Review of the Red Cross 94 (2012), S. 30-36. Open Google Scholar

Similar publications

from the topics "Criminal Law & Criminology", "European Law & International Law & Comparative Law"
Cover of book: Das erlangte Etwas bei Steuerstraftaten
Book Titles No access
Stefan Holzmaier
Das erlangte Etwas bei Steuerstraftaten
Cover of book: Auftrag, Dienst- und Arbeitsvertrag
Book Titles No access
Chia-Te Hsiao
Auftrag, Dienst- und Arbeitsvertrag
Cover of book: Comparative Perspectives on the Law of Energy Transition in Europe
Edited Book Full access
Michael Rodi, Johannes Saurer
Comparative Perspectives on the Law of Energy Transition in Europe
Cover of book: Überobligatorische Compliance als Risiko strafrechtlicher Haftung
Book Titles No access
Patricia Magdalena Labussek
Überobligatorische Compliance als Risiko strafrechtlicher Haftung