Cite

1. Beard, Jack M. “Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target under International Humanitarian Law.” Vanderbilt Journal of Transnational Law 47 (2014): 67–143.Search in Google Scholar

2. Bishop, Jonathan. “The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater.” International Journal of Cyber Criminology (IJCC) 7 (2013): 28–48.Search in Google Scholar

3. Brenner, Susan W., and Leo L. Clarke. “Civilians in Cyberwarfare: Conscriptions.” Vanderbilt Journal of Transnational Law 43 (2010): 1011–1076.Search in Google Scholar

4. Brunner, Elgin, Anna Michalkova, Manuel Suter, and Myrian Dunn Cavelty. Focal Report 3: Critical Infrastructure Protection – Cybersecurity – Recent Strategies and Policies: An Analysis, CRN Reports. Zurich: Center for Security Studies, 2009.Search in Google Scholar

5. Clapper, James R. “Worldwide Cyber Threats” (September 10, 2015) https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/clapperopening09102015.pdf.Search in Google Scholar

6. Firnhaber-Baker, Justine. “From God's Peace to the King's Order: Late Medieval Limitations on Non-Royal Warfare.” Essays in Medieval Studies 23 (2006/7): 19–30.10.1353/ems.2007.0002Search in Google Scholar

7. Firnhaber-Baker, Justine. “Introduction: History, historians, and seigneurial war”: 1–23. In: Violence and the State in Languedoc, 1250–1400 (Cambridge: Cambridge University Press, 2014).Search in Google Scholar

8. Gaus, Arthur. “Trolling Attacks and the Need for New Approaches to Privacy Torts.” University of San Francisco Law Review 47 (2012-2013): 353–376.Search in Google Scholar

9. Geers, Kenneth, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015 // https://ccdcoe.org/multimedia/cyber-war-perspective-russian-aggression-against-ukraine.html.Search in Google Scholar

10. Gosnell Handler, Stephanie. “The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare.” Stanford Journal of International Law 48 (2012): 209–237.Search in Google Scholar

11. Grant, John P., and Craig J. Barker. Parry & Grant Encyclopaedic Dictionary of International Law. 3rd ed. Oxford: Oxford University Press, 2009.10.1093/acref/9780195389777.001.0001Search in Google Scholar

12. Greenwald, Glenn. “How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations” // https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/.Search in Google Scholar

13. Hauser, Michael. “Za hranice postmodernismu” (Beyond the Frontiers of Postmodernism): 223–286. In: Roman Kanda, et al., Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016.Search in Google Scholar

14. Hiller, Janine S. “Civil Cyberconflict: Microsoft, Cybercrime, and Botnets.” Santa Clara High Technology Law Journal 31 (2015): 163–214.Search in Google Scholar

15. Kanda, Roman, et al. Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016.Search in Google Scholar

16. Kramer, Franklin D., Stuart H. Starr, Larry K. Wentz, and Daniel T. Kuehl. Cyberpower and National Security. Washington: Potomac Books Inc., 2009.Search in Google Scholar

17. Lee, Dave. “Top US military Twitter feed ‘hacked by Islamic State’.” (January 12, 2015) // http://www.bbc.co.uk/newsbeat/article/30781377/top-us-military-twitter-feed-hacked-by-islamic-state.Search in Google Scholar

18. Lewis, James Andrew. “Compelling Opponents to Our Will: The Role of Cyber Warfare in Ukraine”: 39–47. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.Search in Google Scholar

19. Macková, Veronika. “Cyber War of the States: Stuxnet and Flame Virus Opens New Era of War” // http://cenaa.org/wp-content/uploads/2014/05/Veronika-Mackova-PP-No.-15-2013-Vol.-2.pdfSearch in Google Scholar

20. Margulies, Peter. “Sovereignty and Cyber Attacks: Technology’s Challenge to the Law of State Responsibility.” Melbourne Journal of International Law 14 (2013): 496–519.Search in Google Scholar

21. Masariková, Monika. “Potvrdené. Kyberútoky predmetom článku 5 NATO” (Confirmed. Cyberattacks are subject to Art. 5 NATO) (September 5, 2014) // http://www.cybersec.sk/spravy/politika/potvrdene-kyberutoky-predmetom-clanku-5-nato/.Search in Google Scholar

22. Melková, Michaela, and Tomáš Sokol. “Kybernetický priestor ako nová dimenzia národnej bezpečnosti” (Cyber Space as the New Dimension of the National Security): 54–64. In: Bezpečnostné fórum 2015. Banská Bystrica: Belianum, 2015.Search in Google Scholar

23. Neff, Stephen C. War and the Law of Nations. A General History. Cambridge: Cambridge University Press, 2005.10.1017/CBO9780511494253Search in Google Scholar

24. Nicol, Sarah. “Cyber-bullying and trolling.” Youth Studies Australia 31 (2012): 3–4.Search in Google Scholar

25. O’Connell, Mary Ellen. “Cyber Security without Cyber War.” Journal of Conflict & Security Law 17 (2012): 187–209.10.1093/jcsl/krs017Search in Google Scholar

26. Reich, Pauline C., Stuart Weinstein, Charles Wild, and Allan S. Cabalong. “Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents – and the Dilemma of Anonymity.” European Journal of Law and Technology, 1 (2010): 1–58.Search in Google Scholar

27. Remus, Titiriga. “Cyber-attacks and International law of armed conflict; a ‘jus ad bellum’ perspective.” Journal of International Commercial Law and Technology 8 (2013): 179–189.Search in Google Scholar

28. Rid, Thomas. “Cyber War Will Not Take Place.” The Journal of Strategic Studies 35 (2012): 5–32.10.1080/01402390.2011.608939Search in Google Scholar

29. Roscini, Marco. Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press, 2014.10.1093/acprof:oso/9780199655014.001.0001Search in Google Scholar

30. Schmit, Michael. “Classification of Cyber Conflict.” Journal of Conflict & Security Law 17 (2012): 245–260.10.1093/jcsl/krs018Open DOISearch in Google Scholar

31. Schmitt, Michael N. “Computer network attack and the use of force in international law: thought on a normative framework.” Columbia Journal of Transnational Law 37 (1999): 885–937.10.21236/ADA471993Search in Google Scholar

32. Shackelford, Scott J. “Estonia Two-and-a-Half Years Later: A Progress Report on Combating Cyber Attacks” // https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1499849.Search in Google Scholar

33. Shackelford, Scott J. “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law.” Berkeley Journal of International Law 27 (2009): 192–251.Search in Google Scholar

34. Sharp, Walter Gary. Cyberspace and the use of force. Falls Church, Virginia: Aegis Research Corp., 1999.Search in Google Scholar

35. Šmigová, Katarína. “Kybernetické útoky a medzinárodné právo” (Cyber Attacks and International Law): 1224–1230. In: Bratislavské právnické fórum 2013 (Bratislava Legal Forum 2013). Bratislava: Univerzita Komenského, Právnická fakulta, 2013.Search in Google Scholar

36. Smith, David J. “Russian Cyber Strategy and the War Against Georgia” (January 17, 2014) // http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-and-the-war-against-georgia.Search in Google Scholar

37. Smoleňová, Ivana. “Campaign in the Czech Republic and Slovakia: Types of Media Spreading Pro-Russian Propaganda, their Characteristics and Frequently Used Narratives” // http://www.pssi.cz/download/docs/253_is-pro-russian-campaign.pdf.Search in Google Scholar

38. Stinissen, Jan. “A Legal Framework for Cyber Operations in Ukraine”: 123–134. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.Search in Google Scholar

39. The Economist. “A Cyber-riot” (May 10, 2007) // http://www.economist.com/node/9163598.Search in Google Scholar

40. Valuch, Jozef, Michaela Rišová, and Radoslav Seman. Právo medzinárodných organizácií (The Law of International Organisations). Praha: C. H. Beck, 2011.Search in Google Scholar

41. Vršanský, Peter. “The United Nations Charter entered into force 70 years ago (is the twilight of the United Nations near?).” Slovak yearbook of international law 5 (2015): 6–21.Search in Google Scholar

42. Vršanský, Peter, Jozef Valuch, et al. Medzinárodné právo verejné. Všeobecná časť (Public International Law. The General Part). Bratislava: Eurokódex, 2012.Search in Google Scholar

43. Weber, Max. “Politics as a Vocation” // http://anthropos-lab.net/wp/wp-content/uploads/2011/12/Weber-Politics-as-a-Vocation.pdf.Search in Google Scholar

44. Wirtz, James J. “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy”: 29–37. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.Search in Google Scholar

45. Žižek, Slavoj. Welcome to the Desert of the Real! Five Essays on September 11 and Related Dates. London: Verso, 2002.10.1215/9780822385059-013Search in Google Scholar

1. An Outline for European Cyber Diplomacy Engagement. 9967/4/14 REV 4, DG D 1C, Brussels, September 2014.Search in Google Scholar

2. Australian Government Cyber Security Strategy, 2009 // http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/AG%20Cyber%20Security%20Strategy%20-%20for%20website.pdf.Search in Google Scholar

3. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. JOIN(2013) 1 final, Brussels, 2013.Search in Google Scholar

4. Declaration of Principles of International Law Concerning Friendly Relations and Cooperation among States in Accordance with the Charter of the United Nations. Resolution adopted by the General Assembly on October 24, 1970, Res. 2625 (XXV).Search in Google Scholar

5. ICJ Opinion on Legality of Threat or Use of Nuclear Weapons. July 8, 1996, alinea 39.Search in Google Scholar

6. Koncepcia kybernetickej bezpečnosti Slovenskej republiky (Conception of Cyber Security of the Slovak Republic) // https://lt.justice.gov.sk/Attachment/Vlastn%C3%BD%20materi%C3%A1l_docx.pdf?instEID=-1&attEID=75645&docEID=413095&matEID=7996&langEID=1&tStamp=20150218154455240.Search in Google Scholar

7. Letter dated January 9, 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations, addressed to the Secretary-General. United Nations, General Assembly, A/69/723, 2015.Search in Google Scholar

8. Nicaragua Case (Military and Paramilitary Activities in and against Nicaragua; Nicaragua v. USA). ICJ Reports, 1986, al. 202.Search in Google Scholar

9. Nicaragua v. USA. ICJ Judgment of June 27, 1986, al. 195.Search in Google Scholar

10. Nové hrozby - kybernetické dimenzie (New risks – cyber dimensions). NATO Review // http://www.nato.int/docu/review/2011/11-september/cyber-Threads/SK/index.htm.Search in Google Scholar

11. Report of Independent International Fact-Finding Mission on the Conflict in Georgia. Vol. I., September 2009 // http://echr.coe.int/Documents/HUDOC_38263_08_Annexes_ENG.pdf.Search in Google Scholar

12. Report of the Independent Fact-Finding Mission on the Conflict in Georgia. Vol. II, September 2009 // http://www.mpil.de/files/pdf4/IIFFMCG_Volume_II1.pdf.Search in Google Scholar

13. Report of the Secretary-General's High-level Panel on Threats, Challenges and Change (2004) // http://www.un.org/en/peacebuilding/pdf/historical/hlp_more_secure_world.pdf.Search in Google Scholar

14. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts, A/70/174, July 22, 2015 // http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174.Search in Google Scholar

15. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts (GGE). A/68/98, June 24, 2013.Search in Google Scholar

16. Tallinn Manual – Research. CCDCOE (NATO Cooperative Cyber Defence Centre of Excellence) // https://ccdcoe.org/research.html.Search in Google Scholar

17. Tallinn Manual on the International Law Applicable to Cyber Warfare, 2012.Search in Google Scholar

eISSN:
2029-0454
Language:
English
Publication timeframe:
2 times per year
Journal Subjects:
Law, other, History, Philosophy and Sociology of Law