پایان نامه با واژه های کلیدی کارشناسی ارشد، حقوق بین‌الملل، علامه طباطبایی، جبران خسارت

دانلود پایان نامه ارشد

1393.

ج- پایان نامه و رساله:
1- اقبالی، کیوان؛ تحولات اخير در اصل تفكيك بين رزمندگان و غيررزمندگان در حقوق مخاصمات مسلحانه؛ پایان نامه کارشناسی ارشد، دانشگاه علامه طباطبایی، 1388.
2- برقعی، سید مهدی؛ بررسی حقوقی تهدیدات امنیتی ناشی از حملات سایبری:مورد استاکس نت؛ پایان نامه کارشناسی ارشد، دانشکده روابط بین‌الملل، تهران،1391.
3- حنفیه رجبی، محمد؛ حق توسل به زور در حملات شبکه‌ای رایانه‌ای ؛دانشگاه پیام نور تهران، پایان نامه کارشناسی ارشد، 1387.
4- داعی، علی، حق دادخواهی و جبران خسارت قربانیان نقض های شدید حقوق بین‌الملل بشردوستانه، رساله دکتری، دانشگاه علامه طباطبایی،1390.
5- عقیقی، نگار، جبران خسارت در طرح مسوولیت بین‌الملل دولت‌ها، پایان نامه کارشناسی ارشد، دانشگاه شهید بهشتی،1383.
6- لسانی،حسام الدین،مسئولیت بین‌المللی دولت در قبال الودگی هسته‌ای، پایان نامه کارشناسی ارشد،دانشگاه تهران،1380.
7- محقق ، مصطفی ، مبانی و توسعه مترقیانه حقوق بین‌الملل بشردوستانه، پایان نامه کارشناسی ارشد، دانشکده ی علوم سیاسی و معارف اسلامی دانشگاه امام صادق ( ع ) ، 1374.
8- مظفری، منصور، علل سیاسی عدم ایفای مسئولیت بین‌المللی دولت‌ها در چارچوب کنوانسیون کویت، پایان نامه کارشناسی ارشد، دانشگاه امام صادق (ع)، 1379.
9- یگانه آزاد،صنم، حقوق مخاصمات سایبری، پایان نامه کارشناسی ارشد، دانشگاه شیراز،دانشکده حقوق، 1393.

2-Non Persian Resources
A) Books

1- Brawski, J., “Avoiding War in the Nuclear age”, Westview Press,1986.
2- Brownlie, Ian, International Law and the Use of Force by States, Oxford University Press, 2002.
3- Barboza Julio,” International Criminal Law” ,Collected Courses of the Hague Academy of International Law,vol. 278,1999.
4- Boyle,Alan, “Soft Law in International Law-Making” in: Malcolm D.Evans,(ed) International Law, Oxford, Oxford University Press, 2006.
5- Borrie, John, Randin, Martin, Alternative Approaches in Multilateral Decision Making: Disarmament as Humanitarian Action, UNIDIR Publication, Geneva, 2005.
6- Clarke, Richard, Knake, Robert, Cyber War: The Next Threat to National Security and What to Do about it, New York, Ecco, 2010.
7- Cassese, Antonio,” The Proper Limit of Individual Responsibility uner the Doctrine of Joint Criminal Enterprise”,Journal of International Criminal Justice, vol.5,2007.
8- Crawford,J, The Draft Articles on Responsibility of States for International Wrongful Acts, Cambridge University,P.165 and Commentary Art 17 ,Para . 7, 2002.
9- C.W.Jenks,Liability for Ultra-Hazardous Activities in International Law,RCADI,1994.
10- Ckarl .Josef Partsch,”Humanitarian Law and Armed Conflicts”, Encyclopeia of Public International Law, vol.3, 1982.
11- Dinniss, Harrison, Cyber Warfare and the Laws of War, Cambridge University Press, 2012.
12- DD . Caron,”The Basis of Responsibility : Attribution and Other Trans-Substansive Rule,”lrvington-on-hudson,Transnational Publishers,1998.
13- D’Urso, Maurizio, The Cyber Combatant: a New Status for a New warrior, Philos. Technol, 2015.
14- Dunn, John E., “Stuxnet Details Leaked to Boost Obama, Alleges, 2012.
15- Dunant, Henry, A memory of Solferino ; published by: ICRC, 1986.
16- Gilten, Tom, Extending the Law of War into Cyberspace, 2010.
17- Haley, Andrew G., Space Law and Government, New York, Appleton-Century-Crofts, 1963.
18- Lauter pacht , The Contemporary Practice of the United Kingdom in the Field of International Law , International , Comparative Law Quarterly , Vol.7 ,Part 3 ,1959.
19- Law and Armed, Oxford Institute for Ethics Hosted by Responses, Draft of Arms Trade Treaty, 2010.
20- Malanczuc ,P., “Space Law as a Branch of International Law”, in:L.A.N.M. Barn Hoorn, K.C.Wellens,(Ed.) “Diversity in Secondary Rules and the Unity of International Law”, Martinus Nijhoff Publishers, 1995.
21- Pictet , J , Commentary on the Geneva Convention I of 1949.
22- Roscini, Marco, World Wide Warfare – Jus ad bellum and the Use of Cyber ,Max Planck Yearbook of United Nations Law, Volume 14, 2010.
23- Rex B. Hughes, NATO and Cyber Defence: Mission Accomplished, ATLANTISCH PERSPECTIEF, Apr. 2009.
24- Simma, Bruno, “The Charter of the United Nations: a commentary”, Oxford, 2002.
25- Simma, Bruno, and Andreas Mueller, Exercise and the Limits of Jurisdiction, In: James Crawford, and Martin Koskenniemi, The Cambridge Companion to International Law, Cambridge University Press, 2012.
26- Steve D. Roper and Others, Accountability for Human Right Atrocities in International Law, Oxford University Press,Oxford, 2007.
27- Schwarzenberger. G, International Law as Applied By International Courts and Tribunals vol ii, The Law of Armed Conflict , London. Stevens, 1968.
28- Schwarzenberger G.”A manual of International law” London Stevens & sons,1967.
29- Tsagourias, Nicholas ,Cyber attacks, self-defence and the problem of attribution, Journal of Conflict & Security Law _ Oxford University Press, 2012.
30- The Law of Armed Conflict , London. Stevens, 1968.
31- Wingfield, Thomas, The Law of Information Conflict, 2000.

B) Researches

1- A New Approach to China, THE OFFICIAL GOOGLE BLOG, 2010.
2- Andrea Shalal-Esa, Cyber-attacks “bought us time” on Iran: U.S. sources, WASHINGTON, 2012.
3- Arie Schaap, Cyber Warfare Operations: Development and Use under International Law, The Air Force Law Review 64 ،2009.
4- Betz David,Stevens Tim,” Cyberspace and Sovereignty”, In Cyberspace and the State, Toward a Strategy for Cyber Power, The International institute for Strategic Studies,2011.
5- Barton Gellman, Cyber Attacks by Al Qaeda Feared; Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say, WASH. POST, June 27, 2002, at A01.
6- Belk, Robert and Noyes, Matthew On the Use of Offensive Cyber
Capabilities: A Policy Analysis on Offensive US Cyber Policy, USA: The Office of Naval Research, 2012.
7- Bell,Tom , Polycentric Law in the New Century, “Policy,” publication of The Center for Independent Studies, St Leonards, Australia, Autumn, 1999.
8- CARR, JEFFREY, INSIDE CYBER WARFARE, Sebastopol, CA: O’Reilly Media, 2010.
9- Cassese, Antonio, On the Current Trend towards Criminal Prosecution and Punishment of Breaches of International Humanitarian Law,EJIL,vol.9,No.1,1998.
10- Cheng , General Principle of Law as Applied by International Courts and Tribunal, Cambridge University Press, 1987.
11- Crawford, Emily, Virtual Battlegrounds: Direct Participation in Cyber Warfare, Sydney Law School , Legal Studies Research Paper, No. 12/10, 2012.
12- Cornish, Paul, Livingstone, Clemente , Dave, Yorke ,Claire, On Cyber Warfare,A Chatham House Report ,November 2010.
13- Cheng, Bin, Studies in International Space Law, Clarendon Press, Oxford, 1997.
14- Deels ,Ashley ,”tallin2 and a chinese view on the tallin process” lawfare, 2015.
15- Dunlap, Charles J., “Perspectives for Cyber Strategists on Law for Cyberwar”, Strategic Studies Quarterly, 2011.
16- Evolving Nature of the Problem and Possible the International Proliferation of Conventional Arms-the Conflict, 8 julay 2008.
17- Freeman .M, International Law and Internal Armed Conflicts : Clarifying The Interplay between Human Rights and Humanitarian Protections , Subscribe to The Journal of Humanitarian Assistance 2000.
18- Gellman, Barton, Cyber Attacks by Al Qaeda Feared; Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say, WASH. POST, June 27, 2002.
19- Hollins, Duncan, Why States Need an International Law for Information Operations, 11 LEWIS & CLARK L. REV. 1023, 1042, 2007.
20- General Accounting Office, Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety, 1998.
21- Goldsmith, Jack, What is the Government’s Strategy for the Cyber-exploitation Threat, Lawfareblog.com, Aug. 10, 2011.
22- Gibney , Mark , state Responsibility and The Object and Purpose of the Genocide Convention , International studies Journal , Vol .4 , No.283 , 2007- 8.
23- Gibney, Mark ,Tomasevski . K and Jens Vedsted – Hansen , Transnational State Responsibility for Violation of Human Rights , Harvard Human Rights Journal , Vol . 129 , 1999.
24- Graham, David, Cyber Threats and the Law of War, JOURNAL OF NATIONAL
SECURITY LAW & POLICY, Vol. 4, 2010.
25- Goodin, Dan, “Enemies reduced to ‘hunks of metal and plastic’”, San Francisco Posted in Government, Date:?.
26- Hollis, Duncan, “Could Deploying Stuxnet be a War Crime?”, Available at: http://opiniojuris.org/2011/01/25/could-deploying-stuxnet-be-a-war-crime.
27- Hans-Henrich, Jeschech “The General Principles of International Criminal Law Set Out in Nurmberg, as Mirrored in the ICC Statute”, Journal of International Criminal Justice, Vol.2, 2008.
28- Hortensia D.T.Gutierrez Psse, “The Relationship between International Humanitarian Law and The International Criminal, International Review of the Red Cross(IRRC), Vol.88.
29- Hathaway Oona and Crootof Rebecca, Levitz Philip, “The Law of Cyber Attack”, California Law Review,2012.
30- Icrc, What limits does the law of war impose on cyber attacks?, 2013.
31- Jinks, Derek, State Responsibility for the Acts of Private Armed Groups, The Chicago Journal of International Law, Vol.14, N0.1 2003.
32- Josefson, Ebban,Cyber Warfare and the Concept of Armed Attack, Department of Law at the Gothenburg University, 2012.
33- Jescheck. H. H., War Crimes , E.P.I.L, Vol. 4,1982.
34- JOINT CHIEFS OF STAFF, U.S. DEP’T OF DEF., JOINT PUB. 3-13, INFORMATION OPERATIONS, 2006.
35- Jody Westby, International Guide to Combating Cybercrime, American
Bar Association Publishing, 2003.
36- Kellman, Barry, An International Criminal Law :Approach to Bioterrorism, Harvard Journal, Vol:25, 2001.
37-Komarow, Gary,”Individual Responsibility under International Law: The Nuremberg Principles in Domestic Legal Systems”, International and Comparative Law Quarterly.
38- Kelsey, “Hacking into International Humanitarian Law”, J.D. candidate, May 2008.
39- klimburg, Alexander,

پایان نامه
Previous Entries پایان نامه با واژه های کلیدی فضای سایبر، سازمان ملل، حقوق بین‌الملل، توسل به زور Next Entries پایان نامه با واژه های کلیدی پروتکل الحاقی، حقوق بین‌الملل، مخاصمات مسلحانه، کارشناسی ارشد