{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:37:32Z","timestamp":1729636652111,"version":"3.28.0"},"reference-count":99,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/cycon.2017.8240333","type":"proceedings-article","created":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T16:32:59Z","timestamp":1514478779000},"page":"1-14","source":"Crossref","is-referenced-by-count":1,"title":["From the vanishing point back to the core: The impact of the development of the cyber law of war on general international law"],"prefix":"10.23919","author":[{"given":"Kubo","family":"Macak","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"141","article-title":"The Militarisation of Cyberspace: Why Less May Be Better","author":"cavelty","year":"2012","journal-title":"2012 4th International Conference on Cyber Conflict"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199655014.003.0006"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1142\/S2377740016500068"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/jcsl\/krs017"},{"key":"ref31","first-page":"19","author":"geers","year":"2011","journal-title":"Strategic Cyber Security"},{"journal-title":"Tallinn Manual","year":"0","key":"ref30"},{"key":"ref37","article-title":"Challenges New Weapons and Humanitarian Assistance Present for International Law","author":"rona","year":"2015","journal-title":"Just Security"},{"journal-title":"&#x2018;International Humanitarian Law and the Challenges of Contemporary Armed Conflicts'","year":"2015","key":"ref36"},{"key":"ref35","first-page":"119","article-title":"Beyond the New &#x201C;Digital Divide&#x201D;: Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity","volume":"50","author":"shackleford","year":"2014","journal-title":"Stanford Journal of International Law"},{"journal-title":"Ibid","year":"0","key":"ref34"},{"journal-title":"Id rules 10-95","year":"0","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139169288"},{"key":"ref29","article-title":"A Warning About Tallinn 2.0 &#x2026; Whatever It Says'","author":"adams","year":"2017","journal-title":"Lawfare"},{"key":"ref20","first-page":"567","article-title":"Considering Our Position: Viewing Information Warfare as a Use of Force Prohibited by Article 2(4) of the U.N. Charter","volume":"30","author":"morth","year":"1998","journal-title":"Case Western Reserve Journal of International Law"},{"journal-title":"International Strategy for Cyberspace Prosperity Security and Openness in a Networked World","first-page":"9","year":"2011","key":"ref22"},{"journal-title":"&#x2018;An Assessment of International Legal Issues in Information Operations'","first-page":"11","year":"1999","key":"ref21"},{"key":"ref24","first-page":"18","author":"tikk","year":"2010","journal-title":"International Cyber Incidents &#x2013; Legal considerations"},{"key":"ref23","article-title":"Estonia removes Soviet-era war memorial after a night of violence","author":"myers","year":"2007","journal-title":"The New York Times"},{"journal-title":"NATO News","article-title":"NATO Opens New Centre of Excellence on Cyber Defence","year":"2008","key":"ref26"},{"journal-title":"Eesti P&#x00E4;evaleht","article-title":"Statement by the Foreign Minister Urmas Paet","year":"2007","key":"ref25"},{"journal-title":"Id 8-10","year":"0","key":"ref50"},{"journal-title":"Id 1-8 and 11-26","year":"0","key":"ref51"},{"key":"ref59","first-page":"408","author":"bothe","year":"1982","journal-title":"New Rulesfor Victims of Armed Conflicts Commentary on the two 1977 Protocols Additional to the Geneva Conventions of 1949"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1017\/S1560775500097741"},{"key":"ref57","first-page":"600","author":"sandoz","year":"1987","journal-title":"Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949"},{"journal-title":"Article 48 AP I","year":"0","key":"ref56"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804700.005"},{"journal-title":"Nuclear Weapons Advisory Opinion","year":"0","key":"ref54"},{"journal-title":"Other conceptual questions at the intersection between the law of war and general international law include the geographical scope of applicability of the law in relation to cyberspace the requirement of organisation in online groups or the problem of calculating proportionality largo sensu in the cyber context","year":"0","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1017\/S0922156502000262"},{"journal-title":"it is highly problematic to apply Law of Armed Conflict to the Georgian cyber attacks - the objective evidence of the case is too vague to meet the necessary criteria of both state involvement and gravity of effect","year":"0","author":"tikk","key":"ref40"},{"key":"ref4","article-title":"DDoS attack that disrupted internet was largest of its kind in history, experts say","author":"woolf","year":"2016","journal-title":"The Guardian"},{"journal-title":"&#x2018;Background to &#x201C;Assessing Russian Activities and Intentions in Recent US Elections&#x201D; The Analytic Process and Cyber Incident Attribution&#x2019;","year":"2017","key":"ref3"},{"key":"ref6","first-page":"4","author":"jennings","year":"2008","journal-title":"Oppenheim's International Law"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2011.608939"},{"key":"ref8","first-page":"260","volume":"i","author":"manuwald","year":"2007","journal-title":"Philippics 3-9"},{"journal-title":"&#x2018;International Law and Stability in Cyberspace&#x2019;","year":"2016","author":"egan","key":"ref49"},{"key":"ref7","first-page":"360","article-title":"The Problem of the Revision of the Law of War","volume":"29","author":"lauterpacht","year":"1952","journal-title":"British Year Book of International Law"},{"journal-title":"The Law of War and Peace in Three Books","year":"1625","author":"grotius","key":"ref9"},{"journal-title":"UN Doc A\/65\/201 (2010) UN Doc A\/68\/98 (2013) UN Doc A\/70\/174","year":"2015","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1017\/9781316822524"},{"journal-title":"But see UN Doc A\/65\/201 (2010) para 7 UN Doc A\/70\/174 (2015) para 28(d)","year":"0","key":"ref48"},{"journal-title":"&#x2018;Developments in the Field of Information and Telecommunications in the Context of International Security","year":"0","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/jcsl\/krt011"},{"key":"ref41","first-page":"817","article-title":"The Law of Cyber-Attack","volume":"100","author":"hathaway","year":"2012","journal-title":"California Law Review"},{"journal-title":"Schmitt (n 41) 698","year":"0","key":"ref44"},{"key":"ref43","article-title":"NATO Cyberwar Challenge: Establish Rules of Engagement","author":"dougherty","year":"2016","journal-title":"CNN"},{"journal-title":"Schmitt","first-page":"199","year":"0","key":"ref73"},{"journal-title":"Tallinn Manual","first-page":"108","year":"0","key":"ref72"},{"journal-title":"Tallinn Manual","first-page":"108","year":"0","key":"ref71"},{"journal-title":"Tallinn Manual","first-page":"108","year":"0","key":"ref70"},{"journal-title":"Booth","first-page":"2","year":"0","key":"ref76"},{"journal-title":"Convention on International Civil Aviation (signed at Chicago on 7 December 1944) 15 UNTS 295 (&#x2018;Chicago Convention&#x2019;) as amended by the Protocol Relating to an Amendment to the Convention on International Civil Aviation (signed at Montreal on 10 May 1984) Article 3bis(a) (&#x2018;every State must refrain from resorting to the use of weapons against civil aircraft in flight&#x2019;","year":"0","key":"ref77"},{"journal-title":"Tallinn Manual","first-page":"108","year":"0","key":"ref74"},{"key":"ref75","first-page":"238","author":"boothby","year":"2016","journal-title":"Weapons and The Law of Armed Conflict"},{"journal-title":"Tallinn Manual 2 0","first-page":"268","year":"0","key":"ref78"},{"journal-title":"Legal Reviews of Weapons and Cyber Capabilities","first-page":"6","year":"2011","key":"ref79"},{"journal-title":"Article 51(2) AP I","year":"0","key":"ref60"},{"journal-title":"Article 51(5)(b) AP I","year":"0","key":"ref62"},{"journal-title":"Article 51(4) AP I","year":"0","key":"ref61"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1017\/S0021223714000260"},{"journal-title":"Schmitt (n 58) 374","year":"0","key":"ref64"},{"journal-title":"&#x2018;Applicability of the Additional Protocols to Computer Network Attacks'","year":"0","author":"d\u00f6rmann","key":"ref65"},{"journal-title":"Schmitt (n 58) 374","year":"0","key":"ref66"},{"journal-title":"The &#x2018;neutralisation&#x2019; of an object is one of the modalities of enemy engagement foreseen by Article 52(2) AP I and therefore the argument goes a form of &#x2018;attack&#x2019;","year":"0","key":"ref67"},{"journal-title":"&#x2018;International Humanitarian Law and the Challenges of Contemporary Armed Conflicts'","year":"2011","key":"ref68"},{"journal-title":"Business Wire","article-title":"Important Security Information for Yahoo Users","year":"2016","key":"ref2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1017\/S1816383114000381"},{"key":"ref1","article-title":"How 2016 Became the Year of the Hack - and What it Means for the Future","author":"wheelwright","year":"2016","journal-title":"The Guardian"},{"journal-title":"Id [79]","year":"0","key":"ref95"},{"journal-title":"Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia","year":"2000","key":"ref94"},{"journal-title":"Press Conference by NATO Spokesman Jamie Shea and Colonel Konrad Freytag SHAPE","year":"1999","key":"ref93"},{"journal-title":"BBC News","article-title":"NATO challenged over Belgrade bombing","year":"2001","key":"ref92"},{"journal-title":"BBC News","article-title":"Bombed Serb TV back on air","year":"1999","key":"ref91"},{"journal-title":"Dinstein","first-page":"8","year":"0","key":"ref90"},{"journal-title":"Tallinn Manual 2 0","first-page":"17","year":"0","key":"ref98"},{"journal-title":"Egan","first-page":"7","year":"0","key":"ref99"},{"journal-title":"&#x2018;TV5Monde Attack Proves Hacking Attribution Is Very Difficult&#x2019;","year":"2015","author":"cluley","key":"ref96"},{"journal-title":"BBC News","article-title":"How France's TV5 was almost destroyed by &#x201C;Russian hackers","year":"2016","key":"ref97"},{"key":"ref10","first-page":"794","volume":"iii","author":"phillimore","year":"1879","journal-title":"International Law"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-90-6704-855-2_4","article-title":"Splendid Isolation: International Humanitarian Law, Legal Theory and the International Legal Order","volume":"14","author":"'donoghue","year":"2011","journal-title":"Yearbook of International Humanitarian Law"},{"journal-title":"ICJ Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory (Advisory Opinion)","article-title":"Nuclear Weapons Advisory Opinion","year":"2004","key":"ref12"},{"journal-title":"General Comment No 31 UN Doc CCPR\/C\/21\/Rev 1\/Add 13","year":"2004","key":"ref13"},{"key":"ref14","first-page":"459","article-title":"&#x2018;International Humanitarian Law and Human Rights Law&#x2019;","author":"happold","year":"2012","journal-title":"Research Handbook on International Conflict and Security Law"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/S0260210500115943"},{"key":"ref16","first-page":"99","article-title":"The International Legal Implications of Information Warfare","volume":"10","author":"aldrich","year":"1996","journal-title":"Airpower J"},{"journal-title":"Egan","first-page":"13","year":"0","key":"ref82"},{"key":"ref17","article-title":"Experts Prepare for &#x201C;An Electronic Pearl Harbor","author":"thomas","year":"1997","journal-title":"CNN"},{"journal-title":"UN Doc A\/57\/166\/Add 1 (29 August 2002) 5","year":"0","key":"ref81"},{"journal-title":"Zero Day","year":"2012","author":"russinovich","key":"ref18"},{"journal-title":"Articles 51(5)(b) 57(2)(a)(iii) and 57(2)(b)API","year":"0","key":"ref84"},{"key":"ref19","article-title":"Does 2016 Mark the End of Cyber Pearl Harbor Hysteria?","author":"lawson","year":"2016","journal-title":"Forbes"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316389591"},{"journal-title":"Tallinn Manual 2 0","first-page":"20","year":"0","key":"ref80"},{"journal-title":"Article 52(2) AP I","year":"0","key":"ref89"},{"journal-title":"&#x2018;The Ethics of Hacking Back&#x2019;","year":"2016","author":"holzer","key":"ref85"},{"journal-title":"See text corresponding to notes 67-68 above","year":"0","key":"ref86"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1017\/S1816383113000246"},{"journal-title":"Schmitt","first-page":"203","year":"0","key":"ref88"}],"event":{"name":"2017 9th International Conference on Cyber Conflict (CyCon)","start":{"date-parts":[[2017,5,30]]},"location":"Tallinn","end":{"date-parts":[[2017,6,2]]}},"container-title":["2017 9th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8211420\/8240317\/08240333.pdf?arnumber=8240333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T16:29:49Z","timestamp":1570552189000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8240333\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":99,"URL":"https:\/\/doi.org\/10.23919\/cycon.2017.8240333","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}