Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Law

Information Operations In The Space Law Arena: Science Fiction Becomes Reality, Douglas S. Anderson, Christopher R. Dooley Jun 2002

Information Operations In The Space Law Arena: Science Fiction Becomes Reality, Douglas S. Anderson, Christopher R. Dooley

International Law Studies

No abstract provided.


Self-Defense Against Computer Network Attack Under International Law, Horace B. Robertson Jr. Jun 2002

Self-Defense Against Computer Network Attack Under International Law, Horace B. Robertson Jr.

International Law Studies

No abstract provided.


Introduction (Volume 76) Jun 2002

Introduction (Volume 76)

International Law Studies

No abstract provided.


Full Volume 76: Computer Network Attack And International Law Jun 2002

Full Volume 76: Computer Network Attack And International Law

International Law Studies

No abstract provided.


Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane Jun 2002

Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane

International Law Studies

No abstract provided.


A Different Kettle Of Fish: Computer Network Attack, Roger W. Barnett Jun 2002

A Different Kettle Of Fish: Computer Network Attack, Roger W. Barnett

International Law Studies

No abstract provided.


Responding To Attacks On Critical Computer Infrastructure: What Targets? What Rules Of Engagement?, James P. Terry Jun 2002

Responding To Attacks On Critical Computer Infrastructure: What Targets? What Rules Of Engagement?, James P. Terry

International Law Studies

No abstract provided.


Proportionality, Cyberwar, And The Law Of War, Ruth G. Wedgwood Jun 2002

Proportionality, Cyberwar, And The Law Of War, Ruth G. Wedgwood

International Law Studies

No abstract provided.


Computer Networks, Proportionality, And Military Operations, James H. Doyle Jr. Jun 2002

Computer Networks, Proportionality, And Military Operations, James H. Doyle Jr.

International Law Studies

No abstract provided.


Is It Time For A Treaty On Information Warfare?, Phillip A. Johnson Jun 2002

Is It Time For A Treaty On Information Warfare?, Phillip A. Johnson

International Law Studies

No abstract provided.


Apendix: An Assessment Of International Legal Issues In Information Operations (Volume 76) Jun 2002

Apendix: An Assessment Of International Legal Issues In Information Operations (Volume 76)

International Law Studies

No abstract provided.


International Law Of Armed Conflict And Computer Network Attack: Developing The Rules Of Engagement, Brian T. O'Donnell, James C. Kraska Jun 2002

International Law Of Armed Conflict And Computer Network Attack: Developing The Rules Of Engagement, Brian T. O'Donnell, James C. Kraska

International Law Studies

No abstract provided.


"Weapons Like To Lightning": Us Information Operations And Us Treaty Obligations, Jeffrey H. Smith, Gordon N. Lederman Jun 2002

"Weapons Like To Lightning": Us Information Operations And Us Treaty Obligations, Jeffrey H. Smith, Gordon N. Lederman

International Law Studies

No abstract provided.


Meeting The Challenge Of Cyberterrorism: Defining The Military Role In A Democracy, Charles J. Dunlap Jun 2002

Meeting The Challenge Of Cyberterrorism: Defining The Military Role In A Democracy, Charles J. Dunlap

International Law Studies

No abstract provided.


Neutrality And Information Warfare, George K. Walker Jun 2002

Neutrality And Information Warfare, George K. Walker

International Law Studies

No abstract provided.


Some Thoughts On Computer Network Attack And The International Law Of Armed Conflict, Louise Doswald-Beck Jun 2002

Some Thoughts On Computer Network Attack And The International Law Of Armed Conflict, Louise Doswald-Beck

International Law Studies

No abstract provided.


Wired Warfare: Computer Network Attack And The Jus In Bello, Michael N. Schmitt Jun 2002

Wired Warfare: Computer Network Attack And The Jus In Bello, Michael N. Schmitt

International Law Studies

No abstract provided.


Computer Network Attacks And Self-Defense, Yoram Dinstein Jun 2002

Computer Network Attacks And Self-Defense, Yoram Dinstein

International Law Studies

No abstract provided.


Computer Network Attack As A Use Of Force Under Article 2(4) Of The United Nations Charter, Daniel B. Silver Jun 2002

Computer Network Attack As A Use Of Force Under Article 2(4) Of The United Nations Charter, Daniel B. Silver

International Law Studies

No abstract provided.


Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl Jun 2002

Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl

International Law Studies

No abstract provided.


Table Of Contents (Volume 76) Jun 2002

Table Of Contents (Volume 76)

International Law Studies

No abstract provided.


Computer Network Attacks By Terrorists: Some Legal Dimensions, John F. Murphy Jun 2002

Computer Network Attacks By Terrorists: Some Legal Dimensions, John F. Murphy

International Law Studies

No abstract provided.


Technology And Law: The Evolution Of Digital Warfare, David Tubbs, Perry G. Luzwick, Walter Gary Sharp Sr. Jun 2002

Technology And Law: The Evolution Of Digital Warfare, David Tubbs, Perry G. Luzwick, Walter Gary Sharp Sr.

International Law Studies

No abstract provided.


Cne And Cna In The Network-Centric Battlespace: Challenges For Operators And Lawyers, Arthur K. Cebrowski Jun 2002

Cne And Cna In The Network-Centric Battlespace: Challenges For Operators And Lawyers, Arthur K. Cebrowski

International Law Studies

No abstract provided.


International Law, Cybernetics, And Cyberspace, Anthony D'Amato Jun 2002

International Law, Cybernetics, And Cyberspace, Anthony D'Amato

International Law Studies

No abstract provided.


O Princípio Da Eficiência E O Software Livre, Ivo T. Gico Dec 2001

O Princípio Da Eficiência E O Software Livre, Ivo T. Gico

Ivo Teixeira Gico Jr.

O presente artigo visa a incitar o debate acerca da adoção do software livre pela Administração Pública em respeito ao princípio da efetividade, inscrito no art. 37 da Constituição Federal.

This article goal is to encourage discussion about the adoption of free software by the government regarding the principle of effectiveness included in Art. 37 of the Federal Constitution.