Technology and the law on the use of force : (Record no. 183356)

000 -LEADER
fixed length control field 05672cam a2200433 i 4500
001 - CONTROL NUMBER
control field 18174741
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241111154408.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140603s2015 enk b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014021702
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780415694339 (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780203716052(ebk)
040 ## - CATALOGING SOURCE
Language of cataloging eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number KZ6718
Item number .M36 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 341.6/3
DDC Edition number 23
Author Mark MAO
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Maogoto, Jackson Nyamuya,
Dates associated with a name 1975-
245 10 - TITLE STATEMENT
Title Technology and the law on the use of force :
Remainder of title new security challenges in the twenty first century /
Statement of responsibility, etc. Jackson Maogoto.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York :
Name of producer, publisher, distributor, manufacturer Routledge,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 111 pages ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Routledge research in international law
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 93-101) and index.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 1# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Use of force : displaced twentieth-century rules, norms and standards? -- Revolution in military affairs : hi-tech weaponry, low-tech legal safeguards -- The fourth domain : ascendance of outer space as a war theatre -- War in the fifth domain : cyberwarfare -- Discarding law by analogy : old legal frameworks -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc. "In recent years military technology and strategy have developed apace particularly in regards to cyber and space warfare. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure which it is presumed came from Russia in retaliation for the removal of a World War II-era statue of a Soviet soldier from its capital. This was described as some as the first war in cyberspace Web War I. Since then there have been several more cyber attacks on a State and its digital environment, in particular in Iran in 2010 when a worm Stuxnet was identified as having infected and damaged Iran's uranium enrichment plant presumably in an attempt to set back Iran's nuclear programme. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. The use of force, except in cases of self-defence or with the authorisation of a Security Council Resolution, is prohibited under the UN charter and customary international law however, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived of. This book asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Among the questions it considers are : What amounts to an armed attack in an age of anti-satellite weaponry and lasers that can cripple satellites? Does the destruction of a State's vital digital eco-system or the "blinding" or jamming of military communication satellites constitute a threat? If so what is the threshold that would enliven the right of self-defence or retaliatory action? The book argues that while technology has leapt ahead the legal framework has failed to adapt, and as a result the ability of States to legally defend themselves has been impaired"--
Assigning source Provided by publisher.
520 ## - SUMMARY, ETC.
Summary, etc. "In recent years, threats to governmental, economic, and military interests via the information infrastructure have increased as governmental and non-governmental operations have become progressively supported by vast automated systems and electronic data. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure, described in cyberspace as 'Web War I'. In 2010, a worm Stuxnet was identified as having infected and damaged Iran's uranium enrichment plant, presumably in an attempt to set back Iran's nuclear programme. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. Except in cases of self-defence or with the authorisation of a Security Council Resolution, the use of force is prohibited under the UN charter and customary international law. However, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived. Jackson Maogoto asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Key queries include, how one defines an armed attack in an age of anti-satellite weaponry, whether the destruction of a State's vital digital eco-system or the "blinding" of military communication satellites constitutes a threat, and how one delimits the threshold that would enliven the right of self-defence or retaliatory action. The book argues that while technology has leapt ahead, the legal framework has failed to adapt, rendering States unable to legally defend themselves effectively. This book will be of great interest and use to researchers and students of international law, the law of armed conflict, Information Technology and the law, and counter-terrorism"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information warfare (International law)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element War (International law)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Malware (Computer software)
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Law and legislation.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element LAW / General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element LAW / International.
Source of heading or term bisacsh
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified eBook
Uniform Resource Identifier https://www.taylorfrancis.com/books/mono/10.4324/9780203716052/technology-law-use-force-jackson-maogoto
Link text Single File
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
item type e-Book
Holdings
Withdrawn status Lost status Damaged status Shelving location Date acquired Source of acquisition Price Full call number Accession Number Date last seen Uniform Resource Identifier item type
      Internet 2024-11-11 Taylor and Francis 264.00 341.6/3 MAO NB3158 2024-11-11 https://www.taylorfrancis.com/books/mono/10.4324/9780203716052/technology-law-use-force-jackson-maogoto e-Book
© University of Jaffna