Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication Type
Articles 1 - 26 of 26
Full-Text Articles in Law
Information Operations In The Space Law Arena: Science Fiction Becomes Reality, Douglas S. Anderson, Christopher R. Dooley
Information Operations In The Space Law Arena: Science Fiction Becomes Reality, Douglas S. Anderson, Christopher R. Dooley
International Law Studies
No abstract provided.
Self-Defense Against Computer Network Attack Under International Law, Horace B. Robertson Jr.
Self-Defense Against Computer Network Attack Under International Law, Horace B. Robertson Jr.
International Law Studies
No abstract provided.
Full Volume 76: Computer Network Attack And International Law
Full Volume 76: Computer Network Attack And International Law
International Law Studies
No abstract provided.
Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane
Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane
International Law Studies
No abstract provided.
A Different Kettle Of Fish: Computer Network Attack, Roger W. Barnett
A Different Kettle Of Fish: Computer Network Attack, Roger W. Barnett
International Law Studies
No abstract provided.
Responding To Attacks On Critical Computer Infrastructure: What Targets? What Rules Of Engagement?, James P. Terry
Responding To Attacks On Critical Computer Infrastructure: What Targets? What Rules Of Engagement?, James P. Terry
International Law Studies
No abstract provided.
Proportionality, Cyberwar, And The Law Of War, Ruth G. Wedgwood
Proportionality, Cyberwar, And The Law Of War, Ruth G. Wedgwood
International Law Studies
No abstract provided.
Computer Networks, Proportionality, And Military Operations, James H. Doyle Jr.
Computer Networks, Proportionality, And Military Operations, James H. Doyle Jr.
International Law Studies
No abstract provided.
Is It Time For A Treaty On Information Warfare?, Phillip A. Johnson
Is It Time For A Treaty On Information Warfare?, Phillip A. Johnson
International Law Studies
No abstract provided.
Apendix: An Assessment Of International Legal Issues In Information Operations (Volume 76)
Apendix: An Assessment Of International Legal Issues In Information Operations (Volume 76)
International Law Studies
No abstract provided.
International Law Of Armed Conflict And Computer Network Attack: Developing The Rules Of Engagement, Brian T. O'Donnell, James C. Kraska
International Law Of Armed Conflict And Computer Network Attack: Developing The Rules Of Engagement, Brian T. O'Donnell, James C. Kraska
International Law Studies
No abstract provided.
"Weapons Like To Lightning": Us Information Operations And Us Treaty Obligations, Jeffrey H. Smith, Gordon N. Lederman
"Weapons Like To Lightning": Us Information Operations And Us Treaty Obligations, Jeffrey H. Smith, Gordon N. Lederman
International Law Studies
No abstract provided.
Meeting The Challenge Of Cyberterrorism: Defining The Military Role In A Democracy, Charles J. Dunlap
Meeting The Challenge Of Cyberterrorism: Defining The Military Role In A Democracy, Charles J. Dunlap
International Law Studies
No abstract provided.
Neutrality And Information Warfare, George K. Walker
Neutrality And Information Warfare, George K. Walker
International Law Studies
No abstract provided.
Some Thoughts On Computer Network Attack And The International Law Of Armed Conflict, Louise Doswald-Beck
Some Thoughts On Computer Network Attack And The International Law Of Armed Conflict, Louise Doswald-Beck
International Law Studies
No abstract provided.
Wired Warfare: Computer Network Attack And The Jus In Bello, Michael N. Schmitt
Wired Warfare: Computer Network Attack And The Jus In Bello, Michael N. Schmitt
International Law Studies
No abstract provided.
Computer Network Attacks And Self-Defense, Yoram Dinstein
Computer Network Attacks And Self-Defense, Yoram Dinstein
International Law Studies
No abstract provided.
Computer Network Attack As A Use Of Force Under Article 2(4) Of The United Nations Charter, Daniel B. Silver
Computer Network Attack As A Use Of Force Under Article 2(4) Of The United Nations Charter, Daniel B. Silver
International Law Studies
No abstract provided.
Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl
Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl
International Law Studies
No abstract provided.
Computer Network Attacks By Terrorists: Some Legal Dimensions, John F. Murphy
Computer Network Attacks By Terrorists: Some Legal Dimensions, John F. Murphy
International Law Studies
No abstract provided.
Technology And Law: The Evolution Of Digital Warfare, David Tubbs, Perry G. Luzwick, Walter Gary Sharp Sr.
Technology And Law: The Evolution Of Digital Warfare, David Tubbs, Perry G. Luzwick, Walter Gary Sharp Sr.
International Law Studies
No abstract provided.
Cne And Cna In The Network-Centric Battlespace: Challenges For Operators And Lawyers, Arthur K. Cebrowski
Cne And Cna In The Network-Centric Battlespace: Challenges For Operators And Lawyers, Arthur K. Cebrowski
International Law Studies
No abstract provided.
International Law, Cybernetics, And Cyberspace, Anthony D'Amato
International Law, Cybernetics, And Cyberspace, Anthony D'Amato
International Law Studies
No abstract provided.
O Princípio Da Eficiência E O Software Livre, Ivo T. Gico
O Princípio Da Eficiência E O Software Livre, Ivo T. Gico
Ivo Teixeira Gico Jr.
O presente artigo visa a incitar o debate acerca da adoção do software livre pela Administração Pública em respeito ao princípio da efetividade, inscrito no art. 37 da Constituição Federal.
This article goal is to encourage discussion about the adoption of free software by the government regarding the principle of effectiveness included in Art. 37 of the Federal Constitution.