Skip to main content Accessibility help
×
Hostname: page-component-5c6d5d7d68-7tdvq Total loading time: 0 Render date: 2024-08-22T20:25:29.920Z Has data issue: false hasContentIssue false

Bibliography

Published online by Cambridge University Press:  01 October 2021

Lianne J. M. Boer
Affiliation:
Vrije Universiteit, Amsterdam
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
International Law As We Know It
Cyberwar Discourse and the Construction of Knowledge in International Legal Scholarship
, pp. 213 - 237
Publisher: Cambridge University Press
Print publication year: 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aalberts, Tanja and Gammeltoft-Hansen, Thomas (eds.), The Changing Practices of International Law, Cambridge University Press 2018CrossRefGoogle Scholar
Aalberts, Tanja and Venzke, Ingo, ‘Moving Beyond Interdisciplinary Turf Wars,’ in:International Law as a Profession, Nollkaemper, André, d’Aspremont, Jean, Gazzini, Tarcisio and Werner, Wouter (eds.), Cambridge University Press 2017, 287310Google Scholar
Aalberts, Tanja E. and Werner, Wouter G., ‘International Law,’ in: Routledge Handbook of International Political Sociology, Guillaume, Xavier and Bilgin, Pınar (eds.), Routledge 2017, 3645Google Scholar
Adams, Michael J., A Warning About Tallinn 2.0 … Whatever It Says, on ‘Lawfare,’ January 4, 2017, www.lawfareblog.com/warning-about-tallinn-20-%E2%80%A6-whatever-it-says (July 15, 2020)Google Scholar
Adamson, Liisi and Homburger, Zine, ‘Let Them Roar: Small States as Cyber Norm Entrepreneurs’ (2019) 24 European Foreign Affairs Review 217CrossRefGoogle Scholar
Adler-Nissen, Rebecca, Why International Relations Theory Needs Bourdieu, on ‘e-International Relations,’ October 23, 2012, www.e-ir.info/2012/10/23/why-international-relations-theory-needs-bourdieu/ (July 15, 2020)CrossRefGoogle Scholar
Aldrich, Richard W., ‘How Do You Know You Are at War in the Information Age?’ (2000) 22 Houston Journal of International Law 223Google Scholar
Alschner, Wolfgang and Charlotin, Damien, ‘The Growing Complexity of the International Court of Justice’s Self-Citation Network’ (2016) 29 European Journal of International Law 83CrossRefGoogle Scholar
Andersen, Hanne and Hepburn, Brian, ‘Scientific Method,’ Stanford Encyclopedia of Philosophy, November 13, 2015, Edward N. Zalta (ed.), http://plato.stanford.edu/archives/sum2016/entries/scientific-method/ (July 15, 2020)Google Scholar
Antolin-Jenkins, Vida M., ‘Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places’ (2005) 51 Naval Law Review 132Google Scholar
Aronsson-Storrier, Marie, Publicity in International Law-Making: Covert Operations and the Use of Force, Cambridge University Press 2021Google Scholar
Arvidsson, Matilda, ‘The Subject in International Law: The Administrator of the Coalition Provisional Authority of Occupied Iraq and Its Laws’ (PhD, Lund University 2017)Google Scholar
Askehave, Inger and Swales, John M., ‘Genre Identification and Communicative Purpose: A Problem and a Possible Solution’ (2001) 22 Applied Linguistics 195CrossRefGoogle Scholar
Austin, Arthur, ‘Footnote Skulduggery and Other Bad Habits’ (1990) 44 University of Miami Law Review 1009Google Scholar
Austin, John, How to Do Things with Words: The William James Lectures Delivered at Harvard University in 1955, Clarendon Press 1962Google Scholar
Banjo, Shelly, ‘Home Depot Hackers Exposed 53 Million Email Addresses,’ The Wall Street Journal, November 6, 2014, www.wsj.com/articles/home-depot-hackers-used-password-stolen-from-vendor-1415309282 (July 15, 2020)Google Scholar
Barkham, Jason, ‘Information Warfare and International Law on the Use of Force’ (2001) 34 New York University Journal of International Law and Politics 57Google Scholar
Barlow, John P., ‘A Declaration of the Independence of Cyberspace,’ Electronic Frontier Foundation, February 8, 1996, www.eff.org/cyberspace-independence (July 15, 2020)CrossRefGoogle Scholar
Barnsby, Robert E. and Reeves, Shane R., ‘Give Them an Inch, They’ll Take a Terabyte: How States May Interpret Tallinn Manual 2.0’s International Human Rights Law Chapter’ (2017) 95 Texas Law Review 1515Google Scholar
Baron, Jane B. and Epstein, Julia, ‘Is Law Narrative?’ (1997) 45 Buffalo Law Review 141Google Scholar
Bavelas, Janet B., ‘The Social Psychology of Citations’ (1978) 19 Canadian Psychological Review/Psychologie canadienne 158CrossRefGoogle Scholar
BBC News, ‘UK Launched Cyber-Attack on Islamic State,’ April 12, 2018, www.bbc.com/news/technology-43738953 (July 15, 2020)Google Scholar
‘Stuxnet “Hit” Iran Nuclear Plans,’ November 22, 2010, www.bbc.com/news/technology-11809827 (July 15, 2020)Google Scholar
Benatar, Marco, ‘Cyber Warfare,’ Oxford Bibliographies, March 27, 2014, last reviewed November 2, 2017, http://oxfordbibliographiesonline.com/view/document/obo-9780199796953/obo-9780199796953–0087.xml (July 15, 2020)Google Scholar
Benatar, MarcoThe Use of Cyber Force: Need for Legal Justification?’ (2009) 1 Goettingen Journal of International Law 375Google Scholar
Benvenisti, Eyal, ‘Margin of Appreciation, Consensus, and Universal Standards’ (1999) 31 New York University Journal of International Law and Politics 843Google Scholar
Bigo, Didier, ‘Pierre Bourdieu and International Relations: Power of Practices, Practices of Power’ (2011) 5 International Political Sociology 225CrossRefGoogle Scholar
Bikundo, Edwin, ‘Review of the Politics of Justifying Force: The Suez Crisis, the Iraq War, and International Law by Charlotte Peevers (2013) Oxford University Press, pp. 288, ISBN 9780199686957’ (2014) 36 Sydney Law Review 727Google Scholar
Blum, Yehuda Z., ‘Economic Boycotts in International Law’ (1977) 12 Texas International Law Journal 5Google Scholar
Boeke, Sergei and Broeders, Dennis, ‘The Demilitarisation of Cyber Conflict’ (2018) 60 Survival 73CrossRefGoogle Scholar
Boer, Lianne J. M., ‘“Article 51 Authorizes”: Writing International Law,’ in: Constructing the Authority of International Law, Gleider Hernández and Giedre Jokubauskaite (eds.), submitted (on file with the author)Google Scholar
Boer, Lianne J. M.“Echoes of Times Past”: On the Paradoxical Nature of Article 2(4)’ (2015) 20 Journal of Conflict and Security Law 5CrossRefGoogle Scholar
Boer, Lianne J. M.Lex Lata Comes with a Date; or, What Follows from Referring to the “Tallinn Rules”’ (2019) 113 AJIL Unbound 76CrossRefGoogle Scholar
Boer, Lianne J. M.Narratives of Force: The Presence of the Writer in International Legal Scholarship’ (2019) 66 Netherlands International Law Review 1CrossRefGoogle Scholar
Boer, Lianne J. M.“Restating the Law ‘As It Is’”: On the Tallinn Manual and the Use of Force in Cyberspace’ (2013) 5 Amsterdam Law Forum 4CrossRefGoogle Scholar
Boer, Lianne J. M. ‘“The Greater Part of Jurisconsults”: On Consensus Claims and Their Footnotes in Legal Scholarship’ (2016) 29 Leiden Journal of International Law 1021CrossRefGoogle Scholar
Boer, Lianne and Lodder, Arno, ‘Cyberwar,’ in: Cyber Safety: An Introduction, Leukfeldt, Rutger and Stol, Wouter (eds.), eleven international publishing 2012, 157166Google Scholar
Boer, Lianne J. M. and Stolk, Sofia (eds.), Backstage Practices of Transnational Law, Routledge 2019CrossRefGoogle Scholar
Bond, James N., ‘Peacetime Foreign Data Manipulation as One Aspect of Offensive Information Warfare: Questions of Legality under the United Nations Charter Article 2(4)’ (MA, Naval War College 1996)Google Scholar
Bourdieu, Pierre, ‘Force of Law: Toward a Sociology of the Juridical Field’ (1987) 38 Hastings Law Journal 814Google Scholar
Bowett, Derek W., ‘Economic Coercion and Reprisals by States’ (1972) 13 Virginia Journal of International Law 1Google Scholar
Bowett, Derek W. Self-Defence in International Law, Manchester University Press 1958Google Scholar
Brooks, Terrence A., ‘Private Acts and Public Objects: An Investigation of Citer Motivations’ (1985) 37 Journal of the American Society for Information Science 34CrossRefGoogle Scholar
Brownlie, Ian, International Law and the Use of Force by States, Oxford University Press 1963CrossRefGoogle Scholar
Buchan, Russell, ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’ (2012) 17 Journal of Conflict and Security Law 211CrossRefGoogle Scholar
Budd, John M., ‘Citations and Knowledge Claims: Sociology of Knowledge as a Case in Point’ (1999) 25 Journal of Information Science 265Google Scholar
Bueger, Christian and Bethke, Felix, ‘Actor-Networking the “Failed State”: An Enquiry into the Life of Concepts’ (2014) 17 Journal of International Relations and Development 30CrossRefGoogle Scholar
Bueger, Christian and Gadinger, Frank, ‘The Play of International Practice’ (2015) 59 International Studies Quarterly 449CrossRefGoogle Scholar
Bumiller, Elisabeth and Shanker, Thom, ‘Panetta Warns of Dire Threat of Cyberattack on U.S.,’ New York Times, October 11, 2012, www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?_r=0 (July 15, 2020)Google Scholar
Burgess, Sally, ‘Packed Houses and Intimate Gatherings: Audience and Rhetorical Structure,’ in: Academic Discourse, Flowerdew, John (ed.), Pearson Education Limited 2002, 196215Google Scholar
Butler, Judith, Bodies that Matter: On the Discursive Limits of ‘Sex,’ Routledge 2011CrossRefGoogle Scholar
Cameron, Clinton E., ‘Developing a Standard for Politically Related State Economic Action’ (1991) 13 Michigan Journal of International Law 218Google Scholar
Camic, Charles, Gross, Neil and Lamont, Michèle (eds.), Social Knowledge in the Making, The University of Chicago Press 2011CrossRefGoogle Scholar
Carter-Thomas, Shirley and Rowley-Jolivet, Elizabeth, ‘Analysing the Scientific Conference Presentation (CP): A Methodological Overview of a Multimodal Genre’ (2003) 39–40 ASp 59Google Scholar
Carty, Anthony, ‘Sociological Theories of International Law,’ Max Planck Encyclopedia of Public International Law 2008, Rüdiger Wolfrum (dir.), https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e735 (July 15, 2020)Google Scholar
Casey, Debra L. and McMillan, G. Steven, ‘Identifying the “Invisible Colleges” of the Industrial & Labor Relations Review: A Bibliometric Approach’ (2008) 62 Industrial & Labor Relations Review 126CrossRefGoogle Scholar
CCDCOE, ‘About Us,’ https://ccdcoe.org/about-us/ (July 15, 2020)Google Scholar
Charter of the United Nations, 26 June 1945, 1 UNTS XVIGoogle Scholar
Chen, Lung-chu, ‘Perspectives from the New Haven School’ (1993) 87 American Society of International Law Proceedings 407Google Scholar
Cienki, Alan, ‘Language as a Prototype Category: Cognitive Linguistics Meets Multimodal Communication,’ Inaugural Lecture Vrije Universiteit Amsterdam, September 14, 2015, slides on file with the authorGoogle Scholar
Cienki, AlanSpoken Language Usage Events’ (2015) 7 Language and Cognition 499CrossRefGoogle Scholar
Cienki, Alan ‘The Dynamic Scope of Relevant Behaviors in Talk: A Perspective from Cognitive Linguistics’ (extended abstract), Proceedings of the 2nd European and the 5th Nordic Symposium on Multimodal Communication 2015, www.ep.liu.se/ecp/110/002/ecp15110002.pdf (July 15, 2020)Google Scholar
Clarke, Richard A. and Knake, Robert K., Cyberwar: The Next Threat to National Security and What to Do About It, HarperCollins 2010Google Scholar
Cohen, Julie E., ‘Cyberspace as/and Space’ (2007) 107 Columbia Law Review 210Google Scholar
Constable, Marianne, Our Word Is Our Bond: How Legal Speech Acts, Stanford University Press 2014Google Scholar
Constable, Marianne, Volpp, Leti and Wagner, Bryan (eds.), Looking for Law in All the Wrong Places: Justice Beyond and Between, Fordham University Press 2019Google Scholar
Corten, Olivier, ‘Formalization and Deformalization as Narratives of the Law of War,’ in: New Approaches to International Law: The European and the American Experiences, Beneyto, José María and Kennedy, David (eds.), T.M.C. Asser Press 2013, 251272Google Scholar
Council of Europe, Convention on Cybercrime, November 23, 2001, ETS No. 185Google Scholar
Cover, Robert M., ‘The Supreme Court, 1982 Term – Foreword: Nomos and Narrative’ (1983) 97 Harvard Law Review 4Google Scholar
Cox, Stephen J., ‘Confronting Threats through Unconventional Means: Offensive Information Warfare as a Covert Alternative to Preemptive War’ (2005) 42 Houston Law Review 881Google Scholar
Craven, Matthew, Marks, Susan, Simpson, Gerry and Wilde, Ralph, ‘We Are Teachers of International Law’ (2004) 17 Leiden Journal of International Law 363CrossRefGoogle Scholar
Crawford Camiciottoli, Belinda, ‘Collective and Individual Identities in Business Studies Lectures,’ in: Commonality and Individuality in Academic Discourse, Gotti, Maurizio (ed.), Peter Lang 2009, 141162Google Scholar
Crawford, Emily, ‘From Inter-state and Symmetric to Intra-state and Asymmetric: Changing Methods of Warfare and the Law of Armed Conflict in the 100 Years Since World War One,’ in: Yearbook of International Humanitarian Law 2014, Gill, Terry D., Geiß, Robin, Krieger, Heike, McCormack, Tim, Paulussen, Christophe and Dorsey, Jessica (eds.), T.M.C. Asser Press 2016, 95118Google Scholar
Crawford, Michael, ‘Utility Hack Led to Security Overhaul,’ Computerworld, February 16, 2006, www.computerworld.com/article/2561484/security0/utility-hack-led-to-security-overhaul.html (July 15, 2020)Google Scholar
Cristobal, Kasia Solon, ‘From Law in Blackletter to Blackletter Law’ (2016) 108 Law Library Journal 181Google Scholar
Cronin, Blaise, The Citation Process: The Role and Significance of Citations in Scientific Communication, Taylor Graham 1984Google Scholar
Cuenca, Maria Josep, ‘Form-Use Mappings for Tag Questions,’ in: Discourse and Perspectives in Cognitive Linguistics, Liebert, Wolf-Andreas, Redeker, Gisela and Waugh, Linda (eds.), John Benjamins 1997, 320CrossRefGoogle Scholar
Cyber Law International, ‘Another successful int’l cyber law capacity-building seminar for gov’t officials,’ Twitter, May 21, 2019, https://twitter.com/CyberLawInt/status/1130767015176802305 (July 15, 2020)Google Scholar
d’Amato, Anthony, ‘On Consensus’ (1970) 8 Canadian Yearbook of International Law 104Google Scholar
d’Aspremont, Jean, ‘Cyber Operations and International Law: An Interventionist Legal Thought’ (2016) 21 Journal of Conflict and Security Law 575Google Scholar
d’Aspremont, Jean, Gazzini, Tarcisio, Nollkaemper, André and Werner, Wouter (eds.), International Law as a Profession, Cambridge University Press 2017CrossRefGoogle Scholar
Dapray Muir, J., ‘The Boycott in International Law’ (1974) 9 Journal of International Law and Economics 187Google Scholar
Davenport, Tara, ‘Submarine Cables, Cybersecurity and International Law: An Intersectional Analysis’ (2015) 24 Catholic University Journal of Law and Technology 57Google Scholar
Colatin, De Tomas, Samuele, A Surprising Turn of Events: UN Creates Two Working Groups on Cyberspace, CCDCOE INCYDER Articles, March 11, 2019, www.ccdcoe.org/incyder-articles/a-surprising-turn-of-events-un-creates-two-working-groups-on-cyberspace/ (July 15, 2020)Google Scholar
Degano, Chiara, ‘Dissociation and Presupposition in Discourse: A Corpus Study’ (2007) 21 Argumentation 361Google Scholar
Del Mar, Maks, ‘Metaphor in International Law: Language, Imagination and Normative Inquiry’ (2017) 86 Nordic Journal of International Law 170CrossRefGoogle Scholar
Delanis, James A., ‘Force under Article 2(4) of the United Nations Charter: The Question of Economic and Political Coercion’ (1979) 12 Vanderbilt Journal of Transnational Law 101Google Scholar
Delerue, François, ‘International Cooperation on the International Law Applicable to Cyber Operations’ (2019) 24 European Foreign Affairs Review 203Google Scholar
Delibasis, Dimitrios, ‘The Right of States to Use Force in Cyberspace: Defining the Rules of Engagement’ (2002) 11 Information & Communications Technology Law 255Google Scholar
Dezalay, Yves and Garth, Bryant G., Dealing in Virtue: International Commercial Arbitration and the Construction of a Transnational Legal Order, The University of Chicago Press 1996Google Scholar
Dinstein, Yoram, ‘Computer Network Attacks and Self-Defense,’ in: Computer Network Attack and International Law, Schmitt, Michael N. and O’Donnell, Brian T. (eds.), Naval War College 2002, 99119Google Scholar
Dinstein, Yoram War, Aggression and Self-Defence, Cambridge University Press 2005 (4th ed.)CrossRefGoogle Scholar
Dinstein, Yoram War, Aggression and Self-Defence, Cambridge University Press 2012 (5th ed.)Google Scholar
Dinstein, Yoram War, Aggression and Self-Defence, Cambridge University Press 2017 (6th ed.)CrossRefGoogle Scholar
Dinstein, Yoram (gen. ed.), ‘Commentary on the HPCR Manual on International Law Applicable to Air and Missile Warfare,’ Program on Humanitarian Policy and Conflict Research, Harvard University 2010, https://georgetown.instructure.com/files/900391/download?download_frd=1 (July 15, 2020)Google Scholar
Director of National Intelligence, ‘Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution,’ January 6, 2017, www.dni.gov/files/documents/ICA_2017_01.pdf (22 July 2020)Google Scholar
Dorsett, Shaunnagh and McVeigh, Shaun, Jurisdiction, Routledge 2012Google Scholar
Douzinas, Costas, ‘Speaking Law: On Bare Theological and Cosmopolitan Sovereignty,’ in: International Law and Its Others, Orford, Anne (ed.), Cambridge University Press 2006, 3556CrossRefGoogle Scholar
Ducheine, Paul, Voetelink, Joop, Stinissen, Jan and Gill, Terry, ‘Towards a Legal Framework for Military Cyber Operations,’ in: Cyber Warfare: Critical Perspectives, Ducheine, Paul, Osinga, Frans and Soeters, Joseph (eds.), T.M.C. Asser Press 2012, 101128Google Scholar
DunlapJr., Charles J., ‘Perspectives for Cyber Strategists on Law for Cyberwar’ (2011) 5 Strategic Studies Quarterly 81Google Scholar
Dunn Cavelty, Myriam, Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, Routledge 2008Google Scholar
Dunn Cavelty, MyriamUnraveling the Stuxnet Effect: Of Much Persistence and Little Change in the Cyber Threats Debate’ (2011) 3 Military and Strategic Affairs 11Google Scholar
Dunoff, Jeffrey L. and Pollack, Mark A., ‘International Judicial Practices: Opening the Black Box of International Courts’ (2018) 40 Michigan Journal of International Law 47Google Scholar
Duszak, Anna, ‘Us and Others: An Introduction,’ in: Us and Others: Social Identities across Languages, Discourses and Cultures, Duszak, Anna (ed.), John Benjamins 2002, 128Google Scholar
Duyvesteyn, Isabelle, ‘Between Doomsday and Dismissal: Collective Defence, Cyber War and the Parameters of War’ (2014) 38 Atlantisch Perspectief 20Google Scholar
Dyson, Tim and Cetorelli, Valeria, ‘Changing Views on Child Mortality and Economic Sanctions in Iraq: A History of Lies, Damned Lies and Statistics’ (2017) 2 BMJ Global Health 1Google Scholar
Dzehtsiarou, Kanstantsin, European Consensus and the Legitimacy of the European Court of Human Rights, Cambridge University Press 2015Google Scholar
Efrony, Dan and Shany, Yuval, ‘A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice’ (2019) 112 American Journal of International Law 583CrossRefGoogle Scholar
Eichensehr, Kristen E., ‘Review of Tallinn Manual on the International Law Applicable to Cyber Warfare. Edited by Schmitt, Michael N.. Cambridge, New York: Cambridge University Press, 2013. pp. xix, 282. Index. $120, cloth; $58.99, paper’ (2014) 108 American Journal of International Law 585Google Scholar
Eichhorn, Lisa, ‘Writing in the Legal Academy: A Dangerous Supplement?’ (1998) 40 Arizona Law Review 105Google Scholar
European Commission, Migration and Home Affairs, ‘Cybercrime,’ https://ec.europa.eu/home-affairs/what-we-do/policies/organized-crime-and-human-trafficking/cybercrime_en (July 15, 2020)Google Scholar
Fenrick, William J., ‘ICRC Guidance on Direct Participation in Hostilities’ (2009) 12 Yearbook of International Humanitarian Law 287CrossRefGoogle Scholar
Finnemore, Martha and Hollis, Duncan B., ‘Constructing Norms for Global Cybersecurity’ (2016) 110 American Journal of International Law 425Google Scholar
Fleck, Dieter, ‘Searching for International Rules Applicable to Cyber Warfare – A Critical First Assessment of the New Tallinn Manual’ (2013) 18 Journal of Conflict and Security Law 331Google Scholar
Foltz, Andrew C., ‘Stuxnet, Schmitt Analysis, and the Cyber “Use-of-Force” Debate’ (2012) 67 Joint Force Quarterly 40Google Scholar
Fortanet, Inmaculada, ‘The Use of “We” in University Lectures: Reference and Function’ (2004) 23 English for Specific Purposes 45Google Scholar
Foucault, Michel, ‘Authorship: What Is an Author?’ (1979) 20 Screen 13Google Scholar
Foucault, Michel The Archeology of Knowledge, transl. A. M. Sheridan Smith, Pantheon Books 1972Google Scholar
Foucault, MichelThe Order of Discourse,’ in: Untying the Text: A Post-Structuralist Reader, Young, Robert (ed.), Routledge & Kegan Paul 1981, 4878Google Scholar
Geertz, Clifford, ‘On Paying Attention,’ in: Fine Description: Ethnographic and Linguistic Essays by Harold C. Conklin, Kuipers, Joel and McDermott, Ray (eds.), Yale University Press 2007, 2730Google Scholar
Geertz, Clifford The Interpretation of Cultures, Basic Books 1973Google Scholar
Gervais, Michael, ‘Cyber Attacks and the Laws of War’ (2012) 30 Berkeley Journal of International Law 525Google Scholar
Gilbert, Nigel, ‘Referencing as Persuasion’ (1977) 7 Social Studies of Science 113CrossRefGoogle Scholar
Godden, David M., ‘On Common Knowledge and Ad Populum: Acceptance as Grounds for Acceptability’ (2008) 41 Philosophy & Rhetoric 101CrossRefGoogle Scholar
Goldsmith, Jack, ‘Cybersecurity Treaties: A Skeptical View,’ in: Future Challenges in National Security and Law, Peter Berkowitz (ed.), Hoover Institution 2011, 116, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf (July 15, 2020)Google Scholar
Goldsmith, Jack Don’t Get Too Excited About a US-China Arms Control Agreement for Cyber, on ‘Lawfare,’ September 21, 2015, www.lawfareblog.com/dont-get-too-excited-about-us-china-arms-control-agreement-cyber (July 15, 2020)Google Scholar
Goldsmith, JackHow Cyber Changes the Laws of War’ (2013) 24 European Journal of International Law 129Google Scholar
Goldsmith, Jack and Wu, Tim, Who Controls the Internet? Illusions of a Borderless World, Oxford University Press 2006CrossRefGoogle Scholar
Goodman, Seymour E., ‘War, Information Technologies, and International Asymmetries’ (1996) 39 Communications of the ACM 11CrossRefGoogle Scholar
Goodrich, Leland and Hambro, Edvard, Charter of the United Nations, Stevens and Sons Limited 1949Google Scholar
Grafton, Anthony, The Footnote: A Curious History, Harvard University Press 1997Google Scholar
Grant, Thomas D., ‘Doctrines (Monroe, Hallstein, Brezhnev, Stimson),’ Max Planck Encyclopedia of Public International Law 2014, Rüdiger Wolfrum (dir.), https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e697 (July 15, 2020)Google Scholar
Gray, Christine, International Law and the Use of Force, Oxford University Press 2008 (3rd ed.)Google Scholar
Gray, ChristineThe Use of Force and the International Legal Order,’ in: International Law, Evans, Malcolm D. (ed.), Oxford University Press 2010, 615647CrossRefGoogle Scholar
Greenberg, Lawrence T., Goodman, Seymour E. and Soo Hoo, Kevin J., Information Warfare and International Law, National Defense University Press 1998Google Scholar
Grigsby, Alex, The United Nations Doubles Its Workload on Cyber Norms, and Not Everyone Is Pleased, Council on Foreign Relations Blog, November 15, 2018, www.cfr.org/blog/united-nations-doubles-its-workload-cyber-norms-and-not-everyone-pleased (July 15, 2020)Google Scholar
Gross, Neil and Fleming, Crystal, ‘Academic Conferences and the Making of Philosophical Knowledge,’ in: Social Knowledge in the Making, Camic, Charles, Gross, Neil and Lamont, Michèle (eds.), The University of Chicago Press 2011, 151179Google Scholar
Haataja, Samuli, Cyber Attacks and International Law on the Use of Force: The Turn to Information Ethics, Routledge 2019Google Scholar
Hacking, Ian, ‘“Style” for Historians and Philosophers’ (1992) 23 Studies in History and Philosophy of Science 1CrossRefGoogle Scholar
Hallaq, Weal B., ‘On the Authoritativeness of Sunni Consensus’ (1986) 18 International Journal of Middle East Studies 427CrossRefGoogle Scholar
Handler, Stephanie Gosnell, ‘The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare’ (2012) 48 Stanford Journal of International Law 209Google Scholar
Hargens, Lowell L., ‘Using the Literature: Reference Networks, Reference Contexts, and the Social Structure of Scholarship’ (2000) 65 American Sociological Review 846Google Scholar
Harold, Scott Warren, The U.S.-China Cyber Agreement: A Good First Step, on the RAND Blog, August 1, 2016, www.rand.org/blog/2016/08/the-us-china-cyber-agreement-a-good-first-step.html (July 15, 2020)Google Scholar
Harris, Matthew, ‘Metafiction in New Zealand from the 1960s to the Present Day’ (PhD, Massey University 2011)Google Scholar
Harrison Dinniss, Heather, Cyber Warfare and the Laws of War, Cambridge University Press 2014Google Scholar
Haslam, Emily, ‘Information Warfare: Technological Changes and International Law’ (2000) 5 Journal of Conflict and Security Law 157CrossRefGoogle Scholar
Hathaway, Oona A., ‘The Drawbacks and Dangers of Active Defense,’ in: Proceedings of the 6th International Conference on Cyber Conflict, Brangetto, Pascal, Maybaum, Markus and Stinissen, Jan (eds.), NATO CCD COE Publications 2014, 3950Google Scholar
Hathaway, Oona A., Crootof, Rebecca, Levitz, Philip, Nix, Haley, Nowlan, Aileen, Perdue, William and Spiegel, Julia, ‘The Law of Cyber-Attack’ (2012) 100 California Law Review 817Google Scholar
Helfer, Laurence R., ‘Consensus, Coherence and the European Convention on Human Rights’ (1993) 26 Cornell International Law Journal 133Google Scholar
Helmbrecht, Johannes, ‘Grammar and Function of We,’ in: Us and Others: Social Identities across Languages, Discourses and Cultures, Duszak, Anna (ed.), John Benjamins 2002, 3149CrossRefGoogle Scholar
Helmersen, Sondre Torp, ‘Finding “The Most Highly Qualified Publicists”: Lessons from the International Court of Justice’ (2019) 30 European Journal of International Law 509CrossRefGoogle Scholar
Henderson, Errol A. and Singer, J. David, ‘“New Wars” and Rumors of “New Wars”’ (2002) 28 International Interactions 165Google Scholar
Henrard, Kristin and Mak, Elaine, ‘The Use of Consensus Arguments in Transnational Judicial Decision-Making: Confirming or Jeopardising Universal Human Rights,’ June 4, 2014, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2444682 (July 15, 2020)Google Scholar
Henriksen, Anders, ‘Lawful State Responses to Low-Level Cyber-Attacks’ (2015) 84 Nordic Journal of International Law 323Google Scholar
Henriksen, AndersThe End of the Road for the UN GGE Process: The Future Regulation of Cyberspace’ (2019) 5 Journal of Cybersecurity 1Google Scholar
Hernández, Gleider, ‘The Responsibility of the International Legal Academic,’ in: International Law as a Profession, d’Aspremont, Jean, Gazzini, Tarcisio, Nollkaemper, André and Werner, Wouter (eds.), Cambridge University Press 2017, 160188Google Scholar
Hoisington, Matthew, ‘Cyberwarfare and the Use of Force Giving Rise to the Right of Self-Defense’ (2009) 32 Boston College International and Comparative Law Review 439Google Scholar
Hollis, Duncan B., ‘An e-SOS for Cyberspace’ (2011) 52 Harvard International Law Journal 373Google Scholar
Hollis, Duncan B.Why States Need an International Law for Information Operations’ (2007) 11 Lewis and Clark Law Review 1023Google Scholar
Holtermann, Jakob V. H. and Madsen, Mikael Rask, ‘European New Legal Realism and International Law: How to Make International Law Intelligible’ (2015) 28 Leiden Journal of International Law 211Google Scholar
Horst, Maja and Irwin, Alan, ‘Nations at Ease with Radical Knowledge: On Consensus, Consensusing and False Consensusness’ (2010) 40 Social Studies of Science 105Google Scholar
Huntley, Todd C., ‘Controlling the Use of Force in Cyber Space: The Application of the Law of Armed Conflict During a Time of Fundamental Change in the Nature of Warfare’ (2010) 60 Naval Law Review 1Google Scholar
Hyland, Ken, ‘Constraint vs Creativity: Identity and Disciplinarity in Academic Writing,’ in: Commonality and Individuality in Academic Discourse, Gotti, Maurizio (ed.), Peter Lang 2009, 2552Google Scholar
Hyland, KenDirectives: Argument and Engagement in Academic Writing’ (2002) 23 Applied Linguistics 215Google Scholar
Hyland, Ken Disciplinary Discourses: Social Interactions in Academic Writing, The University of Michigan Press 2004Google Scholar
Hyland, KenStance and Engagement: A Model of Interaction in Academic Discourse’ (2005) 7 Discourse studies 173Google Scholar
Hyland, Ken ‘“Small Bits of Textual Material”: A Discourse Analysis of Swales’ Writing’ (2008) 27 English for Specific Purposes 142Google Scholar
Iasiello, Emilio, ‘Are Cyber Weapons Effective Military Tools?’ (2015) 7 Military and Strategic Affairs 23Google Scholar
Ingber, Rebecca, ‘Interpretation Catalysts in Cyberspace’ (2016) 95 Texas Law Review 1531Google Scholar
International Committee of the Red Cross, ‘Treaties, States Parties and Commentaries,’ www.icrc.org/applic/ihl/ihl.nsf/vwTreatiesHistoricalByDate.xsp (July 15, 2020)Google Scholar
International Court of Justice, Reparation for Injuries Suffered in the Service of the United Nations, Advisory Opinion, ICJ Reports 1949, p. 174 (1949)Google Scholar
Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. United States of America), Merits, Judgment, ICJ Reports 1986, p. 14 (1986)Google Scholar
Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, ICJ Reports 1996, p. 226 (1996)Google Scholar
Armed Activities on the Territory of the Congo (Democratic Republic of the Congo v. Uganda), Judgment, ICJ Reports 2005, p. 168 (2005)Google Scholar
Jensen, Eric Talbot, ‘Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense’ (2002) 38 Stanford Journal of International Law 207Google Scholar
Johns, Fleur, ‘Author’s Response – Fleur Johns, Non-Legality in International Law: Unruly Law, Cambridge, Cambridge University Press, 2013, pp. 259, ISBN 9781107014015’ (2014) 27 Leiden Journal of International Law 966Google Scholar
Johns, FleurData, Detection, and the Redistribution of the Sensible in International Law’ (2017) 111 American Journal of International Law 57Google Scholar
Johns, FleurFrom Planning to Prototypes: New Ways of Seeing Like a State’ (2019) 82 The Modern Law Review 833Google Scholar
Johns, Fleur Non-legality in International Law: Unruly Law, Cambridge University Press 2013Google Scholar
Johns, Fleur and Riles, Annelise, ‘Beyond Bunker and Vaccine: The DNC Hack as a Conflict of Laws Issue’ (2017) 110 AJIL Unbound 347CrossRefGoogle Scholar
Johns, Fleur, Skouteris, Thomas and Werner, Wouter, ‘Editors’ Introduction: Alejandro Álvarez and the Launch of the Periphery Series’ (2006) 19 Leiden Journal of International Law 875Google Scholar
Johnson, David R. and Post, David, ‘Law and Borders: The Rise of Law in Cyberspace’ (1995) 48 Stanford Law Review 1367Google Scholar
Joyner, Christopher C. and Lotrionte, Catherine, ‘Information Warfare as International Coercion: Elements of a Legal Framework’ (2001) 12 European Journal of International Law 825CrossRefGoogle Scholar
Jurich, Jon P., ‘Cyberwar and Customary International Law: The Potential of a “Bottom-up” Approach to an International Law of Information Operations’ (2008) 9 Chicago Journal of International Law 275Google Scholar
Kabinetsreactie op het AIV/CAVV-advies Digitale Oorlogvoering, DVB/VD-38/12, April 6, 2012, www.tweedekamer.nl/debat_en_vergadering/commissievergaderingen/details?id=2012A01586 (July 15, 2020)Google Scholar
Kammerhofer, Jörg, ‘Lawmaking by Scholars,’ in: Research Handbook on the Theory and Practice of International Lawmaking, Brölmann, Catherine and Radi, Yannick (eds.), Elgar 2016, 305326Google Scholar
Kanuck, Sean P., ‘Information Warfare: New Challenges for Public International Law’ (1996) 37 Harvard International Law Journal 272Google Scholar
Kell, Douglas, ‘The Matthew Effect in Science – Citing the Most Cited,’ http://blogs.bbsrc.ac.uk/index.php/2009/03/the-matthew-effect-in-science/ (May 16, 2016)Google Scholar
Kelly, Spencer, ‘Hackers Outwit Online Banking Identity Security Systems,’ BBC News, March 8, 2012, www.bbc.com/news/technology-16812064 (July 15, 2020)Google Scholar
Kendall, Sara, ‘On Academic Production and the Politics of Inclusion’ (2016) 29 Leiden Journal of International Law 617Google Scholar
Kennedy, David, ‘The Politics of the Invisible College: International Governance and the Politics of Expertise’ (2001) 5 European Human Rights Law Review 463Google Scholar
Kennedy, DavidTheses about International Law Discourse,’ in: German Yearbook of International Law, Delbrück, Jost, Hofmann, Rainer and Zimmermann, Andreas (eds.), Duncker & Humblot 1980, 354391Google Scholar
Kent, Avidan and Trinidad, Jamie, ‘International Law Scholars as Amici Curiae: An Emerging Dialogue (of the Deaf)?’ (2016) 29 Leiden Journal of International Law 1081Google Scholar
Kerschischnig, Georg, Cyberthreats and International Law, Eleven International Publishing 2012Google Scholar
Kessler, Oliver and Werner, Wouter, ‘Expertise, Uncertainty, and International Law: A Study of the Tallinn Manual on Cyberwarfare’ (2013) 26 Leiden Journal of International Law 793Google Scholar
Kilovaty, Ido, ‘Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the United Nations Charter’ (2015) 4 Journal of Law and Cyber Warfare 210Google Scholar
Kittichaisaree, Kriangsak, Public International Law of Cyberspace, Springer 2017Google Scholar
Klabbers, Jan, ‘On Epistemic Universalism and the Melancholy of International Law’ (2019) 29 European Journal of International Law 1057Google Scholar
Kodar, Erki, ‘Computer Network Attacks in the Grey Areas of Jus ad Bellum and Jus in Bello’ (2009) 9 Baltic Yearbook of International Law Online 133Google Scholar
Koenders, Bert, Minister of Foreign Affairs of the Kingdom of the Netherlands,Foreword,’ in: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Schmitt, Michael N. (ed.), Cambridge University Press 2017, xxv–xxviiGoogle Scholar
Koh, Harold Hongju, ‘International Law in Cyberspace’ (2012) 54 Harvard International Law Journal Online 1Google Scholar
Kondoch, Boris, ‘Jus ad Bellum and Cyber Warfare in Northeast Asia’ (2013) 6 Journal of East Asia and International Law 459Google Scholar
Konzett, Carmen, Any Questions? Identity Construction in Academic Conference Discussions, Walter de Gruyter 2012CrossRefGoogle Scholar
Korzak, Elaine, The 2015 GGE Report: What Next for Norms in Cyberspace?, on ‘Lawfare,’ September 23, 2015, www.lawfareblog.com/2015-gge-report-what-next-norms-cyberspace (July 15, 2020)Google Scholar
Koskenniemi, Martti, ‘Between Commitment and Cynicism: Outline for a Theory of International Law as Practice,’ in: Collection of Essays by Legal Advisers of States, Legal Advisers of International Organizations and Practitioners in the Field of International Law, United Nations 1999, 495523Google Scholar
Koskenniemi, Martti From Apology to Utopia: The Structure of International Legal Argument, Cambridge University Press 2005Google Scholar
Koskenniemi, Martti ‘International Legal Theory and Doctrine,’ Max Planck Encyclopedia of Public International Law 2007, Rüdiger Wolfrum (dir.), https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1618 (July 15, 2020)Google Scholar
Koskenniemi, MarttiLaw, Teleology and International Relations: An Essay in Counterdisciplinarity’ (2012) 26 International Relations 3Google Scholar
Koskenniemi, MarttiLetter to the Editors of the Symposium’ (1999) 93 American Journal of International Law 351Google Scholar
Koskenniemi, Martti (ed.), Sources of International Law, Ashgate 2000Google Scholar
Koskenniemi, Martti The Gentle Civilizer of Nations, Cambridge University Press 2001Google Scholar
Koskenniemi, MarttiThe Politics of International Law – 20 Years Later’ (2009) 20 European Journal of International Law 7Google Scholar
Kostyuk, Nadiya and Zhukov, Yuri M., ‘Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?’ (2019) 63 Journal of Conflict Resolution 317Google Scholar
Koulen, Sarah-Jane, ‘Blind Justice and the Portraits on the Wall,’ in: Backstage Practices of Transnational Law, Lianne, J. M. Boer and Stolk, Sofia (eds.), Routledge 2019, 91107Google Scholar
Kratochwil, Friedrich V., Rules, Norms, and Decisions: On the Conditions of Practical and Legal Reasoning in International Relations and Domestic Affairs, Cambridge University Press 1989Google Scholar
Kratochwil, Friedrich V. The Status of Law in World Society: Meditations on the Role and Rule of Law, Cambridge University Press 2014Google Scholar
Lam, Christina, ‘A Slap on the Wrist: Combatting Russia’s Cyber Attack on the 2016 U.S. Presidential Election’ (2018) 59 Boston College Law Review 2167Google Scholar
Langner, Ralph, ‘Cracking Stuxnet, a 21st-Century Cyber Weapon,’ March 2011, www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon?language=en#t-5628 (July 15, 2020)Google Scholar
LaRae-Perez, Cassandra, ‘Note: Economic Sanctions as a Use of Force: Re-evaluating the Legality of Sanctions from an Effects-Based Perspective’ (2002) 20 Boston University International Law Journal 161Google Scholar
Larson, Erik, Hurtado, Patricia and Strohm, Chris, ‘Iranians Hacked from Wall Street to New York Dam, U.S. Says,’ Bloomberg.com, March 24, 2016, www.bloomberg.com/news/articles/2016–03-24/u-s-charges-iranian-hackers-in-wall-street-cyberattacks-im6b43tt (July 15, 2020)Google Scholar
Latour, Bruno, The Making of Law: An Ethnography of the Conseil d’État, transl. Marina Brilman and Alain Pottage (revised by the author), Polity Press 2010Google Scholar
Latour, Bruno and Woolgar, Steve, Laboratory Life: The Construction of Scientific Facts, Princeton University Press 1986Google Scholar
Lawson, Sean, ‘Does 2016 Mark the End of Cyber Pearl Harbor Hysteria?,’ Forbes, December 7, 2016, www.forbes.com/sites/seanlawson/2016/12/07/does-2016-mark-the-end-of-cyber-pearl-harbor-hysteria/#7d486d7722c2 (July 15, 2020)Google Scholar
Leão Soares Pereira, Luíza, ‘International Lawyers as Lawmakers’ (PhD, Cambridge University 2021, forthcoming)Google Scholar
Lee, Youngjae, ‘International Consensus as Persuasive Authority in the Eighth Amendment’ (2007) 156 University of Pennsylvania Law Review 63Google Scholar
Levi, Ron and Valverde, Mariana, ‘Studying Law by Association: Bruno Latour Goes to the Conseil d’État’ (2008) 33 Law & Social Inquiry 805Google Scholar
Li, Sheng, ‘When Does Internet Denial Trigger the Right of Armed Self-Defense?’ (2013) 38 Yale Journal of International Law 179Google Scholar
Lillich, Richard B., ‘Economic Coercion and the International Legal Order’ (1975) 51 International Affairs 358Google Scholar
Lin, Herbert S., ‘Offensive Cyber Operations and the Use of Force’ (2010) 4 Journal of National Security Law & Policy 63Google Scholar
Lincoln, Bruce, Authority: Construction and Corrosion, The University of Chicago Press 1994Google Scholar
Little, Laura E., ‘Hiding with Words: Obfuscation, Avoidance, and Federal Jurisdiction Opinions’ (1998) 46 UCLA Law Review 75Google Scholar
Lodder, Arno R. and Lianne, J. M. Boer, ‘Cyberwar? What War? Meer in het Bijzonder: Welk Recht?’ (2012) 38 Justitiële Verkenningen 52Google Scholar
Lynch, Michael, ‘Circumscribing Expertise: Membership Categories in Courtroom Testimony,’ in: States of Knowledge: The Co-production of Science and the Social Order, Jasanoff, Sheila (ed.), Routledge 2004, 161180Google Scholar
Mačák, Kubo, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-Makers’ (2017) 30 Leiden Journal of International Law 877Google Scholar
Mačák, KuboFrom the Vanishing Point Back to the Core: The Impact of the Development of the Cyber Law of War on General International Law,’ in: Defending the Core, Rõigas, Henry, Jakschis, Raik, Lindström, Lauri and Minárik, Tomaš (eds.), NATO CCD COE Publications 2017, 114Google Scholar
Mačák, KuboIs the International Law of Cyber Security in Crisis?,’ in: Proceedings of the 8th International Conference on Cyber Conflict: Cyber Power, Pissanidis, Nikolaos, Rõigas, Henry and Veenendaal, Matthijs (eds.), NATO CCD COE Publications 2016, 127139Google Scholar
Mačák, KuboOn the Shelf, but Close at Hand: The Contribution of Non-State Initiatives to International Cyber Law’ (2019) 113 AJIL Unbound 81Google Scholar
Macfarlane, Robert, Landmarks, Penguin 2016Google Scholar
Mahbuba, Dilruba and Rousseau, Ronald, ‘The Matthew Effect and a Relation with Concept Symbols and Defaults’ (2011) 58 Annals of Library and Information Studies 335Google Scholar
Maogoto, Jackson, Technology and the Law on the Use of Force: New Security Challenges in the Twenty-First Century, Routledge 2015Google Scholar
Marcus, Sharon, Love, Heather and Best, Stephen, ‘Building a Better Description’ (2016) 135 Representations 1Google Scholar
Markovits, Richard S., ‘Learning from the Foreigners: A Response to Justice Scalia’s and Professor Levinson’s Professional Moral Parochialism’ (2003) 39 Texas International Law Journal 367Google Scholar
Marks, Susan, ‘False Contingency’ (2009) 62 Current Legal Problems 1Google Scholar
Martin, James R. and White, Peter R. R., The Language of Evaluation, Palgrave 2005Google Scholar
Mauranen, Anna, Cultural Differences in Academic Rhetoric: A Textlinguistic Study, Peter Lang 1993Google Scholar
McInnis, Raymond G. and Symes, Dal, ‘David Riesman and the Concept of Bibliographic Citation’ (1988) 49 College & Research Libraries 387CrossRefGoogle Scholar
Mégret, Frédéric, ‘Thinking about What International Humanitarian Lawyers “Do”: An Examination of the Laws of War as a Field of Professional Practice,’ in: The Law of International Lawyers: Reading Martti Koskenniemi, Werner, Wouter, de Hoon, Marieke and Galán, Alexis (eds.), Cambridge University Press 2017, 265296Google Scholar
Meierhenrich, Jens, ‘The Practice of International Law: A Theoretical Analysis’ (2014) 76 Law and Contemporary Problems 1Google Scholar
Merry, Sally Engle, ‘New Legal Realism and the Ethnography of Transnational Law’ (2006) 31 Law & Social Inquiry 975Google Scholar
Mertz, Elizabeth, The Language of Law School: Learning to ‘Think Like a Lawyer,’ Oxford University Press 2007Google Scholar
Michael, James B., Wingfield, Thomas C. and Wijesekera, Duminda, ‘Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System’ (2013) 2013 IEEE 37th Annual Computer Software and Applications Conference 621Google Scholar
Modderkolk, Huib and Zetter, Kim, ‘AIVD Speelde Cruciale Rol bij Sabotage Kernprogramma Iran,’ De Volkskrant, September 2, 2019, www.volkskrant.nl/nieuws-achtergrond/aivd-speelde-cruciale-rol-bij-sabotage-kernprogramma-iran~ba24df9f/?referer=https%3A%2F%2Fwww.google.com%2F (July 15, 2020)Google Scholar
Moore, Stephen, ‘Cyber Attacks and the Beginnings of an International Cyber Treaty’ (2013) 39 North Carolina Journal of International Law & Commercial Regulation 223Google Scholar
Morell, Teresa, ‘International Conference Paper Presentations: A Multimodal Analysis to Determine Effectiveness’ (2015) 37 English for Specific Purposes 137Google Scholar
Morth, Todd A., ‘Considering Our Position: Viewing Information Warfare as a Use of Force Prohibited by Article 2(4) of the UN Charter’ (1998) 30 Case Western Reserve Journal of International Law 567Google Scholar
Musil, Robert, The Man without Qualities, [Der Mann ohne Eigenschaften], transl. Sophie Wilkins and Burton Pike, Picador 2011Google Scholar
Nakashima, Ellen, ‘U.S. Developing Sanctions against China over Cyberthefts,’ Washington Post, August 30, 2015, www.washingtonpost.com/world/national-security/administration-developing-sanctions-against-china-over-cyberespionage/2015/08/30/9b2910aa-480b-11e5-8ab4-c73967a143d3_story.html (July 15, 2020)Google Scholar
Navarrete, Iñaki, ‘L’Espionnage en Temps de Paix en Droit International Public’ (2016) 53 Canadian Yearbook of International Law/Annuaire canadien de droit international 1Google Scholar
Neff, Stephen C., War and the Law of Nations: A General History, Cambridge University Press 2005Google Scholar
Nguyen, Reese, ‘Navigating Jus ad Bellum in the Age of Cyber Warfare’ (2013) 101 California Law Review 1079Google Scholar
Nimis, Steve, ‘Fussnoten: Das Fundament der Wissenschaft’ (1984) 17 Arethusa 105Google Scholar
Noll, Gregor, ‘Analogy at War: Proportionality, Equality and the Law of Targeting,’ in: Netherlands Yearbook of International Law 2012, Nijman, Janne E. and Werner, Wouter G. (eds.), T.M.C. Asser Press 2013, 205230Google Scholar
Noll, GregorInternational Law as Discipline and Doctrine,’ in: Routledge Handbook of International Law and the Humanities, Chalmers, Shane and Pahuja, Sundhya (eds.), Routledge 2021, 3644Google Scholar
Noll, GregorTheorizing Jurisdiction,’ in: The Oxford Handbook of the Theory of International Law, Orford, Anne, Hoffmann, Florian and Clark, Martin (eds.), Oxford University Press 2017, 600617Google Scholar
North Atlantic Council, ‘Wales Summit Declaration,’ September 5, 2014, www.nato.int/cps/en/natohq/official_texts_112964.htm (July 15, 2020)Google Scholar
North Atlantic Treaty, 4 April 1949, 34 UNTS 243Google Scholar
Nouwen, Sarah M. H., ‘“As You Set out for Ithaka”: Practical, Epistemological, Ethical, and Existential Questions about Socio-Legal Empirical Research in Conflict’ (2014) 27 Leiden Journal of International Law 227Google Scholar
Ohlin, Jens David, ‘Did Russian Cyber Interference in the 2016 Election Violate International Law?’ (2016) 95 Texas Law Review 1579Google Scholar
Orakhelashvili, Alexander, ‘Natural Law and Justice,’ Max Planck Encyclopedia of Public International Law 2007, Rüdiger Wolfrum (dir.), https://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e730?rskey=ijHlQr&result=19&prd=EPIL (July 15, 2020)Google Scholar
Orford, Anne, ‘Critical Intimacy: Jacques Derrida and the Friendship of Politics’ (2005) 6 German Law Journal 31Google Scholar
Orford, AnneEpilogue: Critical Intimacy and the Performance of International Law,’ in: Backstage Practices of Transnational Law, Lianne, J. M. Boer and Stolk, Sofia (eds.), Routledge 2019, 174178Google Scholar
Orford, AnneIn Praise of Description’ (2012) 25 Leiden Journal of International Law 609Google Scholar
Orford, AnneOn International Legal Method’ (2013) 1 London Review of International Law 166Google Scholar
Orford, Anne Reading Humanitarian Intervention: Human Rights and the Use of Force in International Law, Cambridge University Press 2003CrossRefGoogle Scholar
Orford, AnneScientific Reason and the Discipline of International Law’ (2014) 25 European Journal of International Law 369Google Scholar
Ottis, Rain, ‘Analysis of the 2007 Cyber Attacks against Estonia from the Information Warfare Perspective,’ in: Proceedings of the 7th European Conference on Information Warfare and Security, Remenyi, Dan (ed.), Academic Publishing Limited 2008, 163168Google Scholar
Oxford English Dictionary Online, “attend, v.,” Oxford University Press, June 2020, www.oed.com/view/Entry/12780 (July 15, 2020)Google Scholar
Oxford English Dictionary Online “doctrine, n.,” Oxford University Press, June 2020, www.oed.com/view/Entry/56322 (July 15, 2020)Google Scholar
Pareto, Vilfredo, The Mind and Society, volume I, Harcourt, Brace and Company 1935Google Scholar
Pascual, Esther, Imaginary Trialogues: Conceptual Blending and Fictive Interaction in Criminal Courts, LOT 2002Google Scholar
Paul, Danette, ‘In Citing Chaos: A Study of the Rhetorical Use of Citations’ (2000) 14 Journal of Business and Technical Communication 185Google Scholar
Paust, Jordan J. and Blaustein, Albert P., ‘The Arab Oil Weapon – A Threat to International Peace’ (1974) 68 American Journal of International Law 410Google Scholar
Peevers, Charlotte, The Politics of Justifying Force: The Suez Crisis, the Iraq War, and International Law, Oxford University Press 2013Google Scholar
Peil, Michael, ‘Scholarly Writings as a Source of Law: A Survey of the Use of Doctrine by the International Court of Justice’ (2012) 1 Cambridge Journal of International and Comparative Law 136Google Scholar
Pellet, Alain and Müller, Daniel, ‘Article 38,’ in: The Statute of the International Court of Justice: A Commentary, Andreas Zimmermann, Christian J. Tams, Karin Oellers-Frahm and Christian Tomuschat (eds.), Oxford University Press 2019 (3rd ed.), 819962Google Scholar
Perelman, Chaïm and Olbrechts-Tyteca, Lucie, The New Rhetoric: A Treatise on Argumentation, University of Notre Dame Press 1969Google Scholar
Permanent Court of International Justice, ‘Advisory Committee of Jurists, Procès-Verbaux of the Proceedings of the Committee, June 16th–July 24th 1920, The Hague,’ www.icj-cij.org/pcij/serie_D/D_proceedings_of_committee_annexes_16june_24july_1920.pdf (May 15, 2016)Google Scholar
Peters, Anne, ‘International Legal Scholarship Under Challenge,’ in: International Law as a Profession, Nollkaemper, André, d’Aspremont, Jean, Gazzini, Tarcisio and Werner, Wouter (eds.), Cambridge University Press 2017, 117159Google Scholar
Petrov, Anton O., Expert Laws of War: Restating and Making Law in Expert Processes, Edward Elgar 2020Google Scholar
Philadelphoff-Puren, Nina and Rush, Peter, ‘Fatal (F)laws: Law, Literature and Writing’ (2003) 14 Law and Critique 191Google Scholar
Pirker, Benedikt and Smolka, Jennifer, ‘The Future of International Law Is Cognitive – International Law, Cognitive Sociology and Cognitive Pragmatics’ (2019) 20 German Law Journal 430Google Scholar
PoKempner, Dinah, ‘Squinting Through the Pinhole: A Dim View of Human Rights from Tallinn 2.0’ (2017) 95 Texas Law Review 1599Google Scholar
Poulson, Kevin, ‘“Cyberwar” and Estonia’s Panic Attack,’ wired.com, August 22, 2007, www.wired.com/2007/08/cyber-war-and-e/ (July 15, 2020)Google Scholar
Preciado, Michael, ‘If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure from Cyber Warfare’ (2012) 1 Journal of Law & Cyber Warfare 99Google Scholar
Pronto, Arnold N., ‘Some Thoughts on the Making of International Law – Review of Boyle, Alan and Chinkin, Christine. The Making of International Law. New York: Oxford University Press, 2007. pp. 288. $95. ISBN: 9780199248193’ (2008) 19 European Journal of International Law 601Google Scholar
Raboin, Bradley, ‘Corresponding Evolution: International Law and the Emergence of Cyber Warfare’ (2011) 31 Journal of the National Association of Administrative Law Judiciary 602Google Scholar
Rajkovic, Nikolas M., Aalberts, Tanja E. and Gammeltoft-Hansen, Thomas (eds.), The Power of Legality: Practices of International Law and Their Politics, Cambridge University Press 2016Google Scholar
Randelzhofer, Albrecht, ‘Article 2(4),’ in: The Charter of the United Nations: A Commentary, Simma, Bruno (ed.), Oxford University Press 2002, 112136Google Scholar
Remus, Titiriga, ‘Cyber-Attacks and International Law of Armed Conflicts: A “Jus Ad Bellum” Perspective’ (2013) 8 Journal of International Commercial Law and Technology 179Google Scholar
Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, 22 July 2015, A/70/174Google Scholar
Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, 24 June 2013, A/68/98*Google Scholar
Rheindorf, Markus, Revisiting the Toolbox of Discourse Studies: New Trajectories in Methodology, Open Data, and Visualization, Palgrave Macmillan 2019Google Scholar
Rid, Thomas, ‘Cyber War Will Not Take Place’ (2011) 35 Journal of Strategic Studies 5CrossRefGoogle Scholar
Riles, Annelise, ‘A New Agenda for the Cultural Study of Law: Taking on the Technicalities’ (2005) 53 Buffalo Law Review 973Google Scholar
Riles, Annelise Collateral Knowledge: Legal Reasoning in the Global Financial Markets, The University of Chicago Press 2011Google Scholar
Riles, AnneliseInfinity within the Brackets’ (1998) 25 American Ethnologist 378Google Scholar
Riles, AnneliseModels and Documents: Artefacts of International Legal Knowledge’ (1999) 48 International and Comparative Law Quarterly 805Google Scholar
Riles, Annelise The Network Inside Out, University of Michigan Press 2000Google Scholar
Roberts, Anthea, Is International Law International? A Study in the Globalization of Legal Education and Scholarship, Oxford University Press 2017Google Scholar
Rodgers, John, ‘Whose Citations Are They?’ (2010) 9 Journal of Medical English Education 94Google Scholar
Rõigas, Henry and Minárik, Tomáš, 2015 UN GGE Report: Major Players Recommending Norms of Behaviour, Highlighting Aspects of International Law, CCDCOE INCYDER Articles, June 26, 2016, https://ccdcoe.org/incyder-articles/2015-un-gge-report-major-players-recommending-norms-of-behaviour-highlighting-aspects-of-international-law/ (July 15, 2020)Google Scholar
Roscini, Marco, Cyber Operations and the Use of Force in International Law, Oxford University Press 2014Google Scholar
Roscini, MarcoWorld Wide Warfare: Jus ad Bellum and the Use of Cyber Force,’ in: Max Planck Yearbook of United Nations Law, von Bogdandy, Armin and Wolfrum, Rüdiger (eds.), Koninklijke Brill N.V. 2010, 85130Google Scholar
Mansfield Park (1999), Miramax Films, BBC Films and Intermedia Films in association with the Arts Council of England, written and directed by Patricia RozemaGoogle Scholar
Ruiz-Garrido, Miguel F., ‘Intensifying Adverbs in Academic Spoken Discourse: A Contrastive Study between English and Spanish,’ in: Multimodal Analysis in Academic Settings: From Research to Teaching, Belinda Crawford Camiciottoli and Inmaculada Fortanet-Gómez (eds.), Routledge 2015, 6182Google Scholar
Ruiz-Madrid, M. Noelia and Fortanet-Gómez, Inmaculada, ‘A Multimodal Discourse Analysis Approach to Humour in Conference Presentations: The Case of Autobiographic References’ (2015) 173 Procedia – Social and Behavioral Sciences 246Google Scholar
Rush, Peter, ‘An Altered Jurisdiction – Corporeal Traces of Law’ (1997) 6 Griffith Law Review 144Google Scholar
Ruys, Tom, ‘Armed Attack’ and Article 51 of the UN Charter: Evolutions in Customary Law and Practice, Cambridge University Press 2010Google Scholar
Šadl, Urška, ‘Case – Case-Law – Law: Ruiz Zambrano as an Illustration of How the Court of Justice of the European Union Constructs Its Legal Arguments’ (2013) 9 European Constitutional Law Review 205Google Scholar
Sahlane, Ahmed, ‘Argumentation and Fallacy in the Justification of the 2003 War on Iraq’ (2012) 26 Argumentation 459Google Scholar
Sala, Michele, ‘Interpersonal and Interactional Markers in Legal Research Articles,’ in: Interpersonality in Legal Genres, Breeze, Ruth, Gotti, Maurizio and Carmen Sancho, Guinda (eds.), Peter Lang 2014, 6386Google Scholar
Sala, MichelePlain Language in Legal Studies: A Corpus-Based Study’ (2014) 16 European Journal of Law Reform 651CrossRefGoogle Scholar
Sander, Barrie, ‘Cyber Insecurity and the Politics of International Law’ (2017) 6 ESIL Reflections 1Google Scholar
Sander, BarrieThe Sound of Silence: International Law and the Governance of Peacetime Cyber Operations,’ in: Silent Battle, Minárik, Tomaš, Alatalu, Siim, Biondi, Stefano, Signoretti, Massimiliano, Tolga, Ihsan Burak and Visky, Gabor (eds.), NATO CCD COE Publications 2019, 121Google Scholar
Sanger, David E., Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power, Crown Publishers 2012Google Scholar
Sanger, David E. ‘U.S. and China Seek Arms Deal for Cyberspace,’ New York Times, September 19, 2015, www.nytimes.com/2015/09/20/world/asia/us-and-china-seek-arms-deal-for-cyberspace.html?_r=1 (July 15, 2020)Google Scholar
Sanger, David E. and Perlroth, Nicole, ‘U.S. Escalates Online Attacks on Russia’s Power Grid,’ New York Times, June 15, 2019, www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html (July 15, 2020)Google Scholar
Schaller, Christian, ‘Beyond Self-Defense and Countermeasures: A Critical Assessment of the Tallinn Manual’s Conception of Necessity’ (2017) 95 Texas Law Review 1619Google Scholar
Schauer, Frederick, ‘Authority and Authorities’ (2008) 94 Virginia Law Review 1931Google Scholar
Schlag, Pierre, ‘The Faculty Workshop,’ University of Colorado Law School Legal Studies Research Paper Series, Working Paper Number 11–12, June 3, 2011 https://scholar.law.colorado.edu/cgi/viewcontent.cgi?article=1144&context=articles (July 15, 2020)Google Scholar
Schlag, PierreThe Problem of the Subject’ (1991) 69 Texas Law Review 1627Google Scholar
Schmitt, Michael N., ‘Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework’ (1999) 37 Columbia Journal of Transnational Law 885Google Scholar
Schmitt, Michael N.Cyber Operations and the Jus Ad Bellum Revisited’ (2011) 56 Villanova Law Review 569Google Scholar
Schmitt, Michael N. CyCon 2012 | Michael Schmitt: Tallinn Manual Part I, www.youtube.com/watch?v=wY3uEo-Itso (July 15, 2020)Google Scholar
Schmitt, Michael N. CyCon 2012 | Michael Schmitt: Tallinn Manual Part II, www.youtube.com/watch?v=f_TC3y7g4aA (July 15, 2020)Google Scholar
Schmitt, Michael N. CyCon 2012 | Michael Schmitt: Tallinn Manual Part III, www.youtube.com/watch?v=iPdLtZEhofc (July 15, 2020)Google Scholar
Schmitt, Michael N. Global Conference on CyberSpace 2015, www.youtube.com/watch?v=re_ei2D1G7Q (July 15, 2020)Google Scholar
Schmitt, Michael N. ILD 2012 | Panel Discussion: Cyber Conflict and the Law of Armed Conflict, www.youtube.com/watch?v=sglT605YIu4 (July 15, 2020)Google Scholar
Schmitt, Michael N. International Law and Cyber Warfare, www.c-span.org/video/?311806–1/panelists-explain-new-cyber-warfare-manual (July 15, 2020)Google Scholar
Schmitt, Michael N.International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed’ (2012) 54 Harvard International Law Journal Online 13Google Scholar
Schmitt, Michael N. LENS Conference 2013 | Michael N. Schmitt, The Law of Cyberwar: The Tallinn Manual, www.youtube.com/watch?v=vQBiLBrmJJI (July 15, 2020)Google Scholar
Schmitt, Michael N. Michael N. Schmitt: PILAC Lecture on Cyber Operations and IHL: Fault Lines and Vectors, www.youtube.com/watch?v=ZWwrVAMSOT4 (July 15, 2020)Google Scholar
Schmitt, Michael N.Preemptive Strategies in International Law’ (2003) 24 Michigan Journal of International Law 513Google Scholar
Schmitt, Michael N. Re-conceptualizing International Law Frameworks in Response to the Threat of Cyber Warfare, www.youtube.com/watch?v=jDvP-z-f4tc (July 15, 2020)Google Scholar
Schmitt, Michael N.The Interpretive Guidance on the Notion of Direct Participation in Hostilities: A Critical Analysis’ (2010) 1 Harvard National Security Journal 5Google Scholar
Schmitt, Michael N. Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t, on ‘Just Security,’ February 9, 2017, www.justsecurity.org/37559/tallinn-manual-2–0-international-law-cyber-operations/ (July 15, 2020)Google Scholar
Schmitt, Michael N. The Tallinn Manual on the International Law Applicable to Cyber Warfare, https://brown.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=1962891D-B51E-4B88-BB05-A99F011762B4 (July 15, 2020)Google Scholar
Schmitt, Michael N.The “Use of Force” in Cyberspace: A Reply to Dr Ziolkowski,’ in: 4th International Conference on Cyber Conflict, Czosseck, Christian, Ottis, Rain and Ziolkowski, Katharina (eds.), NATO CCD COE Publications 2012, 311317Google Scholar
Schmitt, Michael N. (ed.), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge University Press 2013Google Scholar
Schmitt, Michael N. (ed.), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Cambridge University Press 2017Google Scholar
Schmitt, Michael N. and Blumbergs, Bernhard, Active Cyber Defense Case Studies, https://ccdcoe.org/cycon/2014/app.html (May 13, 2016)Google Scholar
Schmitt, Michael and Fahey, Sean, WannaCry and the International Law of Cyberspace, on ‘Just Security,’ December 22, 2017, www.justsecurity.org/50038/wannacry-international-law-cyberspace/ (July 15, 2020)Google Scholar
Schmitt, Michael N., Charles, H. B. Garraway and Dinstein, Yoram, The Manual on the Law of Non International Armed Conflict With Commentary, International Institute of Humanitarian Law 2006Google Scholar
Schmitt, Michael and Maurer, Tim, Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?, on ‘Just Security,’ August 24, 2017, www.justsecurity.org/44411/protecting-financial-data-cyberspace-precedent-progress-cyber-norms/ (July 15, 2020)Google Scholar
Schmitt, Michael N. and Vihul, Liis, International Cyber Law Politicized: The UN GGE’s Failure to Advance Cyber Norms, on ‘Just Security,’ June 30, 2017, www.justsecurity.org/42768/international-cyber-law-politicized-gges-failure-advance-cyber-norms/ (July 15, 2020)Google Scholar
Schweiger, Elisabeth, ‘Listening to Silence: “Targeted Killing” and the Politics of Silence in Customary International Law’ (PhD, University of Groningen 2018)Google Scholar
Segal, Adam, The Development of Cyber Norms at the United Nations Ends in Deadlock. Now What?, Council on Foreign Relations Blog, June 29, 2017, www.cfr.org/blog/development-cyber-norms-united-nations-ends-deadlock-now-what (July 15, 2020)Google Scholar
Shackelford, Scott J. and Andres, Richard B., ‘State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem’ (2011) 42 Georgetown Journal of International Law 971Google Scholar
SharpSr., Walter G., CyberSpace and the Use of Force, Aegis Research Corporation 1999Google Scholar
Shklar, Judith N., Legalism: An Essay on Law, Morals and Politics, Harvard University Press 1964Google Scholar
Shklar, Judith N. Legalism: Law, Morals, and Political Trials, Harvard University Press 1986Google Scholar
Siddiqui, Sabrina, ‘What the Mueller Report Tells Us about Trump, Russia and Obstruction,’ The Guardian, April 18, 2019, www.theguardian.com/us-news/ng-interactive/2019/apr/18/mueller-report-trump-russia-key-takeaways (July 15, 2020)Google Scholar
Silver, Daniel B., ‘Computer Network Attack as a Use of Force under Article 2(4) of the United Nations Charter,’ in: Computer Network Attack and International Law, Schmitt, Michael N. and O’Donnell, Brian T. (eds.), Naval War College 2002, 7398Google Scholar
Singer, Peter W., ‘Stuxnet and Its Hidden Lessons on the Ethics of Cyberweapons’ (2015) 47 Case Western Reserve Journal of International Law 79Google Scholar
Sivakumaran, Sandesh, ‘The Influence of Teachings of Publicists on the Development of International Law’ (2017) 66 International and Comparative Law Quarterly 1Google Scholar
Sklerov, Matthew J., ‘Solving the Dilemma of State Responses to Cyberattacks: A Justification for the Use of Active Defenses against States Who Neglect Their Duty to Prevent’ (2009) 201 Military Law Review 1Google Scholar
Skouteris, Thomas, ‘The New Tribunalism: Strategies of (De)Legitimation in the Era of International Adjudication’ (2006) 17 Finnish Yearbook of International Law 307Google Scholar
Small, Henry G., ‘Cited Documents as Concept Symbols’ (1978) 8 Social Studies of Science 327Google Scholar
Smolka, Jennifer and Pirker, Benedikt, ‘International Law and Pragmatics: An Account of Interpretation in International Law’ (2016) 5 International Journal of Language & Law 1Google Scholar
Sperduti, Giuseppe, ‘Consensus in International Law’ (1976) 2 Italian Yearbook of International Law 33Google Scholar
Spiermann, Ole, ‘“Who Attempts Too Much Does Nothing Well”: The 1920 Advisory Committee of Jurists and the Statute of the Permanent Court of International Justice’ (2003) 73 British Yearbook of International Law 187Google Scholar
Stappert, Nora, ‘A New Influence of Legal Scholars? The Use of Academic Writings at International Criminal Courts and Tribunals’ (2018) 31 Leiden Journal of International Law 963Google Scholar
Stappert, NoraPractice Theory and Change in International Law: Theorizing the Development of Legal Meaning through the Interpretive Practices of International Criminal Courts’ (2020) 12 International Theory 33Google Scholar
Statute of the International Court of Justice, 26 June 1945, 1 UNTS XVIGoogle Scholar
Stinissen, Jan, ‘A Legal Framework for Cyber Operations in Ukraine,’ in: Cyber War in Perspective: Russian Aggression against Ukraine, Geers, Kenneth (ed.), NATO CCD COE Publications 2015, 123134Google Scholar
Stolk, Sofia, ‘“The Record on Which History Will Judge Us Tomorrow”: Auto-History in the Opening Statements of International Criminal Trials’ (2015) 28 Leiden Journal of International Law 993Google Scholar
Stolk, Sofia and Vos, Renske, ‘International Legal Sightseeing’ (2020) 33 Leiden Journal of International Law 1Google Scholar
Sullivan, Gavin, ‘“Taking on the Technicalities” of International Law – Practice, Description, Critique: A Response to Fleur Johns’ (2017) 111 AJIL Unbound 181Google Scholar
Swales, John M., ‘Evaluation in Academic Speech: First Forays,’ in: Academic Discourse: New Insights into Evaluation, Del Lungo Camiciotti, Gabriella and Tognini Bonelli, Elena (eds.), Peter Lang 2004, 3154Google Scholar
Swanson, Lesley, ‘The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict’ (2010) 32 Loyola of Los Angeles International and Comparative Law Review 303Google Scholar
Tanodomdej, Papawadee, ‘The Tallinn Manuals and the Making of the International Law on Cyber Operations’ (2019) 13 Masaryk University Journal of Law and Technology 67Google Scholar
Terry, Patrick C. R., ‘“Don’t Do as I Do” – The US Response to Russian and Chinese Cyber Espionage and Public International Law’ (2018) 19 German Law Journal 613Google Scholar
The Secretariat of the Advisory Committee of Jurists, ‘Advisory Committee of Jurists, Documents presented to the Committee relating to existing plans for the establishment of a Permanent Court of International Justice,’ www.icj-cij.org/files/permanent-court-of-international-justice/serie_D/D_documents_to_comm_existing_plans.pdf (July 15, 2020)Google Scholar
The White House, Office of the Press Secretary, ‘Fact Sheet: President Xi Jinping’s State Visit to the United States,’ 25 September 2015, www.whitehouse.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states (July 15, 2020)Google Scholar
Thomas, Sarah and Hawes, Thomas P., ‘Reporting Verbs in Medical Journal Articles’ (1994) 13 English for Specific Purposes 129Google Scholar
Thorne, Frederick C., ‘The Citation Index: Another Case of Spurious Validity’ (1977) 33 Journal of Clinical Psychology 1157Google Scholar
Tikk, Eneken, Kadri Kaska and Liis Vihul, International Cyber Incidents: Legal Considerations, Cooperative Cyber Defence Centre of Excellence (CCD COE) 2010Google Scholar
Tindale, Christopher W., Fallacies and Argument Appraisal, Cambridge University Press 2007Google Scholar
Tolppa, Maria, Overview of the UN OEWG Developments: Continuation of Discussions on How International Law Applies in Cyberspace, CCDCOE INCYDER Articles, March 23, 2020, https://ccdcoe.org/library/publications/overview-of-un-oewg-developments-continuation-of-discussions-on-how-international-law-applies-in-cyberspace/ (July 15, 2020)Google Scholar
Traynor, Ian, ‘Russia Accused of Unleashing Cyberwar to Disable Estonia,’ The Guardian, May 17, 2007, www.theguardian.com/world/2007/may/17/topstories3.russia (July 15, 2020)Google Scholar
Trubek, David M., ‘Max Weber on Law and the Rise of Capitalism’ (1972) 1972 Wisconsin Law Review 720Google Scholar
Tsagourias, Nicholas, ‘Cyber Attacks, Self-Defence and the Problem of Attribution’ (2012) 17 Journal of Conflict and Security Law 229Google Scholar
Tsagourias, NicholasThe Legal Status of Cyberspace,’ in: Research Handbook on International Law and Cyberspace, Nicholas Tsagourias and Buchan, Russell (eds.), Edward Elgar Publishing 2015, 1329Google Scholar
Tsagourias, NicholasThe Tallinn Manual on the International Law Applicable to Cyber Warfare: A Commentary on Chapter II – The Use of Force,’ in: Yearbook of International Humanitarian Law 2012, Gill, Terry D., Geiß, Robin, Heinsch, Robert, McCormack, Tim, Paulussen, Christophe and Dorsey, Jessica (eds.), T.M.C. Asser Press 2014, 1943Google Scholar
UNIDIR, ‘Cyber Policy Portal,’ https://cyberpolicyportal.org/en/ (July 15, 2020)Google Scholar
United Nations General Assembly, First Committee, Seventy-third session, ‘Advancing Responsible State Behaviour in Cyberspace in the Context of International Security,’ October 18, 2018, A/C.1/73/L.37Google Scholar
UNODA, ‘Developments in the Field of Information and Telecommunications in the Context of International Security,’ 2019, www.un.org/disarmament/ict-security/ (July 15, 2020)Google Scholar
UNODA ‘Group of Governmental Experts,’ www.un.org/disarmament/group-of-governmental-experts/ (July 15, 2020)Google Scholar
UNODA ‘Open-Ended Working Group,’ www.un.org/disarmament/open-ended-working-group/ (July 15, 2020)Google Scholar
UNODC, Organized Crime, Emerging Crimes, ‘Cybercrime,’ 2016, www.unodc.org/unodc/en/cybercrime/index.html (July 15, 2020)Google Scholar
Valeiras Jurado, Julia, ‘A Multimodal Approach to Persuasion in Conference Presentations,’ in: Multimodal Analysis in Academic Settings: From Research to Teaching, Crawford Camiciottoli, Belinda and Fortanet-Gómez, Inmaculada (eds.), Routledge 2015, 108132Google Scholar
Valverde, Mariana, ‘“Non-legality” and Society: Fleur Johns, Non-legality in International Law: Unruly Law, Cambridge, Cambridge University Press, 2013, pp. 259, ISBN 9781107014015’ (2014) 27 Leiden Journal of International Law 961Google Scholar
van der Deijl, Emma, Argumentum ad Populum: Classificatie, Beoordeling en Presentatie van de Populistische Variant (MA, Leiden University 2017)Google Scholar
van Eemeren, Frans H., Strategic Maneuvering in Argumentative Discourse: Extending the Pragma-Dialectical Theory of Argumentation, John Benjamins 2010Google Scholar
van Hoof, Godefridus J. H., Rethinking the Sources of International Law, Kluwer Publishing 1983Google Scholar
van Keulen, Roos, Introducing a Critical Stylistic Analysis: How Linguistic Features Contributed to the Tallinn Manual’s Power Position (LLM, Vrije Universiteit Amsterdam 2018)Google Scholar
van Steenberghe, Raphaël, ‘Self-Defence in Response to Attacks by Non-State Actors in the Light of Recent State Practice: A Step Forward?’ (2010) 23 Leiden Journal of International Law 183Google Scholar
Vass, Holly, ‘Analysing Hedging in Legal Discourse Using Small-Scale and Large-Scale Corpora’ (2015) 3 Research in Corpus Linguistics 27Google Scholar
Veilige Wereld – Veilig Nederland, ‘The Hague Process: Courses on the International Law Applicable to Cyber Operations,’ Facebook, May 16, 2017, www.facebook.com/VeiligeWereldVeiligNederland/posts/1373386999405061:0 (July 15, 2020)Google Scholar
Ventola, Eija, ‘Interpersonal Choices in Academic Work,’ in: Linguistic Choice Across Genres: Variation in Spoken and Written English, Sanchez-Macarro, Antonia and Carter, Ronald (eds.), John Benjamins 1998, 117136Google Scholar
Ventola, EijaWhy and What Kind of Focus on Conference Presentations?,’ in: The Language of Conferencing, Ventola, Eija, Shalom, Celia and Thompson, Susan (eds.), Peter Lang 2002, 1550Google Scholar
Ventola, Eija, Shalom, Celia and Thompson, Susan, ‘Introduction,’ in: The Language of Conferencing, Ventola, Eija, Shalom, Celia and Thompson, Susan (eds.), Peter Lang 2002, 914Google Scholar
Venzke, Ingo, How Interpretation Makes International Law: On Semantic Change and Normative Twists, Oxford University Press 2012Google Scholar
Venzke, IngoSemantic Authority,’ in: Concepts for International Law: Contributions to Disciplinary Thought, d’Aspremont, Jean and Singh, Sahib (eds.), Elgar 2019, as downloaded from https://ssrn.com/abstract=2723851 (July 16, 2020)Google Scholar
Venzke, IngoUnderstanding the Authority of International Courts and Tribunals’ (2013) 14 Theoretical Inquiries in Law 381Google Scholar
Vernon, Thomas S. and Nissen, Lowell A., Reflective Thinking: The Fundamentals of Logic, Wadsworth Publishing Company 1968Google Scholar
Vienna Convention on the Law of Treaties, 23 May 1969, 1155 UNTS 331Google Scholar
Viswanathan, S., ‘“Illeism with a Difference” in Certain Middle Plays of Shakespeare’ (1969) 20 Shakespeare Quarterly 407Google Scholar
von Bernstorff, Jochen, ‘International Legal Scholarship as a Cooling Medium in International Law and Politics’ (2014) 25 European Journal of International Law 977Google Scholar
Vos, Renske, ‘Europe and the Sea of Stories: Operation Sophia in Four Absences’ (PhD, Vrije Universiteit Amsterdam 2021)Google Scholar
Waldock, Claud H. M., ‘The Regulation of the Use of Force by Individual States in International Law’ (1952) 81 RCADI 455Google Scholar
Wallace, David and Visger, Mark, ‘Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community’ (2017) 6 Journal of Law & Cyber Warfare 3Google Scholar
Walton, Douglas, Appeal to Popular Opinion, Pennsylvania State University Press 1999Google Scholar
Walton, Douglas and Macagno, Fabrizio, ‘Common Knowledge in Legal Reasoning about Evidence’ (2005) 3 International Commentary on Evidence 1Google Scholar
Wampole, Christy, ‘The Conference Manifesto,’ New York Times Opinionator, May 4, 2015, http://opinionator.blogs.nytimes.com/2015/05/04/the-conference-manifesto/?_r=0 (July 15, 2020)Google Scholar
Watkin, Kenneth, ‘The Cyber Road Ahead: Merging Lanes and Legal Challenges’ (2013) 89 International Law Studies 472Google Scholar
Watson, J. S., ‘Legal Theory, Efficacy and Validity in the Development of Human Rights Norms in International Law’ (1979) 1979 University of Illinois Law Forum 609Google Scholar
Waxman, Matthew C., ‘Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)’ (2011) 36 Yale Journal of International Law 421Google Scholar
Weber, Cynthia, ‘Performative States’ (1998) 27 Millennium 77Google Scholar
Weissbrodt, David, ‘Cyber-Conflict, Cyber-Crime, and Cyber-Espionage’ (2013) 22 Minnesota Journal of International Law 347Google Scholar
Weller, Marc, An International Use of Force in Salisbury?, on ‘EJIL: Talk!,’ March 14, 2018, www.ejiltalk.org/an-international-use-of-force-in-salisbury/ (July 15, 2020)Google Scholar
Werner, Wouter G., ‘Absence, Restatement and Imagination: The Tallinn Manual on International Law Applicable to Cyber Operations,’ in: Repetition and International Law, Cambridge University Press 2021, forthcoming (on file with the author)Google Scholar
Werner, Wouter G.Godot Was Always There: Customary Law as Restatement Practice,’ in: Repetition and International Law, Cambridge University Press 2021, forthcoming (on file with the author)Google Scholar
Werner, Wouter G.International Law: Between Legalism and Securitization,’ in: Security: Dialogue Across Disciplines, Bourbeau, Philippe (ed.), Cambridge University Press 2015, 196218Google Scholar
Werner, Wouter G.The Use of Law in International Political Sociology’ (2010) 4 International Political Sociology 304Google Scholar
Werner, Wouter G. and Lianne, J. M. Boer, ‘“It Could Probably Just as Well Be Otherwise”: Imageries of Cyberwar,’ in: Risk and the Regulation of Uncertainty in International Law, Ambrus, Mónika, Rayfuse, Rosemary and Werner, Wouter (eds.), Oxford University Press 2017, 3955Google Scholar
West, Robin, ‘Reconsidering Legalism’ (2003) 88 Minnesota Law Review 119Google Scholar
Wetlaufer, Gerald B., ‘Rhetoric and Its Denial in Legal Discourse’ (1990) 76 Virginia Law Review 1545Google Scholar
White, Howard D., ‘Citation Analysis and Discourse Analysis Revisited’ (2004) 25 Applied Linguistics 89Google Scholar
Wikipedia, ‘Schmitt Analysis,’ https://en.wikipedia.org/wiki/Schmitt_Analysis (July 15, 2020)Google Scholar
Wingfield, Thomas C., The Law of Information Conflict: National Security Law in Cyberspace, Aegis Research Corporation 2000Google Scholar
Winter, Steven L., ‘Transcendental Nonsense, Metaphoric Reasoning, and the Cognitive Stakes for Law’ (1988) 137 University of Pennsylvania Law Review 1105Google Scholar
Woltag, Johann-Christoph, Cyber Warfare: Military Cross-Border Computer Network Operations Under International Law, Intersentia 2014Google Scholar
Woltag, Johann-Christoph ‘Cyber Warfare,’ Max Planck Encyclopedia of Public International Law 2015, Rüdiger Wolfrum (dir.), http://opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e280?rskey=okuUsx&result=1&prd=EPIL (July 15, 2020)Google Scholar
Wolter, Detlev, The UN Takes a Big Step Forward on Cybersecurity, on ‘Arms Control Association,’ September 4, 2013, www.armscontrol.org/act/2013_09/The-UN-Takes-a-Big-Step-Forward-on-Cybersecurity (July 15, 2020)Google Scholar
Wood, Sir Michael, ‘Teachings of the Most Highly Qualified Publicists (Art. 38 (1) ICJ Statute),’ Max Planck Encyclopedia of Public International Law 2010, Rüdiger Wolfrum (dir.), http://opil.ouplaw.com.vu-nl.idm.oclc.org/view/10.1093/law:epil/9780199231690/law-9780199231690-e1480?rskey=DbiJzV&result=1&prd=OPIL (July 15, 2020)Google Scholar
Wortham, Anna, ‘Should Cyber Exploitation Ever Constitute a Demonstration of Hostile Intent That May Violate UN Charter Provisions Prohibiting the Threat or Use of Force?’ (2012) 64 Federal Communications Law Journal 643Google Scholar
Wright, Jeremy, Attorney General, QC, MP, ‘Cyber and International Law in the 21st Century,’ May 23, 2018, www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century (July 15, 2020)Google Scholar
Yang, Wenhsien, ‘Stance and Engagement: A Corpus-Based Analysis of Academic Spoken Discourse Across Science Domains’ (2014) 5 LSP Journal 62Google Scholar
Young, Katharine G., ‘The Minimum Core of Economic and Social Rights: A Concept in Search of Content’ (2008) 33 Yale Journal of International Law 113Google Scholar
Ziolkowski, Katharina C., ‘Computer Network Operations and the Law of Armed Conflict’ (2010) 49 Military Law and the Law of War Review 47Google Scholar
Ziolkowski, Katharina C.Ius ad bellum in Cyberspace – Some Thoughts on the “Schmitt-Criteria” for Use of Force,’ in: Proceedings of the 4th International Conference on Cyber Conflict, Czosseck, Christian, Ottis, Rain and Ziolkowski, Katharina (eds.), NATO CCD COE Publications 2012, 295309Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Bibliography
  • Lianne J. M. Boer, Vrije Universiteit, Amsterdam
  • Book: International Law As We Know It
  • Online publication: 01 October 2021
  • Chapter DOI: https://doi.org/10.1017/9781108676564.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Bibliography
  • Lianne J. M. Boer, Vrije Universiteit, Amsterdam
  • Book: International Law As We Know It
  • Online publication: 01 October 2021
  • Chapter DOI: https://doi.org/10.1017/9781108676564.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Bibliography
  • Lianne J. M. Boer, Vrije Universiteit, Amsterdam
  • Book: International Law As We Know It
  • Online publication: 01 October 2021
  • Chapter DOI: https://doi.org/10.1017/9781108676564.008
Available formats
×