Cyber-attacks and the exploitable imperfection of international law / / by Yaroslav Radziwill.

Cyber-Attacks and the Exploitable Imperfections of International Law reveals elements of existing jus ad bellum and jus in bello regimes that are unable to accommodate the threats posed by cyber-attacks. It maps out legal gaps, deficiencies, and uncertainties, which international actors may seek to...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Leiden, Netherlands ;, Boston, Massachusetts : : Koninklijke Brill,, 2015.
©2015
Year of Publication:2015
Edition:1st ed.
Language:English
Physical Description:1 online resource (429 pages)
Notes:Based on author's thesis (doctoral - University of Warwick, 2014) issued under title: Cyber-attacks and international law : imperfections of a stagnant legal regime.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993582546104498
ctrlnum (CKB)3710000000453355
(SSID)ssj0001516896
(PQKBManifestationID)12649772
(PQKBTitleCode)TC0001516896
(PQKBWorkID)11499658
(PQKB)10196625
(MiAaPQ)EBC2110732
(OCoLC)911019879
(nllekb)BRILL9789004298309
(Au-PeEL)EBL2110732
(CaPaEBR)ebr11081614
(CaONFJC)MIL817015
(OCoLC)915154489
(PPN)195379691
(EXLCZ)993710000000453355
collection bib_alma
record_format marc
spelling Radziwill, Yaroslav, author.
Cyber-attacks and the exploitable imperfection of international law / by Yaroslav Radziwill.
1st ed.
Leiden, Netherlands ; Boston, Massachusetts : Koninklijke Brill, 2015.
©2015
1 online resource (429 pages)
text txt
computer c
online resource cr
English
Based on author's thesis (doctoral - University of Warwick, 2014) issued under title: Cyber-attacks and international law : imperfections of a stagnant legal regime.
Preliminary Material -- 1 Introduction -- 2 Theoretical Framework -- 3 Cyber-Threat -- 4 Cyber-Space -- 5 Cyber-Strikes and Jus ad Bellum -- 6 Humanitarian Law Perspective -- 7 Cyber-Terrorism -- 8 Role of International Organizations -- 9 Conclusion -- Appendix -- Bibliography -- Index.
Includes bibliographical references and index.
Description based on print version record.
Cyber-Attacks and the Exploitable Imperfections of International Law reveals elements of existing jus ad bellum and jus in bello regimes that are unable to accommodate the threats posed by cyber-attacks. It maps out legal gaps, deficiencies, and uncertainties, which international actors may seek to exploit to their political benefit.
Information warfare (International law)
Cyberspace operations (Military science)
Cyberspace operations (International law)
90-04-29833-9
language English
format eBook
author Radziwill, Yaroslav,
spellingShingle Radziwill, Yaroslav,
Cyber-attacks and the exploitable imperfection of international law /
Preliminary Material -- 1 Introduction -- 2 Theoretical Framework -- 3 Cyber-Threat -- 4 Cyber-Space -- 5 Cyber-Strikes and Jus ad Bellum -- 6 Humanitarian Law Perspective -- 7 Cyber-Terrorism -- 8 Role of International Organizations -- 9 Conclusion -- Appendix -- Bibliography -- Index.
author_facet Radziwill, Yaroslav,
author_variant y r yr
author_role VerfasserIn
author_sort Radziwill, Yaroslav,
title Cyber-attacks and the exploitable imperfection of international law /
title_full Cyber-attacks and the exploitable imperfection of international law / by Yaroslav Radziwill.
title_fullStr Cyber-attacks and the exploitable imperfection of international law / by Yaroslav Radziwill.
title_full_unstemmed Cyber-attacks and the exploitable imperfection of international law / by Yaroslav Radziwill.
title_auth Cyber-attacks and the exploitable imperfection of international law /
title_new Cyber-attacks and the exploitable imperfection of international law /
title_sort cyber-attacks and the exploitable imperfection of international law /
publisher Koninklijke Brill,
publishDate 2015
physical 1 online resource (429 pages)
edition 1st ed.
contents Preliminary Material -- 1 Introduction -- 2 Theoretical Framework -- 3 Cyber-Threat -- 4 Cyber-Space -- 5 Cyber-Strikes and Jus ad Bellum -- 6 Humanitarian Law Perspective -- 7 Cyber-Terrorism -- 8 Role of International Organizations -- 9 Conclusion -- Appendix -- Bibliography -- Index.
isbn 90-04-29830-4
90-04-29833-9
callnumber-first K - Law
callnumber-subject KZ - Law of Nations
callnumber-label KZ6718
callnumber-sort KZ 46718 R33 42015
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 340 - Law
dewey-ones 341 - Law of nations
dewey-full 341.6/3
dewey-sort 3341.6 13
dewey-raw 341.6/3
dewey-search 341.6/3
oclc_num 911019879
915154489
work_keys_str_mv AT radziwillyaroslav cyberattacksandtheexploitableimperfectionofinternationallaw
status_str n
ids_txt_mv (CKB)3710000000453355
(SSID)ssj0001516896
(PQKBManifestationID)12649772
(PQKBTitleCode)TC0001516896
(PQKBWorkID)11499658
(PQKB)10196625
(MiAaPQ)EBC2110732
(OCoLC)911019879 (OCoLC)914219736 (OCoLC)925440558
(nllekb)BRILL9789004298309
(Au-PeEL)EBL2110732
(CaPaEBR)ebr11081614
(CaONFJC)MIL817015
(OCoLC)915154489
(PPN)195379691
(EXLCZ)993710000000453355
carrierType_str_mv cr
is_hierarchy_title Cyber-attacks and the exploitable imperfection of international law /
_version_ 1796652834120269824
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02681nam a2200601 i 4500</leader><controlfield tag="001">993582546104498</controlfield><controlfield tag="005">20240410044830.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">150805t20152015ne ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">90-04-29830-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1163/9789004298309</subfield><subfield code="2">DOI</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000000453355</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001516896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)12649772</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001516896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)11499658</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10196625</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC2110732</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)911019879</subfield><subfield code="z">(OCoLC)914219736</subfield><subfield code="z">(OCoLC)925440558</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(nllekb)BRILL9789004298309</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL2110732</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr11081614</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL817015</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)915154489</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PPN)195379691</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000000453355</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KZ6718</subfield><subfield code="b">.R33 2015</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">K</subfield><subfield code="2">lcco</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LBDT</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW015000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">341.6/3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Radziwill, Yaroslav,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-attacks and the exploitable imperfection of international law /</subfield><subfield code="c">by Yaroslav Radziwill.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Leiden, Netherlands ;</subfield><subfield code="a">Boston, Massachusetts :</subfield><subfield code="b">Koninklijke Brill,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (429 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Based on author's thesis (doctoral - University of Warwick, 2014) issued under title: Cyber-attacks and international law : imperfections of a stagnant legal regime.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="a">Preliminary Material -- 1 Introduction -- 2 Theoretical Framework -- 3 Cyber-Threat -- 4 Cyber-Space -- 5 Cyber-Strikes and Jus ad Bellum -- 6 Humanitarian Law Perspective -- 7 Cyber-Terrorism -- 8 Role of International Organizations -- 9 Conclusion -- Appendix -- Bibliography -- Index.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber-Attacks and the Exploitable Imperfections of International Law reveals elements of existing jus ad bellum and jus in bello regimes that are unable to accommodate the threats posed by cyber-attacks. It maps out legal gaps, deficiencies, and uncertainties, which international actors may seek to exploit to their political benefit.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare (International law)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberspace operations (International law)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">90-04-29833-9</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-04-12 01:33:07 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2015-08-08 21:46:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">Brill</subfield><subfield code="P">EBA Brill All</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5343341690004498&amp;Force_direct=true</subfield><subfield code="Z">5343341690004498</subfield><subfield code="b">Available</subfield><subfield code="8">5343341690004498</subfield></datafield></record></collection>