Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2016 | 10 | 349-362

Article title

From ad hoc cyber peace operations to HyperState. The outline of the future peace support. Part I

Content

Title variants

Languages of publication

EN

Abstracts

Year

Issue

10

Pages

349-362

Physical description

Contributors

  • Uniwersytet Wrocławski

References

  • Syse H., Plato: The Necessity of War, the Quest or Peace, „Journal of Military Ethics” 2002, vol. 1, no. 1, p. 36–44.
  • Aristotle, The Politics, Blacksburg 2009.
  • von Elbe J., The Evolution of the Concept of the Just War in International Law, „American Journal of International Law” 1939, vol. 33, p. 666-667.
  • Nussbaum A., Just War – A Legal Concept?, „Michigan Law Review” 1943, vol. 42, no. 3, p. 453-479.
  • Cicero M.T., Rudd N., Powell J.G.F., The republic, and the laws, Oxford 2008.
  • Augustine Saint Bishop of Hippo, Dods M., The city of god, Peabody 2013.
  • Isidore of Seville, Lindsay W. M., Isidori Hispalensis Episcopi Etimologiarum Sive Originum, Libri XVIII (1), Oxford 1911.
  • Bacon F., New Atlantis, Cambridge 2010.
  • Suarez F., Pereña L., Guerra, Intervención, Paz Internacional, Espasa-Calpe Madrid 1959, p. 76-77.
  • Blank L., Guiora A., Teaching an Old Dog New Tricks: Operationalizing the Law of Armed Conflict in New Warfare, [in:] The Laws of War and 21st Cenury Conflict, Gaston E.L. (ed.), New York 2012.
  • Das S. K., Kant K., Zhang N., Handbook on Securing Cyber-Physical Critical Infrastructure, Burlington 2012.
  • Loukas G., Cyber-Physical Attacks: A Growing Invisible Threat, Waltham 2015.
  • Aleksa K. (ed), Ką turime žinoti apie pasirengimą ekstre ma liosioms situacijoms ir karo metui, Vilnius 2014, p. 70, http://www.kam.lt/download/46229/ka%20turime%20zinoti%20(knyga%202014)%20sk.pdf (13 XI 2015).
  • Held D, The changing structure of international law: sovereignty transformed?, [in:] The Global Transformations Reader: an Introduction to the Globalization Debate, Held D., McGrew A. (eds.), Cambridge 2000, p. 162, https://www.polity.co.uk/global/pdf/GTReader2eHeld.pdf (13 XI 2015).
  • Schmitt M. N. (ed.), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge-New York 2013, p. 15-18, https://ccdcoe.org/tallinn-manual.html (13 XI 2015).
  • Rid T., Cyber war will not take place, [in:] Cyber Warfare. Critical Perspectives, Ducheine P., Osinga F., Soeters J. (eds.), Hague 2012.
  • Dinstein Y., Computer Network Attacks and Self-Defense, „International Law Studies” 2002, vol. 76, p. 99-119.
  • Pietraś M., Marzęda K. (eds.), Późnowestfalski ład międzynarodowy, Lublin 2008.
  • Lists of Intangible Cultural Heritage and the Register of Best Safeguarding Practices, http://www. unesco.org/culture/ich/en/lists (13 XI 2015).
  • The Antarctic Treaty, http://www.ats.aq/e/ats.htm (13 XI 2015).
  • Boulanin V., Arms production goes cyber: a challenge for arms control (SIPRI 2015), http:// www.sipri.org/media/newsletter/essay/Boulanin_May13 (13 XI 2015).
  • Abbet J., Inventing the Internet, Cambridge 2000.
  • Bordoni C., A Crisis Of The State? The End Of The Post-Westphalian Model (12 II 2013), http:// www.socialeurope.eu/2013/02/a-crisis-of-the-state-the-end-of-post-westphalian-model/ (13 XI 2015).
  • Cassese A., Current challenges to international humanitarian law, [in:] The Oxford handbook of international law in armed conflict, Clapham A., Gaeta P. (eds.), Oxford 2014.
  • The United States Army’s Cyberspace Operations Concept Capability Plan 2016-2028, Department of the Army USA TRADOC Pamphlet 525-7-8 (22 II 2010), p. 6, http://fas.org/irp/ doddir/army/pam525-7-8.pdf (14 XI 2015).
  • Barak A, Suler J., Reflections on the Psychology and Social Science of Cyberspace, [in:] Psychological Aspects of Cyberspace: Theory, Research, Applications, Barak A. (ed.), Cambridge-New York 2008, p. 1-12.
  • Abe K., Human Rights-ization of International Law: a Critical Analysis of the „Ethical Turn”, „Kokusaihō gaiko zasshi” 2013, vol. 111, p. 1-28, http://catalogue.ppl.nl/DB=1/SET=1/TTL= 211/SHW?FRST=216 (13 XI 2015).
  • Marshall T., Perpetual Westphalia? Exploring Westphalian and Non-Westphalian Politics ' rough Aleatory Materialism, https://www.google.nl/urlsa=t&rct=j&q=&esrc=s&source= web& cd=2&ved=0CDQQFjABahUKEwj1iPPys4DJAhXEUhQKHTPiDp0&url=https% 3A- %2 F%2 Fmillenniumjournal.& les.wordpress.com%2F2012%2F10%2Fmarshall-materialism- -paper.docx&usg=AFQjCNGr5Xw5Cc1wBZabzJrtIw1hlLw1g&bvm=bv.106923889,d.d 24&- cad=rja (13 XI 2015).
  • United Nations Peacekeeping Group: Capacities to Ensure Integration, http://www.un.org/ en/peacekeeping/documents/dpkodfs_org_chart.pdf (13 XI 2015).
  • Troop and police contributors, http://www.un.org/en/peacekeeping/resources/statistics/contributors. shtml (13 XI 2015).
  • South Sudan accelerates ICT in all sectors, http://www.unesco.org/new/en/communication- -and-information/resources/news-and-in-focus-articles/in-focus-articles/2015/south-sudan- -accelerates-icts-in-all-sec tors (13 XI 2015).
  • Liberia’s ICT and Telecom Policy, http://www.moci.gov.lr/doc/ICT%20_%20Telecom%20Policy% 20Main%20Body.pdf (13 XI 2015).
  • Boutin B.,The Role of Control in Allocating International Responsibility in Collaborative Military Operations, Amsterdam 2015, (Ph.D. thesis Amsterdam Center for International Law of the University of Amsterdam).
  • Arnolds E. B., Garland N. F., The Defense of Necessity in Criminal Law: The Right to Choose the Lesser Evil, „Journal of Criminal Law and Criminology” 1974, vol. 65, no. 3, p. 289-301.
  • Barney D., White Hat Hackers – the forgotten good guys (31 III 2015), http://www.gfi.com/ blog/white-hat-hackers-the-forgotten-good-guys/ (13 XI 2015).
  • Peacekeeping Fact Sheet (31 VIII 2015), http://www.un.org/en/peacekeeping/resources/statistics/ factsheet.shtml (13 XI 2015).
  • Emergency Communications for Disaster Relief Deployment Archive, http://www.unfoundation. org/what-we-do/legacy-of-impact/technology/disaster-relief-deployments/ (13 XI 2015).
  • United Nations Global Pulse. Harnessing big data for development and humanitarian action, http://www.unglobalpulse.org/about-new (13 XI 2015).
  • SETI@home, http://setiathome.ssl.berkeley.edu/ (13 XI 2015).
  • Nye J. S., Soft Power: The Means to Success in World Politics, New York 2006.
  • Osmançavuşoğlu E., Challenges to United Nations peacekeeping operations in the post-Cold War era, „Journal of International Affairs” 1999-2000, vol. IV, no. 4, http://sam.gov.tr/wp-content/ uploads/2012/02/EmelOsmanCavusoglu.pdf (13 XI 2015).

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-f62102c3-8ffb-43fa-8a1f-0ceae1263074
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.