This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.
Costa Rica’ Position on the Application of International Law in Cyberpsace. (2021) // https://docs-library.unoda.org/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdfSearch in Google Scholar
“International humanitarian law and cyber operations during armed conflicts. ICRC position paper submitted to the Open-Ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security and the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security, November 2019.” International Review of the Red Cross Vol. 102, No. 1 (March 2021): 481–492. // DOI: doi.org/10.1017/S1816383120000478Search in Google Scholar
International law and cyberspace. Finland’s national positions. (2020) // https://um.fi/documents/35732/0/KyberkannatPDF_EN.pdf/12bbbbde-623b-9f86-b254-07d5af3c6d85?t=1603097522727Search in Google Scholar
Italian Position Paper on ‘International Law and Cyberspace’. (2021) // https://www.esteri.it/mae/resource/doc/2021/11/italian_position_paper_on_international_law_and_cyberspace.pdfSearch in Google Scholar
Manual of the Law of Armed Conflict. Norway: The Chief of Defence, 2013.Search in Google Scholar
Military Manual on International Law Relevant to the Danish Armed Forces in International Operations. Denmark: Danish Ministry of Defence – Defence Command Denmark, 2016.Search in Google Scholar
Pakistan’s Position on the Application of International Law in Cyberspace. (March 2023) // https://docs-library.unoda.org/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)/UNODA.pdfSearch in Google Scholar
Report of the Inter-American Juridical Committee. Second Report: International Law Applicable to Cyberspace. CJI/doc. 671/22, rev. 2, corr. 1 (October 2022).Search in Google Scholar
Akende, Dapo, Coco, Antonio and de Souza Dias, Talita. “Drawing the Cyber Baseline: The Applicability of Existing International Law to the Governance of Information and Communication Technologies.” International Law Studies 99 (2022): 5–25.Search in Google Scholar
Australian Government. Annex B: Australia’s position on how international law applies to State conduct in cyberspace. (2020) // https://www.internationalcybertech.gov.au/our-work/annexes/annex-bSearch in Google Scholar
Bannelier, Karine. “Is the principle of differentiation still relevant in cyberwarfare? From doctrinal discource to State’s practice”: 426–455. In: Nicholas Tsagourias and Russell Buchan, eds., Research Handbook on International Law and Cyberspace. Cheltenham: Edward Elgar Publishing, 2021.Search in Google Scholar
Benvenisti, Eyal. “The Birth and Life of the Definition of Military Objectives.” International & Comparative Law Quarterly Vol. 71, No. 2 (May 2022): 269–295 // DOI:10.1017/S0020589322000100Search in Google Scholar
Boothby, William H. “Cyber Capabilities”: 85–136. In: William H. Boothby, ed., New Technologies and the Law in War and Peace. Cambridge: Cambridge University Press, 2019.Search in Google Scholar
Čengić, Amir. “Spies”: 656–658. In: Dražan Dukić and Niccolò Pons, eds., The Companion to International Humanitarian Law. Leiden and Boston: Brill-Nijhoff, 2018.Search in Google Scholar
Droege, Cordula. “Get off my cloud: cyber warfare, humanitarian law, and the protection of civilians.” International Review of the Red Cross Vol. 94, No. 2 (June 2013): 533–578. // DOI:10.1017/S1816383113000246Search in Google Scholar
Ega, Brian J. International Law and Stability in Cyberspace, Berkeley Law, 10 November 2016. (November 2016) // https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdfSearch in Google Scholar
Federal Department of Foreign Affairs. Switzerland’s position paper on the application of international law in cyberspace. (2021) // https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdfSearch in Google Scholar
Geiß, Robin, and Lahmann, Henning. “Protection of Data in Armed Conflict.” International Law Studies 97 (2021): 557–572.Search in Google Scholar
Gill, Terry D. “International humanitarian law applied to cyber-warfare: precautions, proportionality and the notion of ’attack’ under the humanitarian law of armed conflict”: 456–469. In: Nicholas Tsagourias and Russell Buchan, eds., Research Handbook on International Law and Cyberspace. Cheltenham: Edward Elgar Publishing, 2021.Search in Google Scholar
Gisel, Laurent, Rodenhäuser, Tilman and Dörmann, Knut. “Twenty years on: International humanitarian law and the protection of civilians against effects of cyber operations during armed conflicts.” International Review Of Red Cross Vol. 102, No. 1 (April 2020): 287–334 // DOI:10.1017/S1816383120000387Search in Google Scholar
Government of Canada. International Law applicable in cyberspace. (2022) // https://www.international.gc.ca/world-monde/issues_development-enjeux_developpement/peace_security-paix_securite/cyberspace_law-cyberespace_droit.aspx?lang=eng#a14Search in Google Scholar
Government of United Kingdom, Foreign Commonwealth & Development Office. Policy Paper. Application of international law to states’ conduct in cyberspace: UK statement. (2021) // https://www.gov.uk/government/publications/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement#international-humanitarian-law-ihlSearch in Google Scholar
Harrison Dinniss, Heather A. “The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives.” Israel Law Review Vol. 48, No. 1 (January 2015): 39–54 // DOI: doi.org/10.1017/S0021223714000272Search in Google Scholar
Henckaerts, Jean-Marie and Doswald-Beck, Louise. Customary International Humanitarian Law – Volume I: Rules. New York: International Committee of the Red Cross – Cambridge University Press, 2005.Search in Google Scholar
ICRC. International humanitarian law and the challenges of contemporary armed conflicts report. Geneva: International Committee of the Red Cross, 2015, 32IC/15/11.Search in Google Scholar
ICRC. Protecting Civilians against Digital Threats during Armed Conflict. Recommendations to States, Belligerents, Tech Companies, and Humanitarian Organizations. Geneva: International Committee of the Red Cross, 2023.Search in Google Scholar
Ireland Department of Foreign Affairs. Position Paper on the Application of International Law in Cyberspace. (2023) // https://www.dfa.ie/media/dfa/ourrolepolicies/internationallaw/Ireland---National-Position-Paper.pdfSearch in Google Scholar
Jančárková, Tatiana and Mačák, Kubo. Regional Consultation of Central and Eastern European States, 8 December 2021, International Humanitarian Law and Cyber Operations During Armed Conflicts. Geneva: International Committee of the Red Cross, 2022.Search in Google Scholar
Mejer Kjelgaard Jeppe and Melgaard, Ulf. “Denmark’s Position Paper on the Application of International Law in Cyberspace.” Nordic Journal of International Law Vol. 94, No. 3, 9–10 // DOI: https://doi.org/10.1163/15718107-20230001Search in Google Scholar
Kis Kelemen, Bence. Célzott likvidálás a nemzetközi jogban – különös tekintettel a felfegyverzett pilóta nélküli repülőgépek alkalmazására (Targeted Killing in International Law with special attention to the use of unmanned aerial vehicles). Pécs: Publikon, 2023.Search in Google Scholar
Kittichaisaree, Kriangsak. Public International Law of Cyberspace. Cham: Springer, 2017.Search in Google Scholar
Lubell, Noam. “Lawful Targets in Cyber Operations: What the Principle of distinction Apply?” International Law Studies 89 (2013): 250–275.Search in Google Scholar
Lumiste, Liina. “Russian Approaches to Regulation Use of Force in Cyberspace.” Baltic Yearbook of International Law Online Vol. 20, No. 1 (December 2022): 109–132 // DOI: doi.org/10.1163/22115897_02001_007Search in Google Scholar
Mačák, Kubo. “Military Objective 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law.” Israeli Law Review Vol. 48, No. 1 (January 2015): 55–80 // DOI: doi.org/10.1017/S0021223714000260Search in Google Scholar
Mačák, Kubo. “Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law.” Israel Law Review Vol. 48, No. 1 (January 2015): 55–80 // DOI: doi.org/10.1017/S0021223714000260Search in Google Scholar
Macák, Kubo. “This is Cyber: 1 + 3 Challenges for the Application of International Humanitarian Law in Cyberspace.” Exeter Centre for International Law Working Paper Series 2/2019 (2019): 1–17.Search in Google Scholar
Mačák, Kubo. “Regional Consultation of Latin American States, 9–10 November 2021, International Humanitarian Law and Cyber Operations During Armed Conflicts.” Geneva: International Committee of the Red Cross, 2022.Search in Google Scholar
McCormack, Tim. “International Humanitarian Law and the Targeting of Data.” International Law Studies 94 (2018): 220–240.Search in Google Scholar
Melzer, Nils. International Humanitarian Law. A Comprehensive Introduction. Geneva: International Committee of the Red Cross, 2016.Search in Google Scholar
Melzer, Nils. Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law. Geneva: International Committee of the Red Cross, 2009.Search in Google Scholar
Melzer, Nils. Targeted Killing in International Law. New York: Oxford University Press, 2008.Search in Google Scholar
Mimran, Tal. “Between Israel and Iran: Middle-East Attitudes to the Role of International Law in the Cyber-Sphere.” Baltic Yearbook of International Law Online Vol. 20, No. 1 (December 2022): 209–235 // DOI: doi.org/10.1163/22115897_02001_011Search in Google Scholar
Ministrè re des Armées. Droit International appliqué aux Opérations dans le Cyberspace. (2019) // https://www.justsecurity.org/wp-content/uploads/2019/09/droit-internat-appliqu%C3%A9-aux-op%C3%A9rations-cyberespace-france.pdfSearch in Google Scholar
Ministry of Foreign Affairs of Japan. Basic Position of the Government of Japan on International Law Applicable to Cyber Operations. (2021) // https://www.mofa.go.jp/files/100200935.pdfSearch in Google Scholar
New Zealand Foreign Affairs & Trade. The Application of International Law to State Activity in Cyberspace. (2020) // https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdfSearch in Google Scholar
Pomson, Ori. “’Objects’? The Legal Status of Computer Data under International Humanitarian Law.” Journal of Conflict & Security Law Vol. 28, No. 2 (January 2023): 349–387 // DOI:doi.org/10.1093/jcsl/krad002Search in Google Scholar
Representaciones Diplomáticas de Cuba en El Exterior. 71 UNGA: Cuba at the final session of Group of Governmental Experts on developments in the field of information and telecommunications in the context of international security. (June 2017) // https://misiones.cubaminrex.cu/en/un/statements/71-unga-cuba-final-session-group-governmental-experts-developments-field-informationSearch in Google Scholar
Roscini, Marco. Cyber Operations and the Use of Force in International Law. Cambridge: Cambridge University Press, 2014.Search in Google Scholar
Sandoz, Yves, Swinarski, Christophe and Zimmermann. Bruno. Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949. Geneva: International Committee of the Red Cross, 1987.Search in Google Scholar
Schmitt, Michael N. “International cyber norms: reflections on the path ahead.” Netherlands Military Law Review 111 (2018): 1–12.Search in Google Scholar
Schmitt, Michael N. “The Notion of ‘Objects‘ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision.” Israel Law Review Vol. 48, No. 1 (March 2015): 81–109 // DOI:10.1017/S0021223714000314Search in Google Scholar
Schmitt, Michael N. “Wired warfare 3.0: Protecting the civilian population during cyber operations.” International Review of Red Cross Vol. 101, No. 1 (April 2019): 333–355 // DOI:10.1017/S1816383119000018Search in Google Scholar
Schmitt, Michael N. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017.Search in Google Scholar
Schöndorf, Roy. Israel’s perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations. (December 2022) // https://www.ejiltalk.org/israels-perspective-on-key-legal-and-practical-issues-concerning-the-application-of-international-law-to-cyber-operations/Search in Google Scholar
Shany, Yuval and Mimran, Tal. “International Regulation of Cyber Operations.” Hebrew University of Jerusalem Legal Studies Research Paper Series 5/2021, (November 2021): 1–24.Search in Google Scholar
The Federal Government of Germany. On the Application of International Law in Cyberspace. Position Paper. (March 2021) // https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b74fb17204c54665bdf0/on-the-application-of-international-law-in-cyberspace-data.pdfSearch in Google Scholar
UNGA. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. (24 June 2013), UN Doc A/68/98.Search in Google Scholar
UNGA. Official compendium of voluntary national contributions on the subject of how international law apply to the use of information and communication technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly 73/266. (13 July 2021), A/76/136*.Search in Google Scholar
Watt, Eliza. State Sponsored Cyber Surveillance. The Right to Privacy of Communications and International Law. London: Edward Elgar, 2021.Search in Google Scholar
Yoo, Christopher S. “Cyber Espionage or Cyberwar? International Law, Domestic Law, and Self-Protective Measures”: 175–194. In: Jens David Ohlin, Kevin Govern and Claire Finkelstein, eds., Cyberwar. Law and Ethics for Virtual Conflicts. Oxford: Oxford University Press, 2015.Search in Google Scholar
Zhu, Lixin and Chen, Wei. “Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Coexistance.” Baltic Yearbook of International Law Online Vol. 20, No. 1 (December 2022): 187–208 // DOI: doi.org/10.1163/22115897_02001_010Search in Google Scholar
Charter of Fundamental Rights of the European Union (adopted 7 December 2000, entered into force 1 December 2009), OJ C 326.Search in Google Scholar
Convention for the Protection of Human Rights and Fundamental Freedoms (adopted 4 November 1950, entered into force 3 September 1953), ETS 005.Search in Google Scholar
Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (adopted 28 January 1981, entered into force 1 October 1985), ETS 108.Search in Google Scholar
International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976), 999 UNTS 171 (ICCPR).Search in Google Scholar
Legality of the Threat or Use of Nuclear Weapons. Advisory Opinion, I.C.J. Reports 1996, p. 226.Search in Google Scholar
Protocol additional to the Geneva Conventions of 12 August 1949, and relating to the protection of victims of international armed conflicts (Protocol I) (adopted 8 June 1977, entered into force 7 December 1979), UNTS 1125 3.Search in Google Scholar
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal, 2016, no. L 119.Search in Google Scholar
Vienna Convention on the Law of Treaties (adopted 23 May 1969, entered into force 27 January 1980), 115 UNTS 331.Search in Google Scholar