{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:41:02Z","timestamp":1654130462693},"reference-count":20,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>During the last decade international lawyers and IT specialists are brought together to conferences on issues of cyber-security. With various topics covered from such different perspectives, a clash of educations occurs. Lawyers are rarely able to understand the deep technological discussions, while legal presentations might seem too philosophical for the IT professionals, leaving them wondering, what do lawyers want and why. In this environment legal questions that cannot be answered without the deep technological knowledge possessed by the computer experts, should be formulated carefully and very precisely. Therefore, with emphasis on the jus in bello, this article aims to outline a list of issues that inevitably require joint lawyer-IT specialists dialogue and explain their significance from the point of view of international law. These issues include possibilities for digital \u201cmarking\u201d of internationally protected objects online required under the existing humanitarian law, developing a \u201cdistinctive sign\u201d for cyber-combatants, forewarning the enemy of incoming attacks (\u201ccarrying arms visibly\u201d) and re-evaluating the concept of \u201cvicinity\u201d to dangerous installations in the context of cyber-space.<\/p>","DOI":"10.4018\/ijcwt.2013100106","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T14:26:13Z","timestamp":1397053573000},"page":"52-57","source":"Crossref","is-referenced-by-count":0,"title":["What Lawyers Want"],"prefix":"10.4018","volume":"3","author":[{"given":"Yaroslav","family":"Radziwill","sequence":"first","affiliation":[{"name":"University of Warwick, Coventry, UK"}]}],"member":"2432","reference":[{"key":"ijcwt.2013100106-0","unstructured":"BBC. (2011). How does Fukushima differ from Chernobyl? Retrieved from http:\/\/www.bbc.co.uk\/news\/world-asia-pacific-13050228"},{"issue":"1","key":"ijcwt.2013100106-1","first-page":"179","article-title":"A proposal for an international convention to regulate the use of information systems in armed conflict.","volume":"47","author":"D.Brown","year":"2006","journal-title":"Harvard International Law Journal"},{"key":"ijcwt.2013100106-2","unstructured":"conventions & additional protocols, & their commentaries. (n.d.). ICRC. Retrieved from http:\/\/www.icrc.org\/ihl.nsf\/CONVPRES?OpenView"},{"key":"ijcwt.2013100106-3","author":"D.Delibasis","year":"2007","journal-title":"The right to national self-defence in information warfare operations"},{"key":"ijcwt.2013100106-4","unstructured":"Dissenting Opinion of Judge Shahabuddeen. (1996). In Legality of the use or threat of nuclear weapons (Advisory Opinion). ICJ Rep."},{"key":"ijcwt.2013100106-5","unstructured":"Dissenting Opinion of Judge Weeramantry. (1996). In Legality of the use or threat of nuclear weapons (Advisory Opinion). ICJ Rep."},{"key":"ijcwt.2013100106-6","unstructured":"D\u00f6rmann, K. (2004). Applicability of the additional protocols to computer network attacks. ICRC. Retrieved October 2013, from http:\/\/www.icrc.org\/eng\/resources\/documents\/misc\/68lg92.htm"},{"key":"ijcwt.2013100106-7","article-title":"War Crimes, para 2(iv) and (v)","author":"W.Fenrick","year":"1999","journal-title":"Commentary on the Rome statute of the International Criminal Court"},{"key":"ijcwt.2013100106-8","doi-asserted-by":"crossref","unstructured":"Gervais, M. (2011). Cyber attacks and the laws of war. SSRN. Retrieved from http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1939615","DOI":"10.2139\/ssrn.1939615"},{"key":"ijcwt.2013100106-9","author":"L.Green","year":"2000","journal-title":"The contemporary law of armed conflict"},{"key":"ijcwt.2013100106-10","unstructured":"Japan echo. (2011). Three major nuclear accidents: A comparison. Retrieved from http:\/\/japanecho.net\/311-data\/1016\/"},{"key":"ijcwt.2013100106-11","unstructured":"Japan times. (2011). Fukushima health concerns. Retrieved from http:\/\/www.japantimes.co.jp\/text\/ed20111108a1.html"},{"issue":"7","key":"ijcwt.2013100106-12","first-page":"1428","article-title":"Hacking into international humanitarian law: The principles of distinction and neutrality in the age of cyber warfare.","volume":"106","author":"J.Kelsey","year":"2008","journal-title":"Michigan Law Review"},{"key":"ijcwt.2013100106-13","doi-asserted-by":"publisher","DOI":"10.1017\/S0021223700000431"},{"key":"ijcwt.2013100106-14","unstructured":"Melzer, N. (2011). Cyberwarfare and international law. UNIDIR Resources. Retrieved from http:\/\/unidir.org\/pdf\/activites\/pdf2-act649.pdf"},{"key":"ijcwt.2013100106-15","doi-asserted-by":"publisher","DOI":"10.1017\/S1560775500097741"},{"key":"ijcwt.2013100106-16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139169288"},{"issue":"3","key":"ijcwt.2013100106-17","first-page":"192","article-title":"From nuclear war to net war: Analogizing cyber attacks in international law.","volume":"25","author":"S.Shackelford","year":"2009","journal-title":"Berkeley Journal of International Law"},{"key":"ijcwt.2013100106-18","unstructured":"The Guardian. (2011). Nuclear Crises: How do Fukushima and Chernobyl compare? Retrieved from http:\/\/www.guardian.co.uk\/world\/2011\/apr\/12\/japan-fukushima-chernobyl-crisis-comparison"},{"issue":"2","key":"ijcwt.2013100106-19","first-page":"392","article-title":"Combatant status and computer network attack.","volume":"50","author":"S.Watts","year":"2010","journal-title":"Virginia Journal of International Law"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=105192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:07:22Z","timestamp":1654128442000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013100106"}},"subtitle":["Legally Significant Questions that Only IT Specialists can Answer"],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013100106","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}