Information

Dear user, the application need JavaScript support. Please enable JavaScript in your browser.

Title of the item:

COMPUTER NETWORK OPERATIONS IN THE LIGHT OF IUS IN BELLO

Title:
COMPUTER NETWORK OPERATIONS IN THE LIGHT OF IUS IN BELLO
Authors:
Kaja, Kowalczewska,
Subject:
cyber attack
warfare
international humanitarian law
distinction
Publication date:
2018-08-21
Publisher:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Language:
Undetermined
Rights:
Wszystkie prawa zastrzeżone. Swoboda użytkownika ograniczona do ustawowego zakresu dozwolonego użytku
Source:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2014, 15; 135-143
2299-4033
Data provider:
Biblioteka Nauki
Article
  Go to the source  Link opens in a new window
The paper deals with the legal definition of attack under international humanitarian law, analysed in the context of cyber “attacks”. The armed nature of cyber operation is distinguished from a violent one and therefore special section is devoted to the indirect consequences of cyber attacks. It is also noted that the incremental resort to automated weapon systems, controlled by computer networks still highly vulnerable to hostile malware and interference, challenges the current state of law. Finally, the author attempts to render the linkage between law and IT, both greatly concerned with cyber security.

We use cookies to help identify your computer so we can tailor your user experience, track shopping basket contents and remember where you are in the order process

Feedback

Your views are very important to us and can be enormously helpful in showing us where we can make improvements. We'd be very grateful if you would spend a few minutes completing the short form.

Feedback form