International humanitarian law in cyberspace: Ratione materiae, ratione temporis and problem of cyber-attack qualification
The purpose of the article is to analyse problems arising from applying the rules of International Humanitarian Law in cyberspace, particularly the problems of ratione materiae and ratione temporis of this branch of Public International Law in cyberspace. The rapid development of cyber technologies...
| Published in: | Цифровое право |
|---|---|
| Main Author: | S. Y. Garkusha-Bozhko |
| Format: | Article |
| Language: | English |
| Published: |
Цифровое право
2021-04-01
|
| Subjects: | |
| Online Access: | https://www.digitallawjournal.org/jour/article/view/42 |
Similar Items
The Problem of Cyber Espionage in the International Humanitarian Law
by: S. Yu. Garkusha-Bozhko
Published: (2021-03-01)
by: S. Yu. Garkusha-Bozhko
Published: (2021-03-01)
APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS
by: Dan-Iulian VOITAŞEC
Published: (2015-07-01)
by: Dan-Iulian VOITAŞEC
Published: (2015-07-01)
CYBER HOSTILITIES: CIVILIAN DIRECT PARTICIPATION
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01)
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01)
MEANS AND METHODS OF CYBER WARFARE
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01)
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01)
Cyber Sanctions as a Tool of Competition in Global Cyberspace
by: S. I. Balakhonova
Published: (2023-04-01)
by: S. I. Balakhonova
Published: (2023-04-01)
Artificial Intelligence Enabled Cyberspace Security Defense
by: Jia Yan, et al.
Published: (2021-06-01)
by: Jia Yan, et al.
Published: (2021-06-01)
Cyber Diplomacy: A New Frontier for Global Cooperation in the Digital Age
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
From cyber threat to hostile action in cyberspace
by: Adrian Victor VEVERA
Published: (2018-10-01)
by: Adrian Victor VEVERA
Published: (2018-10-01)
Challenges for Ukraine’s cyber security: National dimensions
by: Pavlo Katerynchuk
Published: (2019-12-01)
by: Pavlo Katerynchuk
Published: (2019-12-01)
Cyber hygiene of the digital twin of the civil aviation occupational safety management system in the context of quantum transformation
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
STATE SOVEREIGNTY AND SELF-DEFENCE IN CYBERSPACE
by: Pallavi Khanna
Published: (2018-12-01)
by: Pallavi Khanna
Published: (2018-12-01)
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
by: Aybala Lale Kahraman
Published: (2024-12-01)
by: Aybala Lale Kahraman
Published: (2024-12-01)
The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century
by: Faga Hemen Philip
Published: (2017-06-01)
by: Faga Hemen Philip
Published: (2017-06-01)
HOW THE RUSSIA-UKRAINE WAR MAY CHANGE THE CYBERCRIME ECOSYSTEM
by: Claudia–Alecsandra GABRIAN
Published: (2023-01-01)
by: Claudia–Alecsandra GABRIAN
Published: (2023-01-01)
Integrated Approach to Diagnostics of Failures and Cyber-Attacks in Industrial Control Systems
by: Michał Syfert, et al.
Published: (2022-08-01)
by: Michał Syfert, et al.
Published: (2022-08-01)
A phishing attack awareness framework for a South African University of Technology
by: Japhet M. Kayomb, et al.
Published: (2025-07-01)
by: Japhet M. Kayomb, et al.
Published: (2025-07-01)
Cyber-attack crisis management in the context of energy companies
by: Raissouni Kenza, et al.
Published: (2023-01-01)
by: Raissouni Kenza, et al.
Published: (2023-01-01)
Navigating the digital seas: Legal challenges and global governance of maritime cyber operations
by: Yongming Jin, et al.
Published: (2025-08-01)
by: Yongming Jin, et al.
Published: (2025-08-01)
Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways
by: Suleman Ashraf, et al.
Published: (2021-09-01)
by: Suleman Ashraf, et al.
Published: (2021-09-01)
National security and the challenges of the digital age
by: Lakušić Milovan, et al.
Published: (2022-01-01)
by: Lakušić Milovan, et al.
Published: (2022-01-01)
Activities of modern intelligence services in cyberspace
by: Miljković Milan, et al.
Published: (2016-01-01)
by: Miljković Milan, et al.
Published: (2016-01-01)
Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey
by: Wei Xing, et al.
Published: (2024-06-01)
by: Wei Xing, et al.
Published: (2024-06-01)
RESENHA DE “CYBER CONFLICT: COMPETING NATIONAL PERSPECTIVES”
by: Thiago Correa Malafaia
Published: (2015-05-01)
by: Thiago Correa Malafaia
Published: (2015-05-01)
Security pattern in the cyberspace of the Islamic Republic of Iran with a futuristic approach
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
How to punish cyber criminals: A study to investigate the target and consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan
by: Nadia Khadam, et al.
Published: (2023-12-01)
by: Nadia Khadam, et al.
Published: (2023-12-01)
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01)
by: Luknar Ivana, et al.
Published: (2024-01-01)
Cyber Attacks on Power Grids: Causes and Propagation of Cascading Failures
by: Vetrivel Subramaniam Rajkumar, et al.
Published: (2023-01-01)
by: Vetrivel Subramaniam Rajkumar, et al.
Published: (2023-01-01)
Securing the Required Cyber Defence Capabilities
by: Miroslav Feix, et al.
Published: (2017-12-01)
by: Miroslav Feix, et al.
Published: (2017-12-01)
Cyber security in the Gulf Cooperation Council states Froma Contenmporary geopolitical perspective
by: Ahmed.H. A, et al.
Published: (2020-09-01)
by: Ahmed.H. A, et al.
Published: (2020-09-01)
Cyberspace and Organized Crime: The New Challenges of the 21st Century
by: Atif Ali
Published: (2022-06-01)
by: Atif Ali
Published: (2022-06-01)
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)
by: Zakir Ahmad Sheikh, et al.
Published: (2023-06-01)
by: Zakir Ahmad Sheikh, et al.
Published: (2023-06-01)
PREVENTING CYBER ATTACKS ON CRIRICAL INFRASTRUCTURE: A NEW PRIORITY FOR THE RUSSIAN PUBLIC DIPLOMACY?
by: O. V. Demidov
Published: (2013-10-01)
by: O. V. Demidov
Published: (2013-10-01)
Recent Objectives of Cyber Defence in the Department of Defence
by: Miroslav Feix, et al.
Published: (2017-09-01)
by: Miroslav Feix, et al.
Published: (2017-09-01)
INDIA’S GROWING CYBER PARTNERSHIPS AND CHALLENGES FOR PAKISTAN
by: Ammad Farooq, et al.
Published: (2022-12-01)
by: Ammad Farooq, et al.
Published: (2022-12-01)
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01)
by: Mohammad Sepehri
Published: (2022-02-01)
Development of the Country’s Sustainable Cyberspace Strategy to Ensure the Country’s National Security
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
by: Olena Dobrovolska, et al.
Published: (2024-07-01)
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01)
by: A. V. Vasilyev
Published: (2023-11-01)
Microgrid Cyber-Security: Review and Challenges toward Resilience
by: Bushra Canaan, et al.
Published: (2020-08-01)
by: Bushra Canaan, et al.
Published: (2020-08-01)
Islamic Republic of Iran Army Cyber Offensive Evaluation Model
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
Cyberism: The theory for relationships between human and cyberspace
by: Huansheng NING
Published: (2025-06-01)
by: Huansheng NING
Published: (2025-06-01)
Similar Items
-
The Problem of Cyber Espionage in the International Humanitarian Law
by: S. Yu. Garkusha-Bozhko
Published: (2021-03-01) -
APPLYING INTERNATIONAL HUMANITARIAN LAW TO CYBER-ATTACKS
by: Dan-Iulian VOITAŞEC
Published: (2015-07-01) -
CYBER HOSTILITIES: CIVILIAN DIRECT PARTICIPATION
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01) -
MEANS AND METHODS OF CYBER WARFARE
by: Dan-Iulian VOITAȘEC
Published: (2016-06-01) -
Cyber Sanctions as a Tool of Competition in Global Cyberspace
by: S. I. Balakhonova
Published: (2023-04-01)
