Cyber operations and international law
Enregistré dans:
Auteur principal: | |
---|---|
Support: | E-Book |
Langue: | Anglais |
Publié: |
Cambridge ; New York :
Cambridge University Press.
|
Collection: | Cambridge Studies in International and Comparative Law (Online) ;
146 |
Sujets: | |
Autres localisations: | Voir dans le Sudoc |
Résumé: | This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim. |
Accès en ligne: | Accès à l'E-book Accès sur la plateforme ISTEX (corpus CUP) |
Lien: | Collection principale:
Cambridge Studies in International and Comparative Law (Online) |
LEADER | 03699cmm a2200457 i 4500 | ||
---|---|---|---|
001 | ebook-253766575 | ||
005 | 20240422172647.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 210224s2020||||uk |||| |||| ||||||eng d | ||
020 | |a 9781108780605 (PDF) | ||
024 | 7 | |a 10.1017/9781108780605 |2 DOI | |
035 | |a (OCoLC)1249552323 | ||
035 | |a CUP_LN20_EB_9781108780605 | ||
040 | |a ABES |b fre |e AFNOR | ||
041 | 0 | |a eng |2 639-2 | |
050 | 4 | |a KZ6718 | |
082 | 0 | |a 341.6/3 |2 23 | |
100 | 1 | |0 (IdRef)245148760 |1 http://www.idref.fr/245148760/id |a Delerue, François |d (1978-....). |4 aut. |e Auteur | |
245 | 1 | 0 | |a Cyber operations and international law |c François Delerue, L'Institut de Recherche Stratégique de l'École Militaire. |
264 | 1 | |a Cambridge ; |a New York : |b Cambridge University Press. | |
264 | 2 | |a Cambridge : |b Cambridge University Press, |c 2020. | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
337 | |b b |2 isbdmedia | ||
338 | |b ceb |2 RDAfrCarrier | ||
490 | 1 | |a Cambridge studies in international and comparative law ; |v 146 | |
504 | |a Bibliographie. Index. | ||
506 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | ||
506 | |a Accès soumis à abonnement pour tout autre établissement | ||
520 | |a This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim. | ||
540 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c https://www.licencesnationales.fr/wp-content/uploads/2024/03/2023-14_Collex_Cambridge_CCTP.pdf | ||
559 | 2 | |b Does International Law Matter in Cyberspace? |b Attribution to a machine or a human: a technical process |b The question of evidence: from technical to legal attribution |b Attribution to a State |b Internationally wrongful cyber acts: cyber operations breaching norms of international law |b The threshold of cyber warfare: from use of cyber force to cyber armed attack |b Circumstances precluding or attenuating the wrongfulness of unlawful cyber operations |b Cyber operations and the principle of due diligence |b State responsibility and the consequences of an internationally wrongful cyber operation |b Measures of self-help against state-sponsored cyber operations |b Conclusion | |
650 | 0 | |a Cyberspace operations (International law). |2 lc | |
760 | 0 | |t Cambridge Studies in International and Comparative Law (Online) |g 146 |w (ABES)250064782 | |
830 | 0 | |a Cambridge Studies in International and Comparative Law (Online) ; |v 146 | |
856 | |u https://doi-org.srvext.uco.fr/10.1017/9781108780605 |z Accès à l'E-book | ||
856 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-3FW58HMF-R |z Accès sur la plateforme ISTEX (corpus CUP) | ||
886 | 2 | |2 unimarc |a 181 |a i# |b xxxe## | |
993 | |a E-Book | ||
994 | |a BNUM | ||
995 | |a 253766575 |