References
- Andress, J., & Winterfeld, S. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. https://ci.nii.ac.jp/ncid/BB12613653
- Cohen, E. A., Arquilla, J., & Ronfeldt, D. F. (2001). Networks and Netwars: The Future of Terror, Crime, and Militancy. Foreign Affairs, 81(2), 182. https://doi.org/10.2307/20033106
- Black, J. (1992). A Military Revolution? Military Change and European Society, 1550-1800. The Journal of Military History, 56(1), 126. https://doi.org/10.2307/1985717
- Brenner, J. I. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. http://ci.nii.ac.jp/ncid/BB1226299X
- Bronk, C. (2015). Cybersecurity and Cyberwar: What Everyone Needs to Know. 52(09), 52–4806. https://doi.org/10.5860/choice.188472
- Buchanan, B. (2017). The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. http://cds.cern.ch/record/2263995
- Shaw, M. N. (1977). International Law. https://openlibrary.org/books/OL1662187M/Int ernational_law
- Chowdhary, A., Huang, D., Mahendran, J. S., Romo, D., Deng, Y., & Sabur, A. (2020). Autonomous Security Analysis and Penetration Testing. https://doi.org/10.1109/msn50589.2020.00086
- The Law Against War: The Prohibition on the Use of Force in Contemporary International Law by Olivier Corten. Hart Publishing: Oxford, 2010. 569 pp. ISBN 9781841139425. (2014). In Hart Publishing eBooks. https://doi.org/10.5040/9781472566263.ch-017
- Council, N. R. (2010). Proceedings of a workshop on deterring cyberattacks: informing strategies and developing options for US policy. National Academies Press.
- Mann, F. A. (1988). War, aggression and self-defence. International Affairs, 65(1), 140–141. https://doi.org/10.2307/2621018
- Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross, 94(886), 533–578. https://doi.org/10.1017/s1816383113000246
- Fidler, D. P., Pregent, R., & Vandurme, A. (2016). NATO, Cyber Defense, and International Law. Int’l & Comp, 4(1), 1. https://paperity.org/p/81552305/nato-cyber-defense-and-international-law
- Finnemore, M., & Sikkink, K. (1998). International Norm Dynamics and Political Change. International Organization, 52(4), 887–917. https://doi.org/10.1162/002081898550789
- Pierre, A. J., & Freedman, L. (1982). The Evolution of Nuclear Strategy. Foreign Affairs, 60(4), 957. https://doi.org/10.2307/20041193
- Clapham, A., Gaeta, P., Haeck, T., & Priddy, A. (2014). The Oxford Handbook of International Law in Armed Conflict. In Oxford University Press eBooks. https://doi.org/10.1093/law/9780199559695.001.0001
- Gray, C. (2008). International Law and the Use of Force. In Routledge eBooks (pp. 111–128). https://doi.org/10.4324/9780203926598-14
- Hathaway, O. A., Crootof, R., Perdue, W. C., & Levitz, P. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817. https://doi.org/10.15779/z38cr6n
- Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49–60. https://doi.org/10.5038/1944-0472.4.2.3
- Joque, J., & Haque, S. M. T. (2020). Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity. https://doi.org/10.1145/3442167.3442170
- Gat, A. (2006). War in Human Civilization. http://kb.osu.edu/dspace/handle/1811/31976
- Kello, L. (2013). The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security, 38(2), 7–40. https://doi.org/10.1162/isec_a_00138
- Kelsen, H. (2000). The law of the United Nations : a critical analysis of its fundamental problems : with supplement. In Lawbook Exchange. https://ci.nii.ac.jp/ncid/BA54061603
- Mohurle, S., & Patil, M. C. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938–1940. https://doi.org/10.26483/ijarcs.v8i5.4021
- Clarke, R. H., & Knake, R. K. (2011). Cyber war: the next threat to national security and what to do about it. Choice Reviews Online, 48(05), 48–2963. https://doi.org/10.5860/choice.48-2963
- Rid, D. T. (2019). Active Measures. The Secret History of Disinformation and Political Warfare, 146
- Roscini, M. (2010). World Wide Warfare-'Jus Ad Bellum'and the Use of Cyber Force. Max Planck Yearbook of United Nations Law, 14, 85-130.
- Schmitt, M. (2011). Cyber Operations and the Jus in Bello: Key Issues. In Brill | Nijhoff eBooks (pp. 113–135). https://doi.org/10.1163/9789004226449_006
- Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. In Cambridge University Press eBooks. https://doi.org/10.1017/cbo9781139169288
- Schmitt, M. (2014). Rewired warfare: rethinking the law of cyber-attack. International Review of the Red Cross. https://doi.org/10.1017/s1816383114000381
- Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. In Cambridge University Press eBooks. https://doi.org/10.1017/9781316822524
- Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. https://www.amazon.com/Hacked-World- Order-Maneuver-Manipulate/dp/1610398726
- Shackelford, S. (2009). From Nuclear War to Net War: Analogizing Cyber Attacks in International Law. Berkeley Journal of International Law, 27(1), 192. https://doi.org/10.15779/z38ks9b
- Shackelford, S. (2014). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace. http://ci.nii.ac.jp/ncid/BB1670865X
- Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to Cyber-Warfare: A Multidisciplinary Approach. https://www.amazon.com/Introduction-Cyber-Warfare-Multidisciplinary-Paulo-Shakarian/dp/0124078141
- Sony cyber-attack: North Korea faces new US sanctions. (2015, 3 January 2015). BBC News. https://www.bbc.com/news/world-us-canada-30661973
- Tsagourias, N. (2012). Cyber attacks, self-defence and the problem of attribution. Journal of Conflict and Security Law, 17(2), 229–244. https://doi.org/10.1093/jcsl/krs019
- Valeriano, B., Jensen, B. a. H., & Maness, R. C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. https://connections-qj.org/article/cyber-strategy-evolving-character-power-and-coercion
- Crilley, R. (2019). Deconstruction machines: writing in the age of cyberwar. International Affairs. https://doi.org/10.1093/ia/iiy247
- Votel, J. L., Cleveland, C. T., Connett, C. T., & Irwin, W. (2016). Unconventional warfare in the gray zone. Joint Forces Quarterly, 80(1), 101-109.
- Wolfgang, S., & Mathieu, P. (2018). The state of industrial cybersecurity 2018. Kaspersky.
- Yost, J. R. (2016). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace by Scott J. Shackelford. Technology and Culture, 57(1), 280-281. http://ci.nii.ac.jp/ncid/BB1670865X
- Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. https://ci.nii.ac.jp/ncid/BB19363361
- Andress, J., & Winterfeld, S. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. https://ci.nii.ac.jp/ncid/BB12613653
- Cohen, E. A., Arquilla, J., & Ronfeldt, D. F. (2001). Networks and Netwars: The Future of Terror, Crime, and Militancy. Foreign Affairs, 81(2), 182. https://doi.org/10.2307/20033106
- Black, J. (1992). A Military Revolution? Military Change and European Society, 1550-1800. The Journal of Military History, 56(1), 126. https://doi.org/10.2307/1985717
- Brenner, J. I. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. http://ci.nii.ac.jp/ncid/BB1226299X
- Bronk, C. (2015). Cybersecurity and Cyberwar: What Everyone Needs to Know. 52(09), 52–4806. https://doi.org/10.5860/choice.188472
- Buchanan, B. (2017). The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. http://cds.cern.ch/record/2263995
- Shaw, M. N. (1977). International Law. https://openlibrary.org/books/OL1662187M/Int ernational_law
- Chowdhary, A., Huang, D., Mahendran, J. S., Romo, D., Deng, Y., & Sabur, A. (2020). Autonomous Security Analysis and Penetration Testing. https://doi.org/10.1109/msn50589.2020.00086
- The Law Against War: The Prohibition on the Use of Force in Contemporary International Law by Olivier Corten. Hart Publishing: Oxford, 2010. 569 pp. ISBN 9781841139425. (2014). In Hart Publishing eBooks. https://doi.org/10.5040/9781472566263.ch-017
- Council, N. R. (2010). Proceedings of a workshop on deterring cyberattacks: informing strategies and developing options for US policy. National Academies Press.
- Mann, F. A. (1988). War, aggression and self-defence. International Affairs, 65(1), 140–141. https://doi.org/10.2307/2621018
- Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross, 94(886), 533–578. https://doi.org/10.1017/s1816383113000246
- Fidler, D. P., Pregent, R., & Vandurme, A. (2016). NATO, Cyber Defense, and International Law. Int’l & Comp, 4(1), 1. https://paperity.org/p/81552305/nato-cyber-defense-and-international-law
- Finnemore, M., & Sikkink, K. (1998). International Norm Dynamics and Political Change. International Organization, 52(4), 887–917. https://doi.org/10.1162/002081898550789
- Pierre, A. J., & Freedman, L. (1982). The Evolution of Nuclear Strategy. Foreign Affairs, 60(4), 957. https://doi.org/10.2307/20041193
- Clapham, A., Gaeta, P., Haeck, T., & Priddy, A. (2014). The Oxford Handbook of International Law in Armed Conflict. In Oxford University Press eBooks. https://doi.org/10.1093/law/9780199559695.001.0001
- Gray, C. (2008). International Law and the Use of Force. In Routledge eBooks (pp. 111–128). https://doi.org/10.4324/9780203926598-14
- Hathaway, O. A., Crootof, R., Perdue, W. C., & Levitz, P. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817. https://doi.org/10.15779/z38cr6n
- Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49–60. https://doi.org/10.5038/1944-0472.4.2.3
- Joque, J., & Haque, S. M. T. (2020). Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity. https://doi.org/10.1145/3442167.3442170
- Gat, A. (2006). War in Human Civilization. http://kb.osu.edu/dspace/handle/1811/31976
- Kello, L. (2013). The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security, 38(2), 7–40. https://doi.org/10.1162/isec_a_00138
- Kelsen, H. (2000). The law of the United Nations : a critical analysis of its fundamental problems : with supplement. In Lawbook Exchange. https://ci.nii.ac.jp/ncid/BA54061603
- Mohurle, S., & Patil, M. C. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938–1940. https://doi.org/10.26483/ijarcs.v8i5.4021
- Clarke, R. H., & Knake, R. K. (2011). Cyber war: the next threat to national security and what to do about it. Choice Reviews Online, 48(05), 48–2963. https://doi.org/10.5860/choice.48-2963
- Rid, D. T. (2019). Active Measures. The Secret History of Disinformation and Political Warfare, 146
- Roscini, M. (2010). World Wide Warfare-'Jus Ad Bellum'and the Use of Cyber Force. Max Planck Yearbook of United Nations Law, 14, 85-130.
- Schmitt, M. (2011). Cyber Operations and the Jus in Bello: Key Issues. In Brill | Nijhoff eBooks (pp. 113–135). https://doi.org/10.1163/9789004226449_006
- Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. In Cambridge University Press eBooks. https://doi.org/10.1017/cbo9781139169288
- Schmitt, M. (2014). Rewired warfare: rethinking the law of cyber-attack. International Review of the Red Cross. https://doi.org/10.1017/s1816383114000381
- Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. In Cambridge University Press eBooks. https://doi.org/10.1017/9781316822524
- Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. https://www.amazon.com/Hacked-World- Order-Maneuver-Manipulate/dp/1610398726
- Shackelford, S. (2009). From Nuclear War to Net War: Analogizing Cyber Attacks in International Law. Berkeley Journal of International Law, 27(1), 192. https://doi.org/10.15779/z38ks9b
- Shackelford, S. (2014). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace. http://ci.nii.ac.jp/ncid/BB1670865X
- Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to Cyber-Warfare: A Multidisciplinary Approach. https://www.amazon.com/Introduction-Cyber-Warfare-Multidisciplinary-Paulo-Shakarian/dp/0124078141
- Sony cyber-attack: North Korea faces new US sanctions. (2015, 3 January 2015). BBC News. https://www.bbc.com/news/world-us-canada-30661973
- Tsagourias, N. (2012). Cyber attacks, self-defence and the problem of attribution. Journal of Conflict and Security Law, 17(2), 229–244. https://doi.org/10.1093/jcsl/krs019
- Valeriano, B., Jensen, B. a. H., & Maness, R. C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. https://connections-qj.org/article/cyber-strategy-evolving-character-power-and-coercion
- Crilley, R. (2019). Deconstruction machines: writing in the age of cyberwar. International Affairs. https://doi.org/10.1093/ia/iiy247
- Votel, J. L., Cleveland, C. T., Connett, C. T., & Irwin, W. (2016). Unconventional warfare in the gray zone. Joint Forces Quarterly, 80(1), 101-109.
- Wolfgang, S., & Mathieu, P. (2018). The state of industrial cybersecurity 2018. Kaspersky.
- Yost, J. R. (2016). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace by Scott J. Shackelford. Technology and Culture, 57(1), 280-281. http://ci.nii.ac.jp/ncid/BB1670865X
- Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. https://ci.nii.ac.jp/ncid/BB19363361
Cite this article
-
APA : Usman, H., Mir, S. A., & Attiq-Ur-Rehman. (2023). Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter. Global Legal Studies Review, VIII(II), 16-26. https://doi.org/10.31703/glsr.2023(VIII-II).03
-
CHICAGO : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. 2023. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review, VIII (II): 16-26 doi: 10.31703/glsr.2023(VIII-II).03
-
HARVARD : USMAN, H., MIR, S. A. & ATTIQ-UR-REHMAN. 2023. Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter. Global Legal Studies Review, VIII, 16-26.
-
MHRA : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. 2023. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review, VIII: 16-26
-
MLA : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review, VIII.II (2023): 16-26 Print.
-
OXFORD : Usman, Hazrat, Mir, Showkat Ahmad, and Attiq-Ur-Rehman, (2023), "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter", Global Legal Studies Review, VIII (II), 16-26
-
TURABIAN : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review VIII, no. II (2023): 16-26. https://doi.org/10.31703/glsr.2023(VIII-II).03