English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113656/144643 (79%)
Visitors : 51713389      Online Users : 309
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/152507


    Title: 國際法下網路空間中的國家網路行動可課責性---Stuxnet案例
    State Cyber Operations Accountability in Cyberspace under International Law: The Case of Stuxnet
    Authors: 司馬法
    Pratama, Naufal Bagus
    Contributors: 陳貞如
    Chen, Chen-Ju
    司馬法
    Naufal Bagus Pratama
    Keywords: 網絡空間
    網絡攻擊
    網絡戰爭
    使用武力
    國家責任
    Stuxnet
    Cyberspace
    Cyber Attack
    Cyber Warfare
    Use of Force
    State Responsibility
    Stuxnet
    Date: 2024
    Issue Date: 2024-08-05 12:33:19 (UTC+8)
    Abstract: 網路空間被稱為所謂的「第五」戰爭領域,國家可以透過它進行敵對行動,故現已成為國際關係的重要舞台。儘管國家和法律專家都網路領域應該受到國際法約束,但由於缺乏專門規範國家網路行為的國際網路法,如何應用這些法律和規範仍然是一個挑戰。此外,透過網路空間進行的國家活動可以輕易匿名進行,並且很難追溯到任何特定的行為者。例如2010年Stuxnet事件,其展示了在網路環境中嘗試應用現行法律的難題。Stuxnet是一次前所未有的網路攻擊,導致了實際的物理破壞,襲擊並癱瘓了伊朗的核設施。Stuxnet被認為是首次將網路武器化,即網路戰爭時代的開端。然而,該事件並沒有被正式歸咎於任何一方,也沒有任何一方聲稱對此負責。目前,隨著地區緊張局勢的發展,類似Stuxnet的網路攻擊可能再次發生。因此,透過利用規範性法律研究和使用二手資料來回答研究問題,本論文將分析國家應如何根據現行國際法對其網路行動承擔責任,特別參考2010年Stuxnet惡意軟體攻擊事件。本研究認為,即使國際法適用於網路空間,但應用於網路領域時仍然存在挑戰,因此敦促國家保持一致的做法,並呼籲建立一部規範國家行為者在網路空間活動的國際條約。
    Cyberspace is being referred to as the so-called "fifth" domain of war, enabling the conduct of hostilities through it and now is a key arena for international relations, including cyber warfare in conflicts among states. Although states and legal experts agree that international laws and norms apply to the cyber domain, yet with the absence of a cyber-specific international law that governs the State's operations within cyberspace, it is still a challenging task to apply it. Moreover, State activities conducted through cyberspace could easily be done anonymously and very hard to attribute to any particular actors. The Case of Stuxnet 2010 is a perfect example of the conundrum in terms of attempting the application of the prevailing laws to the cyber context. Stuxnet was an unprecedented cyber-attack that caused physical destruction, which hit and crippled Iranian nuclear facilities and is considered as the first utilization of cyber-weapon and referred to as the very dawn of the age of the cyber war. Yet, It was left officially unattributed, and no parties claimed responsibility. Currently, with the development of the tensions within the region, the possibility of “another” Stuxnet is present. Therefore, by utilizing normative legal research and the use of secondary data to answer the research question, this thesis will analyze how states should be held accountable for their cyber operations with the application of the existing international law, with special reference to the case of the Stuxnet malware attack 2010. The thesis concludes that, even though international law applies to the realm of cyberspace, it poses challenges in its application to the cyber realm and therefore urges consistent state practices and calls for an international treaty on the State’s operations in cyberspace to be established.
    Reference: Additional Protocol I, 1977, The Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts
    Adam Segal, 2014, "Axiom and the Deepening Divide in US – China Cyber Relations", Net Politics and Digital and Cyberspace Policy Program, Council on Foreign Relations, https://www.cfr.org/blog/axiom-and-deepening-divide-us-china-cyber-relations
    Ademola Abass, 2011, Complete International Law, New York, Oxford University Press, p.240.
    Advisory Service, 2004, What is International Humanitarian Law?, International Committee of Red Cross and Red Crescent (ICRC)
    Al Jazeera Staff, 2024, Iran attacks Israel with over 300 drones, missiles: What you need to know, Al Jazeera, https://www.aljazeera.com/news/2024/4/14/iran-attacks-israel-with-over-300-drones-missiles-what-you-need-to-know, accessed on 22 May 2024
    Andrew C. Foltz, 2012, "Stuxnet, “Schmitt Analysis,” And The Cyber “Use Of Force” Debate", Joint Force Quarterly, Issue 67, 4th Quarter
    Andrew Luzzatto, 2022, "Regulating Cyber Warfare Through the United Nations", The Cyber Defense Review
    Andy Greenberg, 2012, ‘What Stuxnet’s Exposure As An American Weapon Means For Cyberwar’, Forbes, https://www.forbes.com/sites/andygreenberg/2012/06/01/what-stuxnets-exposure-as-an-american-weapon-means-for-cyberwar/?sh=72f8879254c3, accessed on 20 May 2024
    Annegret Bendiek and Matthias Schulze, 2021, "Attribution: A Major Challenge for EU Cyber Sanctions: An Analysis of WannaCry, NotPetya, Cloud Hopper, Bundestag Hack and the Attack on the OPCW", SWP Research Paper, No. 11, Stiftung Wissenschaft und Politik (SWP), Berlin
    Anonymous, 2010, Debate Rages Over Iran's Nuclear Capability, Intentions, https://www.voanews.com/a/debate-rages-over-irans-nuclear-capability-intentions-91529714/116150.html, accessed on 19 May 2024
    Anonymous, 2024, Iran’s President Ebrahim Raisi confirmed dead in helicopter crash, Aljazeera, https://www.aljazeera.com/news/2024/5/20/rescuers-say-no-sign-of-life-as-wrecked-helicopter-of-irans-raisi-found, accessed on May 20, 2024
    Anonymous, 2024, Iran president and foreign minister killed in crash, BBC, https://www.bbc.com/news/articles/cpwwql21747o, accessed on May 20, 2024
    Articles on Responsibility of States for Internationally Wrongful Acts, with commentaries, 2001
    Author, 2011, Iran accuses Siemens over Stuxnet virus attack, Reuters, https://www.reuters.com/article/idUSTRE73G0NB/, accessed on 20 May 2024
    Author, 2012, ‘Critical Analysis: Stuxnet Leaks: More than a Domestic Political Affair Denver Journal of International Law & Policy, https://djilp.org/critical-analysis-stuxnet-leaks-more-than-a-domestic-political-affair/, accessed on 20 May 2024
    Brian M. Mazanec and Bradley A. Thayer, 2015, Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace, Palgrave Macmillan
    Bruce Schneier, 2010, The Story Behind The Stuxnet Virus, Forbes, https://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-worm.html?sh=869bdeb51e83, Accessed on 19 May 2024
    Charter of the United Nations, 1945
    Chen, T. & Abu-Nimeh, S, 2011, "Lessons from Stuxnet", Computer, Vol. 44, No. 4
    Chimène I Keitner, 2019, 'Attribution by indictment', American Journal of International Law Unbound, Vol. 113
    Christian Payne & Lorraine Finlay, 2017, "Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack", The Geo. Wash. Int’l L. Rev, Vol. 49
    Compendium of statements in explanation of position on the final report, 2021, Document A/AC.290/2021/INF/2
    Cordula Droege, 2012, "Get off my cloud: Cyber warfare, international humanitarian law, and the protection of civilians", International Review of the Red Cross, Vol. 94, No. 886
    Corfu Channel, Merits, ICJ Reports, 1949, p. 4, at p. 23
    Constantine Antonopoulos, 2015, “State Responsibility In Cyberspace”, Research Handbook On International Law And Cyberspace, Chapter 3, pages 55-71, Edward Elgar Publishing.
    Cyberspace, Glossary, Tallinn Manual 2.0
    Cyber Operations, Glossary, Tallinn Manual 2.0
    Damien McGunniess, “How a Cyber-attack Transformed Estonia”, https://www.bbc.com/news/39655415, accessed on 3 May 2023
    Daniel T. Kuehl, 2009, "CH 2: From Cyberspace to Cyberpower: Defining the Problem", Cyberpower and National Security, Potomac Books, Inc
    Dan Williams, 2010, EXCLUSIVE-Cyber takes centre stage in Israel's war strategy, Reuters, https://web.archive.org/web/20101001091330/http://www.alertnet.org/thenews/newsdesk/LDE68R0GB.htm, accessed on 20 May 2024
    Danae Azaria, 2020, ‘Codification by Interpretation’: The International Law Commission as an Interpreter of International Law, The European Journal of International Law, Vol. 31 no. 1
    David E. Graham, 2010, “Cyber Threats and the Law of War”, Journal Of National Security Law & Policy, Vol. 4, No. 87
    David E. Singer, 2012, "Obama Order Sped Up Wave of Cyberattacks Against Iran", The New York Times, https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html, accessed on 8 May 2024
    David Graham, 2010, ‘Cyber Threats and the Law of War’, Journal of National Security Law and Policy, Vol. 87, No. 91
    David Kushner, 2024 ‘The Real Story of Stuxnet’, IEEE Spectrum, https://spectrum.ieee.org/the-real-story-of-stuxnet, accessed on 20 May 2024
    Dawan Mohammed Jaza, 2019, "The Nature of International Responsibility of States in the Contemporary World Arena", Journal of University of Human Development (JUHD), Vol. 5, No. 4
    Declaration on the Inadmissibility of Intervention into the Domestic Affairs of States and the Protection of Their Independence and Sovereignty, 1965, U.N. GA Res 2131(XX)
    Dr Jakob Kellenberger, 2012, “International Humanitarian Law and New Weapon Technologies: 34th Round Table on current issues of international humanitarian law”, International Review of the Red Cross, Vol. 94, No. 886
    Duncan Hollis, 2007, ‘Why States Need an International Law for Information Operations’, Lewis & Clark Law Review, Vol. 11, No. 4
    Elinor Mills, 2010, “Stuxnet: Fact vs. theory”, CNET, https://www.cnet.com/news/privacy/stuxnet-fact-vs-theory/, accessed on 19 May 2024
    Eric Talbot Jensen, 2017, "The Tallinn Manual 2.0: Highlights And Insights", Georgetown Journal Of International Law
    Eugenio Lilli, 2021, "Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence", Contemporary Security Policy, Vol. 42, No. 2
    Evan Andrews, “Who Invented the Internet?”, https://www.history.com/news/who-invented-the-internet, accessed on 20 October 2023
    Final Report, 2015, Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, Document A/70/174
    Final Substantive Report, 2021, Open-ended working group on developments in the field of information and telecommunications in the context of international security, Document A/AC.290/2021/CRP.2
    Flashpoint Intel Team, 2024, "Amid Escalating Iran-Israel Conflict, Understanding the Hybrid Nature of Cyber Threats", https://flashpoint.io/blog/iran-israel-conflict-cyber-threats/, accessed on 22 May 2024
    François Delerue, 2020, Cyber Operations and International Law, "State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation", Cambridge University Press, p. 381-421.
    Gabcikovo-Nagymaros Project (Hungary/Slovakia), ICJ Reports, 1997, p. 7. At p. 38, para. 47
    Gaby Portnoy, 2024, "Head of the Israel National Cyber Directorate Gaby Portnoy at the Cybertech Conference: The intensity of cyber attacks has increased threefold during the war", Israel National Cyber Directorate, https://www.gov.il/en/pages/cyber_tech_2024, accessed on 22 May 2024
    General Assembly Resolution, 1990, U.N. Doc. A/RES/45/121
    General Assembly Resolution, 2001, Responsibility of States for Internationally Wrongful Act, A/RES/56/83
    General Assembly Resolution, 2001, U.N. Doc. A/RES/55/63
    General Assembly Secretary-General, 2022, Report on Responsibility of States for internationally wrongful acts Compilation of decisions of international courts, tribunals and other bodies, A/77/74
    General Commentary, 2001, Draft articles on Responsibility of States for Internationally Wrongful Acts, with commentaries
    Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field, 1949
    Gregory Gromov, 2012, “History of Internet and World Wide Web - Roads and Crossroads of the Internet History”, http://www.netvalley.com/, accessed on 20 October 2023
    Hancock, Beverly, 2002, An Introduction to Qualitative Research, Leicester, Trent Focus Group
    Heather Harrison Dinniss, 2012, Cyber Warfare and the Laws of War, Cambridge University Press
    Herbert S. Lin, 2010, Offensive Cyber Operations and the Use of Force, National Security Law & Policy, Vol. 4, No. 1
    Hugo Grotius, 1965, De Jure Belli Ac Pacis
    John Markoff, “Before the Gunfire, cyberattacks”, https://www.nytimes.com/2008/08/13/technology/13cyber.html, accessed on 3 May 2023
    ICJ, 1949, The Corfu Channel Case (UK v. Albania)
    ICJ, 1986, Military and Paramilitary Activities in and against Nicaragua (Nicar. v. U.S.)
    ICJ, 1996, Advisory Opinion, Legality of the Threat or Use of Nuclear Weapons
    ICJ, 2007, Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), Merits.
    ICRC Position Paper, 2020, “International humanitarian law and cyber operations during armed conflicts”, International Review of the Red Cross, Vol. 102, No. 913
    ICRC, 2004, "What is International Humanitarian Law?", Advisory Service on International Humanitarian Law
    ICTY, 2000, Judgement, The Prosecutor v.Kupreškić et al.
    Ido Kilovaty, 2014, "Cyber Warfare and the jus Ad Bellum Challenges: Evaluation in the Light of the Tallinn Manual on the International Law Applicable to Cyber Warfare", American University National Security Law Brief, Vol. 5, Issue 1
    International Criminal Tribunal for the Former Yugoslavia, 1999, Prosecutor v. Tadić, Case No. IT-94–1-A, Judgment, para. 120
    International Law Commision, 1970, Yearbook of the International Law Commission, Volume II
    International Law Commission, Historical Antecedents, https://legal.un.org/ilc/ilcintro.shtml
    J. Crawford, 2002, The International Law Commission's Articles on State Responsibility: Introduction, Text, and Commentaries, Cambridge University Press, p. 140.
    Jakub Vostoupal, 2024, “Stuxnet vs WannaCry and Albania: Cyber-Attribution on Trial”, available at SSRN: https://ssrn.com/abstract=4729496
    James P. Farwell and Rafal Rohozinski, 2011, “Stuxnet and the Future of Cyber War”, Survival, Vol. 53. No.1
    Jarno Limnéll, Thomas Rid, 2014, “Is Cyberwar Real? Gauging the Threats”, Foreign Affairs, Vol. 93, No. 2, p. 166-168.
    Jason Barkham, 2002, Information Warfare And International Law On The Use Of Force, International Law And Politics, Vol. 34, No. 57
    Jean S. Pictet, 1952, Commentary On The Geneva Convention For The Amelioration Of The Condition Of The Wounded And Sick In Armed Forces In The Field
    Jeremy Richmond, 2012, "Evolving Battlefields: Does Stuxnet Demonstrate a Need for Modifications to the Law of Armed Conflict," Fordham International Law Journal, Vol.35, No. 3, 842-894.
    Jeremy Wright, 2018, "The UK Attorney General, Speech Delivered at Chatham House, London: Cyber and International Law in the 21st Century", Attorney General's Office, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century, accessed on 6 March 2024
    JN Sakellariadis, 2022, Extending the ‘Attribution Problem’: Why Who-Based Attribution Is Insufficient to Deterring Cyberattacks, Journal of Information Warfare
    Joby Warrick, 2011, Iran Touts Major Advances in Nuclear Program, The Washington Post, https://www.washingtonpost.com/world/iran-touts-major-advances-in-nuclear program/2011/04/11/AFZ8cxMD_story.html, accessed on 19 May 2024
    John Arquilla, 2013, ‘Twenty Years of Cyberwar’, Journal of Military Ethics
    John P Carlin, 2016, ‘Detect, disrupt, deter: A whole government approach to national security cyber threats’, Harvard National Security Journal, Vol. 7
    John Richardson, 2011, “Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield”, Journal Of Computer & Information Law, Vol. 29, No. 1
    John Richardson, 2011, Stuxnet as cyberwarfare: applying the law of war to the virtual battlefield, John Marshall Journal of Computer and Information Law, Vol. 29(1), 1-28.
    Joint Publication 1-02, 2017, Department of Defense Dictionary of Military and Associated Terms
    Jon Gambrell, 2024, "Iran’s supreme leader tacitly acknowledges that Tehran hit little in its attack on Israel", AP, https://apnews.com/article/iran-israel-khamenei-mideast-66280e717d335afffd9e258a5985d50c, accessed on 22 May 2024
    Jon Gambrell, 2024, Iran’s President, Foreign Minister And Others Found Dead At Helicopter Crash Site, State Media Says, APNews, https://apnews.com/article/iran-president-ebrahim-raisi-426c6f4ae2dd1f0801c73875bb696f48, accessed on May 20, 2024
    Josh Fruhlinger, 2022, ‘Stuxnet Explained: The First Known Cyberweapon’, CSO, https://www.csoonline.com/article/562691/stuxnet-explained-the-first-known-cyberweapon.html, accessed on 20 May 2024
    Jutta Brunnée, 2005, “International Legal Accountability Through the Lens of the Law of State Responsibility”, Netherlands Yearbook of International Law, Vol. 36
    Karine Bannelier and Théodore Christakis, 2017, Cyber-Attacks. Prevention-Reactions: The Role of States and Private Actors, Les Cahires de la Revue Défense Nationale
    Keir Giles and Kim Hartmann, 2019, “Silent Battle” Goes Loud: Entering a New Era of State-Avowed Cyber Conflict’, 11th International Conference on Cyber Conflict: Silent Battle, NATO CCD COE Publications, Tallinn
    Kim Zetter, 2014, ‘An Unprecedented Look at Stuxnet, the World’s First Digital Weapon’, Wired, https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/, accessed on 20 May 2024
    Kim Zetter, 2014, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon, Crown Publishers
    Kristen E Eichensehr, 2017, ‘Three Questions on the WannaCry Attribution to North Korea’, Just Security, https://www.justsecurity.org/49889/questions-wannacry-attribution-north-korea/, accessed on 22 May 2024
    Kristen E Eichensehr, 2020, ‘The Law and Politics of Cyberattack Attribution’, UCLA Law Review, Vol. 520, No. 582.
    Kristen Eichensehr,2014, "Review of The Tallinn Manual on the International Law Applicable to Cyber Warfare (Michael N. Schmitt ed., 2013)", American Journal of International Law, Vol 108
    Kubo Mačák, 2016, "Is the International Law of Cyber Security in Crisis?", 8th International Conference on Cyber Conflict, NATO CCD COE Publications
    Lianne J.M. Boer, 2019, "Lex lata comes with a date; or, what follows from referring to the “Tallinn Rules.” AJIL Unbound, Vol. 113
    Lorraine Finlay and Christian Payne, 2019 ‘The attribution problem and cyber armed attacks’, American Journal of International Law
    Luis Acosta, 2015, Legal Effect of United Nations Resolutions Under International and Domestic Law, The Law Library of Congress, Global Legal Research Directorate
    Major Aaron D. Kirk, 2019, “Artificial Intelligence And The Fifth Domain”, Air Force Law Review, 183-236
    Marco De Falco, 2012, "Stuxnet Facts Report: A Technical and Strategic Analysis", NATO Cooperative Cyber Defence Centre of Excellence, Tallinn.
    Marco Roscini, 2015, Cyber Operations as a Use of Force
    Marco Sassòli, et all, 2011, How Does Law Protect In War?, Chapter 9: Conduct of Hostilities, Means and Methods of Warfare, ICRC
    Martin Dixon, 2013, Textbook on International Law, United Kingdom, Oxford University Press, p. 252.
    Matthew C. Waxman, 2011, "Cyber Attacks as "Force" Under UN Charter Article 2(4)", Faculty Publications, Columbia Law School
    Matthew J. Sklerov, 2009, Solving The Dilemma Of State Responses To Cyberattacks: A Justification For The Use Of Active Defenses Against States Who Neglect Their Duty To Prevent, 57th Judge Advocate Officer Graduate Course
    Marko Divac Öberg, 2006, "The Legal Effects of Resolutions of the UN Security Council and General Assembly in the Jurisprudence of the ICJ", The European Journal of International Law, Vol. 16, No.5
    McConville, Mike and Wing Hong Chui, 2012, Research Methods for Law, Edinburgh, Edinburgh, University Press
    Michael G. Vickers & Robert C. Martinage, 2004, The Revolution in War, Center for Strategic and Budgetary Assessments, Washington DC
    Michael J Glennon, 2013, ‘The dark future of international cybersecurity regulation’, Journal of National Security Law & Policy, Vol. 6
    Michael N. Schmitt, 2003, “The Sixteenth Waldemar A. Solf Lecture in International Law,” Military Law Review, Vol. 176
    Michael N. Schmitt, 2012, "International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed", Harvard International Law Journal Online, Vol. 54
    Michael N. Schmitt, 2013, Tallinn Manual on The International Law Applicable to Cyber Warfare, Cambridge University Press
    Michael N. Schmitt, 2015, "The Law of Cyber Targeting", NATO CCD COE, Tallinn Paper No. 7
    Michael N. Schmitt, 2017, Tallinn Manual 2.0 On The International Law Applicable To Cyber Operations, Cambridge University Press
    Michael N. Schmitt, 2017, "Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t", Just Security, https://www.justsecurity.org/37559/tallinn-manual-2-0-international-law-cyber-operations/
    Michael N. Schmitt; Sean Watts, 2015, "The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare," Texas International Law Journal, Vol. 50, No. 2-3
    Michael Robinson, Kevin Jones, and Helge Janicke, 2014, "Cyber warfare: Issues and challenges", Computers & Security, Vol. 49
    Michael Schmitt, 1999 ‘Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework’, Columbia Journal of Transnational Law, Vol. 37, 1998-99
    Mitchell Stapleton-Coory, 2019, The Enduring Legacy Of The Martens Clause: Resolving The Conflict Of Morality In International Humanitarian Law, Adelaide Law Review, Vol. 40, No. 2
    Nicholas Tsagourias and Michael Farrell, 2020, ‘Cyber attribution: Legal and technical approaches and challenges’, European Journal of International Law, Vol. 31, No. 3
    Nicolas Falliere, Liam O Murchu, and Eric Chien, 2011, “W32.Stuxnet Dossier”, Symantec Security Response
    Oliver Kessler And Wouter Werner, 2013, Expertise, Uncertainty, and International Law: A Study of the Tallinn Manual on Cyberwarfare, Leiden Journal of International Law, Vol. 26
    Oona A. Hathaway and others, 2012, "The Law of Cyber-Attack", California Law Review, Vol. 100
    Oscar Schachter, 1984, "The Right of States to Use Armed Force", Michigan Law Review, Vol. 82, Issue 5
    Parisa Hafezi and Yomna Mohamed, 2024, Iranian President Ebrahim Raisi killed in Helicopter Crash, Reuters, https://www.reuters.com/world/middle-east/hopes-fade-wreckage-found-helicopter-carrying-iranian-president-raisi-2024-05-20/, accessed on 20 May, 2024:
    Paul B. Stares & General John W. Vessey, 2024, “Preventive Priorities Survey”, Center for Preventive Action
    Phosphates in Morocco, Preliminary Objections, 1938, P>C.I.J., Series A/B, No. 74, p.10.
    Preventive Priorities Survey, 2024, “Conflicts to Watch in 2024”, Council on Foreign Relations, https://www.cfr.org/report/conflicts-watch-2024, accessed on 22 May 2024
    Prosecutor v. Tadic, 1995, Case No. IT-94-1, Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction, Para. 70
    Rain Liivoja. 2015, “Technological Change and the Evolution of the Law of War”, International Review of the Red Cross, Vol. 97, No. 900
    Richard A. Clarke & Robert K. Knake, 2010, Cyber War: The Next Threat To National Security And What To Do About It, HarperCollins Publishers
    Rain Ottis, 2018, "Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective", Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia
    Report of the Secretary-General, 2017, Responsibility of States for internationally wrongful acts, Compilation of decisions of international courts, tribunals and other bodies, A/71/80/Add.1
    Richard J. Harknett & Max Smeets,2 020, "Cyber Campaigns and Strategic Outcomes", Journal of Strategic Studies
    Rishi Iyengar, 2024, "The Next Israel-Iran Fight Could Be in Cyberspace", Foreign Policy, https://foreignpolicy.com/2024/04/16/iran-israel-conflict-missile-attack-cyberattacks-warfare/, accessed on 22 May 2024
    Robert Rosenstock, 2002,”The ILC and State Responsibility”, The American Journal of International Law, Vol. 96, No. 4, p. 792-797.
    Rohit Bokil, 2023, Cyber Warfare: Taking War to Cyberspace and its Implications for International Humanitarian Law, International Journal for Multidisciplinary Research, Volume 5, Issue 1
    Rupert Ticehurst, 1997, The Martens Clause and the Laws of Armed Conflict, International Review of the Red Cross, No. 317
    Ryan Jenkins, 2013, Is Stuxnet Physical? Does It Matter?, Journal of Military Ethics, Vol. 12, No.1
    Samuli Haataja and Afshin Akhtar-Khavari, 2018, “Stuxnet And International Law On The Use Of Force: An Informational Approach”, Cambridge International Law Journal
    Sean Seddon and Daniele Palumbo, 2024, "What we know about Israel's missile attack on Iran", BBC, https://www.bbc.com/news/world-middle-east-68853402, accessed on 22 May 2024
    Shaan Shaikh, 2024,”The Iran-Israel Air Conflict, One Week In”, Center for Strategic & International Studies, https://www.csis.org/analysis/iran-israel-air-conflict-one-week, accessed on 22 May 2024
    Shan Ali and Sabira Naz Qureshi, 2022, Legal Framework of Right of Self Defense in Cyber Warfare: Application through Laws of Armed Conflict, Journal of Development and Social Sciences, Vol. 3, No. 2
    Sharon Wrobel, 2024, "Cyberattacks by Iran, Hezbollah have tripled during the war, says Israel cyber czar" The Times of Israel, https://www.timesofisrael.com/cyberattacks-by-iran-hezbollah-have-tripled-during-the-war-says-israel-cyber-czar/, accessed on 22 May 2024
    Statute of the International Law Commission, 1947
    Stephen M. Schwebel, 1979, "The Effect of Resolutions of the U.N. General Assembly on Customary International Law," Proceedings of the Annual Meeting (American Society of International Law), Vol. 73
    Sean Collins & Stephen McCombie, 2012, “Stuxnet: the emergence of a new cyber weapon and its implications”, Journal of Policing, Intelligence and Counter Terrorism, 7:1, 80-91.
    Vaibhav Sharma, 2019, “Can Existing International Law Regulations and Cyber Operations Meet at a Junction?”, Journal of Emerging Technologies and Innovative Research, Vol. 6
    Statista, “Numbers of Internet Users Worldwide”, https://www.statista.com/study/12322/global-internet-usage-statista-dossier/ accessed on 9 January 2023
    Stefano Mele, 2014, “Legal Considerations on Cyber-Weapons and Their Definition”, Journal of Law & Cyber Warfare, Vol. 3, No. 1
    Tainyi Luor and others, 2023, "Trends in and Contributions to Tallinn Manual Research: An Assessment of the Literature from 1998 to November 2022", Informatica Economică, Vol. 27, No. 3
    Ted Regencia, 2024, Iran Helicopter Crash Updates: President Raisi, FM Amirabdollahian Die, Aljazeera, https://www.aljazeera.com/news/liveblog/2024/5/19/iran-helicopter-accident-live-president-fm-on-missing-aircraft, accessed on May 20, 2024
    Thomas Rid & Peter McBurney, 2012, Cyber-Weapons, The RUSI Journal, Vol. 157, No. 1
    The Budapest Convention on Cybercrime 2001
    The Factory at Chorzów (Claim for Indemnity) (Germany v. Poland) [1928] PCIJ Ser A No 17, 29
    The Joint Chiefs of Staff (JCS), 2018, Joint Publication 3-12 Cyberspace Operations
    The North Atlantic Council, North Atlantic Treaty Organization, 2014, “Wales Summit Declaration”, Press Release, https://www.nato.int/cps/en/natohq/official_texts_112964.htm
    The North Atlantic Treaty, 1949
    The White House, 2009, ‘Remarks by the President on Securing our Nation’s Cyber infrastructure’, Office of the Press Secretary, https://obamawhitehouse.archives.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure , accessed on 19 May 2024
    The White House, 2011, International Strategy for Cyberspace, National Archives, Washington D.C., https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
    Thomas M. Franck, 2004, Recourse To Force: State Action Against Threats And Armed Attacks, Cambridge University Press
    Tian Shaohui, 2017, “China’s International Strategy of Cooperation on Cyberspace”, available at http://www.xinhuanet.com/english/china/2017-03/01/c_136094371.htm
    Tom Gjelten, 2012, ‘Cyber Insecurity: U.S. Struggles to Confront Threat’, NPR.org, http://www.npr.org/templates/story/story.php?storyId=125578576
    US Department of Defense, 2006, The National Military Strategy for Cyberspace Operations.
    William Gibson, 1984, Neuromancer
    UN GA Resolution, 2015, Developments in the field of information and telecommunications in the context of international security, Document A/RES/70/237
    UN GA Resolution, 2018, Developments in the field of information and telecommunications in the context of international security, Document A/RES/73/27
    U.N. Security Council Resolutions 1737 (2006)
    U.N. Security Council Resolutions 1747 (2007)
    U.N. Security Council Resolutions 1803 (2008)
    U.N. Security Council Resolutions 1929 (2010).
    UK Cabinet Office, 2022, "Government Cyber Security Strategy: 2022 to 2030", available at https://www.gov.uk/government/publications/government-cyber-security-strategy-2022-to-2030
    UN General Assembly Resolution, 2003. Developments in the field of information and telecommunications in the context of international security, Document A/RES/58/32
    Vincent Bernard, 2014, "Delineating The Boundaries Of Violence", International Review of the Red Cross, Vol. 96, No. 893
    William C Banks, 2019, ‘The bumpy road to a meaningful international law of cyber attribution’, American Journal of International Law Unbound, Vol. 113
    William J Broad, John Markoff and David E Sanger, 2010, ‘Israeli Test on Worm Called Crucial in Iran Nuclear Delay’, The New York Times, https://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html, accessed on 20 May 2024
    Yoram Dinstein, 2011, War, Aggression and Self-Defence (5th Ed), Cambridge University Press
    Zen Chang, 2017, "Cyberwarfare and international humanitarian law", Creighton International and Comparative Law Journal, Vol.9, No. 1
    Description: 碩士
    國立政治大學
    國際研究英語碩士學位學程(IMPIS)
    111862023
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0111862023
    Data Type: thesis
    Appears in Collections:[國際研究英語碩士學位學程] 學位論文

    Files in This Item:

    File Description SizeFormat
    202301.pdf1194KbAdobe PDF1View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback