پایان نامه با واژه های کلیدی of، and، the، Law

دانلود پایان نامه ارشد

“Cybersecurity and cyberpower”,European Parliament, 2011.
40- Kulesza, Joanna, State responsibility for acts of cyber‐terrorism, UNIVERSITY OF LODZ GigaNet Symposium ,Vilnius, September 13, 2010.
41- Knut Dormann , Computer network attack and international humanitarian law,Article,p:1 ,Para. 5, Extracted from the web site of International Committee of the Red Cross (ICRC) in Decembed 8, 2007.
42- Kostadinov, Dimitar, “Attribution in Cyber Attacks”,2015.
43- Leyden, John, “Israel suspected of ‘hacking’ Syrian air defenses”, Posted in Enterprise Security, 2007.
44-Legal Consequences of the Construction of Wall in the Occupied Palestinian Territory, ICJ Reports , 2004.
45- Ranter. Steven and Jason s. Abrhams , Abrams , Accountability for Human Rights Atrocities in International Law ,j.INT.” L.L, 1997.
46- Rivard, Catherine, RossiT Michael, Is Computer Data “Tangible Property” or Subject to “Physical Loss or Damage”?, Insurance Law Group, 2001
47- Matthew E. Haber , Computer network attack and the Laws of Armed Conflict.
48- Meron, Teodor, Notes and Comments on the Inadeqate Reach of Humanitarian and Human Rights Law and the Need for a New Instrument,AJIL, 1983.
49- Matthew E. Haber , Computer network attack and the Laws of Armed Conflict.
50- M.Rau, “State Liability for Violation of International Humanitarian law” , Max planck institu for Comparative law and public International law, German law Journal ,Vol. 7, No. 7,2004.
51- Malagar, Leo B.;Magdoza-Malagar,Marlo Apalisok,“International Law of Outer Space and the Protection of Intellectual Property Rights”, Boston University, International Law Journal, fall, 1999.
52- Nolte, Gorge, Complicity and the Law of State Responsibility, Cambridge University Press, 2011.
53- Nys, “Development and Formation of International Law” (ptsand II) 6 Am. J. International Law, 1912.
54- Remus, Titiriga ,”Cyber-attacks and International law of armed conflicts; a “jus ad bellum” perspective”, Journal of International Commercial Law and Technology, Vol. 8, No.3, 2013.
55- Olleson, S,” The Impact of the ILC’s Articles on Responsibility of States for Internationally Wrongful Acts, British Institute of International and Comparative Law,2013.
56- Olleson, S,” New State Responsibility Rules and Compliance With Multilateral Obligations, Australian Yearbook of International Law, Vol.22, 2003.
57- Rosenzweig, Paul , A Taxonomy of Cyber War IHL Questions, 2014.
58- Smith. B. D,” State Responsibility and Principle of Joint and Several Liability,10 Yale Journal of International Law, Vol.13,1998.
59- Sanger, David E., “Obama Order Sped Up Wave of Cyberattacks
Against Iran”, 2012.
60- Sklerov, Matthew J., “Solving the Dilemma of State Response to Cyberattacks: A Justification for the Use of Active Defenses against States Who Neglect their Duty to Prevent”, Military Law Review, Vol. 201, 2009.
61- Sharp, Walter Gary, sr., Cyberspace and the use of force, Falls Church,1999.
62- S. K. Verma, “An Introduction to Public International Law”, PHI Learning Pvt. Ltd., 2004.
63- Starr ,Stuart,” Towards an Evolving Theory of Cyberpower”, a Center for Technology and National Security Policy(CTNSP),2009.
64- Shaun Nichols, “The Chinese government is denying any involvement in the reported infiltration of US electric grid systems”, in San Francisco, vnunet.com, 10 Apr 2009.
65- Sultana, Ireen, Sobhan , M. Abdus,Creation of Cross Border Cyber Laws to Combat Cyber Warfare at Regional and Global Levels, Daffodil International University, Dhaka, Bangladesh, 2012.
66- Schmitt, Michael, “Computer network attack and the use of force in international law: thoughts on a normative framework”, Columbia Journal of Transnational Law 37, 1999.
67- Schmitt Michael, “International Law in Cyberspace”, Online:www.harvardilj.org,2012.
68- Sorokin, Gerald L. , Arms, Alliances, and Security Tradeoffs in Deuring Rivalries , International Studies Quarterly,No. 38, March, 1994.
69- Sibohan Gorman and Julian E. Barnes, Cyber Combat: Act of War, Pentagon Sets Stage for U.S. to Respond to Computer Sabotage with Military Force, WASHINGTON, 2011.
70- Vida Antolin-Jenkins, Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places?, 51 NAVAL L. REV. 132, 140, 2008.
71- Yoram, Dinstein ,“Computer Network Attacks and Self-Defense”, International law studies [Symposium on Computer Network Attacks and international law (1999 Naval War College)], vol. 76, 2002.

C) International Instruments

1- Advisory Opinion on the Threat or use of Nuclear Weapons, Para:34.
2- “Case concerning Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. United States of America)”, Judgment of 27 June 1986, (1986) I.C.J. Rep. 14, par. 191,195.
3- Advisory Opinion of 9 July 2004,( Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory) ICJ Reports 2004.
4- Annual Report of International of Red Cross , No.298 , January – February 1994.
5- Anglo-Norwegian Fisheries case, p 131/19.
6- Article 3(2) of United Nations Convention against Transnational Organized Crime, Singed 15 november 2000, entered into force on 29 September 2003.
7- Advance Questions for Lieutenant General Keith Alexander, USA Nominee for Commander, United States Cyber Command’, 2010.
8- BILC,1980.
9- Basic Principles and Guidelines, 2005.
10- Basic principles and Guidelines on The Right to a Remedy and Reparation for Victims of Gross Violations of International Human Rights Law and serious Violations of International Humanitarian Law Adopted and proclaimed by General Assembly Resolution 60/147, 2005.
11- Cyprus v. Turkey,Judgment, No.25781/94,European Court of Human Rights,2001,Para.77.
12- Chorzow Factory Case,( Germany V. Poland) PCIJ Reports, Merit ,Judgment, 1928.
13- Cyber Security Strategy of the United Kingdom – Cabinet Office
14- CyberSecurity Strategy of the United Kingdom safety, security and resilience in cyber space
15- Convention on International Civil Aviation, 61 Stat. 1180, [hereinafter Chicago Convention], 1944.
16- Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation, 24 U.S.T. 564 [hereinafter Montreal Convention],1971.
17- Crawford,James,The International Law Commission’s Articles on State Responsibility: Introduction, Text and Commentaries, Cambridge University Press, 2002.
18- Convention on cyber crime.council of Europe.(2001), http://conventions.coe.int/treaty/en/treatys/html/185.html.
19- Distomo Case:
Rau,Markus , State Liability for Violation of International Humanitarian law , the Distomo Case , German law journal , vo1.o7,No,07,2005.
20- Draft Articles on Responsibility of States for Internationally Wrongful Acts Adopted at 2001.
21- Draft Articles on Responsibility of States for Internationally Wrongful Acts in Report of ILC on the work of Its fifty-third Session, 2001.
22- Declaration on Principles of International Law Concerning Friendly Relations and Cooperation Among States in Accordance with the Charter of the United Nations,G.A. Res:2625,1970.
23- General Assembly Resolution, 56/83, Para,3, Dec, 12, 2001.
24- Gerhard, W, Principles of International Criminal Law, T.M.C Asser Press, Hague, 2005.
25- G.A Resolution: 3281,1974,”The Charter of Economic Rights and Duties of States”.
26- General Assembly Resolution on Principles of International Law Concerning Friendly Relations and Co- Operation among States in accordance with the Charter of the United Nations, 2625(XXV), 24 Oct.1970.
27- ICRC, Weapons that May Cause Unnecessary Suffering or Have Indiscriminate Effects: Report On the Work of Experts, Geneva, 1973.
28- ICRC, Anti-Personnel Landmines – Friend or Foe?, Geneva, mar. 1996.
29- ICRC, Draft Rules for Limitation of Dangers by the Civilian Population in Time of War,Art. 14,1956.
30- ICTY ,Prosecutor V. Anto Furundzija, Case no: IT-95-17/1-T.
31- ICTR, Prosecutor V. Jean Paul Akayesu, Case no:ICTR-96-4-T.
32- ICRC , Improving Compliance With International Humanitarian Law , Background paper Prepared for Informed High –Level Expert Meeting on Current Challenges to International Humanitarian Law , Cambridge , June, 2004.
33- I.C.J., Corfu Channel (United Kingdom of Great Britain and Northern Ireland v. Albania), Merits, separate opinion by Judge Alvarez, 1949.
34- I.C.T.Y., Prosecutor v. Tadic, Case No. IT-94-1-A, I.C.T.Y. App. Ch., 1999.
35- ICTY, The Prosecutor v. Dusko Tadic Decision on the Defense motion for interlocutory appeal on jurisdiction 2 October 1995 , IT-94-1-AR 72, Para. 70, p.37.
36- ICTY, The Prosecutor v. Dusko Tadic Decision on the Defense motion for interlocutory appeal on jurisdiction 2 October 1995 , IT-94-1-AR 72, Para. 119.
37- Kuperskic Case, ICTY Judgment.
38- Kostadinov, Dimitar, “Attribution in Cyber Attacks”,2015.
39- Kalshoven ,F, State Responsibility for War Acts of the Armed Forces-From Article 3 of Hague Convention IV to Article 91 of Additional Protocol I of 1977 and Beyand,I.C.L.Q,1991.
40- Legal Consequences of the Construction of a Wall in Occupied Palestinian Territory.
41- North Sea Continental Shelf, para 174.
42- Nuclear Weapons Case , I.C.J Reports ,1996.
43- Nicaragua Case.
44- Namibia Case , ICJ Reports , 1971.
45- Nicaragua case, para 228 and World Wide Warfare – Jus ad bellum and the Use of Cyber Force, Roscini, p 106.
46- Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, Feb. 24, 1589 U.N.T.S. 474 [hereinafter Montreal Protocol], 1988.
47- Quigley .J.K, Transnational States Responsibility for Violations of International Law, Australian Journal of International Law , vol . 226, 2006.
48- S/RES/1368 (2001) 12 September and S/RES/1373 (2001) 28 September.
49- The Convention and its

پایان نامه
Previous Entries پایان نامه با واژه های کلیدی فضای سایبر، سازمان ملل، حقوق بین‌الملل، توسل به زور Next Entries پایان نامه با واژه های کلیدی پروتکل الحاقی، حقوق بین‌الملل، مخاصمات مسلحانه، کارشناسی ارشد