This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Buchan, R., in Tsagourias, N., 2022. ‚Ukrainian ‘IT Army‘: A Cyber Levée en Masse or Civilians Directly Participating in Hostilities?‘. https://www.ejiltalk.org/ukranian-it-army-a-cyber-levee-en-masse-or-civilians-directly-participating-in-hostilities/ (26. 2. 2024).Search in Google Scholar
Connell, M., in Vogler, S., 2016. Russia’s Approach to Cyber Warfare, CNA’s Occasional Paper series, https://apps.dtic.mil/sti/pdfs/AD1019062.pdf (28. 2. 2024).Search in Google Scholar
Department of Defense, 2021. Dictionary of Military and Associated Terms, https://www.supremecourt.gov/opinions/URLs_Cited/OT2021/21A477/21A477-1.pdf (28. 2. 2024).Search in Google Scholar
Dinstein, Y., in Willy, D. A., 2020. Oslo Manual on Select Topics of the Law of Armed Conflict: Rules and Commentary. Springer.Search in Google Scholar
Doffman, Z., 2019. Israel Responds to Cyber Attack with an Air Strike on Cyber Attackers in World First. Forbes, 6. maj, https://www.forbes.com/sites/zakdoffman/2019/05/06/israeli-military-strikes-and-destroys-hamas-cyber-hq-in-world-first/?sh=50d4edacafb5 (26. 2. 2024).Search in Google Scholar
Döge, J., 2010. Cyber Warfare Challenges for the Applicability of the Traditional Laws of War Regime. Archiv des Völkerrechts, 48(4), str. 486–501.Search in Google Scholar
Droege, C., 2012. Get off my Cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross, 94(886), str. 533–578.Search in Google Scholar
Geiß, R., in Lahmann, H., 2012. Cyber Warfare: Applying the Principle of Distinction in an Interconnected Space. Israel Law Review, 45(3), str. 381–399.Search in Google Scholar
Generalna skupščina Združenih narodov, (2015). The United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, Report 2015 (A/70/174). Z dne 22. julija 2015.Search in Google Scholar
Generalna skupščina Združenih narodov, (2021). OEWG Final Substantive Report (A/AC.290/2021/CRP.2). Z dne 10. marca 2021.Search in Google Scholar
Goodman, R., in Jinks, D. P., 2010. The ICRC Interpretive Guidance on the Notion of Direct Participation in Hostilities Under International Humanitarian Law: An Introduction to the Forum, New York University International Law and Politics, 42, str. 637–640.Search in Google Scholar
Harrison Dinniss, H., 2013. Participants in Conflict: Cyber warriors, patriotic hackers and the laws of war. V: D. Saxon, ur. International Humanitarian Law and the Changing Technology of War, str. 251–278. Leiden: Boston: Martinus Nijhoff Publishers.Search in Google Scholar
Hathaway, O. idr., 2011. The Law of Cyber-Attack. California Law Review, 100, str. 817–886.Search in Google Scholar
Henckaerts, J., in Doswald-Beck, L., 2009. Customary International Humanitarian Law, Vol. 1 – Rules. Cambridge: Cambridge University Press.Search in Google Scholar
Human Rights Watch, 2003. International Humanitarian Law Issues in a Potential War in Iraq. Human Rights Watch Briefing Paper. Washington DC.Search in Google Scholar
ICRC, 2013. Cyberwarfare and international humanitarian law: the ICRC‘s position, https://www.icrc.org/en/doc/assets/files/2013/130621-cyberwarfare-q-and-a-eng.pdf (28. 2. 2024).Search in Google Scholar
ICRC, 2020. Avoiding Civilian Harm from Military Cyber Operations During Armed Conflicts: ICRC Expert Meeting, 21–22 January 2020, Geneva, https://shop.icrc.org/avoiding-civilian-harm-from-military-cyber-operations-during-armed-conflicts-icrc-expert--meeting-21-22-january-2020-geneva-pdf-en (27. 2. 2024).Search in Google Scholar
ICRC, 2021. Commentary on the Third Geneva Convention: Convention (III) relative to the Treatment of Prisoners of War. Cambridge: Cambridge University Press.Search in Google Scholar
ICRC, 2022. Digitalizing the Red Cross, Red Crescent and Red Crystal Emblems: Benefits, Risks, and Possible Solutions. ICRC, Ženeva.Search in Google Scholar
ICRC, 2023. Preventing and minimizing digital threats to people affected by armed conflict, Draft Elements of Resolution, November 2023. ICRC, Ženeva.Search in Google Scholar
International Court of Justice (ICJ), 1996. Legality of the Threat or Use of Nuclear Weapons (Advisory Opinion). I.C.J. Reports, 226.Search in Google Scholar
International Criminal Tribunal for the Former Yugoslavia (ICTY), 1995. The Prosecutor v. Dusko Tadić, IT-94-1-AR72 (Appeals Chamber, Decision).Search in Google Scholar
International Criminal Tribunal for the Former Yugoslavia (ICTY), 2000. Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia. International Legal Materials, 39(5), str. 1257–1283.Search in Google Scholar
Matheson, C., 2019. From Munitions to Malware: A Comparative Analysis of Civilian Targetability in Cyber Conflict. Journal of Law & Cyber Warfare, 7(2), str. 29–66.Search in Google Scholar
Mavropoulou, E., 2015. Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks. Journal of Law & Cyber Warfare, 4(2), str. 23–93.Search in Google Scholar
Melzer, N., 2009. Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law. International Committee of the Red Cross (ICRC), Ženeva.Search in Google Scholar
Microsoft, 2022. Microsoft Digital Defense Report 2022. https://www.microsoft.com/en--us/security/business/microsoft-digital-defense-report-2022 (27. 2. 2024).Search in Google Scholar
Nash, K. S., Castellanos, S., in Janofsky, A., 2018. One Year After NotPetya Cyberattack, Firms Wrestle with Recovery Costs. The Wall Street Journal, https://www.wsj.com/articles/one-year-after-notpetya-companies-still-wrestle-with-financial-impacts-1530095906 (27. 2. 2024).Search in Google Scholar
Padmanabhan, V. M., 2013. Cyber Warriors in the Jus in Bello. International law studies, 288(89), str. 288–308.Search in Google Scholar
Pascucci, C., 2017. Distinction and Proportionality in Cyber War: Virtual Problems with a Real Solution. Minnesota Journal of International Law, 26(1), str. 419–460.Search in Google Scholar
Protokol o prepovedih ali omejitvah uporabe zažigalnih orožij, Uradni list Socialistične Federativne Republike Jugoslavije, Mednarodne pogodbe, št. 3/82.Search in Google Scholar
Sancin, V., Švarc, D., in Ambrož, M., 2009. Mednarodno pravo oboroženih spopadov. Ljubljana: Poveljstvo za doktrino, razvoj, izobraževanje in usposabljanje.Search in Google Scholar
Schmitt, M. N., 2015. The Law of Cyber Targeting. Naval War College Review, 68(2), Article 3, str. 1–20.Search in Google Scholar
Schmitt, M. N., 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, 2. izd. Cambridge: Cambridge University Press.Search in Google Scholar
Second International Peace Conference, The Hague, 1907. Hague Convention (IV) Respecting the Laws and Customs of War on Land and Its Annex: Regulations Concerning the Laws and Customs of War on Land. International Conferences (Haag), z dne 18. oktobra 1907.Search in Google Scholar
Shanghai Cooperation Organisation, 2009. Agreement on Cooperation in Ensuring International Information Security. Jekaterinburg, 16. junija.Search in Google Scholar
Šarf, P., 2017. Legality of Low-Intensity Cyber Operations Under International Law. Sodobni vojaški izzivi, 19(3), str. 81–93.Search in Google Scholar
Štrucl, D., 2022. Russian Aggression on Ukraine: Cyber Operations and the Influence of Cyberspace on Modern Warfare. Sodobni vojaški izzivi, 24(2), str. 103–123.Search in Google Scholar
Thurau, J., 2022. Germany‘s Critical Infrastructure Is Poorly Protected. DW, https://www.dw.com/en/germanys-critical-infrastructure-is-poorly-protected/a-63505983 (26. 2. 2024).Search in Google Scholar
Turns, D., 2012. Cyber Warfare and the Notion of Direct Participation in Hostilities. Journal of Conflict and Security Law, 17, str. 279–297.Search in Google Scholar
Ur. l. SFRJ, 1978. Dopolnilni protokol k ženevskim konvencijam z dne 12. avgusta 1949 o zaščiti žrtev mednarodnih oboroženih spopadov, z dne 8. junija 1977 (DP-I), mednarodne pogodbe, št. 16/78.Search in Google Scholar
van Benthem, T. J., 2023. Privatized Frontlines: Private-Sector Contributions in Armed Conflict. 15th International Conference on Cyber Conflict: Meeting Reality (CyCon), Talin, Estonija, str 55–69. DOI: 10.23919/CyCon58705.2023.10182177.Search in Google Scholar
Wallace, D. A., in Reeves, S., 2013. The Law of Armed Conflict‘s ‚Wicked‘ Problem: Levée En Masse in Cyber Warfare. International Law Studies, 89, str. 646–668.Search in Google Scholar
Združeno kraljestvo, 2020. Response to Chair’s Initial ‘Pre-draft’ of the Report of the OEWG on Developments in the Field of Information and Telecommunications in the Context of International Security, April 2020.Search in Google Scholar
Ženevska konvencija o ravnanju z vojnimi ujetniki, z dne 12. avgusta 1949. (1950). Ur.l. Prezidijuma LS FLRJ, št. 6/50.Search in Google Scholar