Cyber Conflict and Just War Theory
| Main Author: | Collie, Nicholas |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/73010/ |
Similar Items
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Small states and the strategic utility of cyber capabilities
by: Domingo, Francis Rico
Published: (2018)
by: Domingo, Francis Rico
Published: (2018)
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012)
by: Al Adwan, Ahmad
Published: (2012)
Applying the Theory of Planned Behaviour to predicting online safety behaviour
by: Burns, Sarah, et al.
Published: (2013)
by: Burns, Sarah, et al.
Published: (2013)
Web-of-things framework for cyber-physical systems
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Event handling for distributed real-time cyber-physical systems
by: Singh, Jaipal, et al.
Published: (2012)
by: Singh, Jaipal, et al.
Published: (2012)
A perspective on the applications of energy-cyber-physical systems (e-CPSs) in ultra-low emission coal-fired power plants
by: Zhao, Haitao, et al.
Published: (2019)
by: Zhao, Haitao, et al.
Published: (2019)
Conflicts through the lens of Chinese war photojournalists
by: Zhang, Shixin Ivy
Published: (2015)
by: Zhang, Shixin Ivy
Published: (2015)
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016)
by: Miller, Simon, et al.
Published: (2016)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
Allocating patrolling resources to effectively thwart intelligent attackers
by: Lowbridge, Thomas
Published: (2021)
by: Lowbridge, Thomas
Published: (2021)
Humanitarian war in theory and practice : a case study of the NATO intervention in Kosovo
by: Godfrey, Owen Michael
Published: (2007)
by: Godfrey, Owen Michael
Published: (2007)
China’s Weibo: is faster different?
by: Sullivan, Jonathan
Published: (2013)
by: Sullivan, Jonathan
Published: (2013)
The many faces and facets of war: redrawing the boundaries and focus of warfare in contemporary international affairs / Tang Siew Mun
by: Tang, Siew Mun
Published: (2008)
by: Tang, Siew Mun
Published: (2008)
Corporeal territories: the body in American narratives of the Vietnam war
by: McMullan, Paloma
Published: (2004)
by: McMullan, Paloma
Published: (2004)
Internet Outreach / A Guide for Health Promoters & Peer Educators
by: Hallett, Jonathan, et al.
Published: (2011)
by: Hallett, Jonathan, et al.
Published: (2011)
Journalists in the zone of armed conflicts: the need to respect international humanitarian law / Azlena Khalid
by: Khalid, Azlena
Published: (2008)
by: Khalid, Azlena
Published: (2008)
Analyzing factors influencing customer satisfaction on purchased cybersecurity solutions within B2B organizations in Malaysia
by: Subramaniam, Nageswar Rao
Published: (2024)
by: Subramaniam, Nageswar Rao
Published: (2024)
The rationales behind free and proprietary software selection in organisations
by: Sticklen, D., et al.
Published: (2010)
by: Sticklen, D., et al.
Published: (2010)
Alfonso de Cartagena on the affair of the Canaries (1436–37): humanist rhetoric and the idea of the nation-state in fifteenth–century Castile
by: Lawrance, Jeremy
Published: (2013)
by: Lawrance, Jeremy
Published: (2013)
A theory of distributional violence: an analysis of proxy wars in Africa, 1945-2011
by: Rauta, Vladimir
Published: (2017)
by: Rauta, Vladimir
Published: (2017)
Conceptualizing Israeli public diplomacy towards the United States of America on the Palestine-Israel conflict based on grounded theory / Noor Nirwandy Mat Noordin
by: Mat Noordin, Noor Nirwandy
Published: (2018)
by: Mat Noordin, Noor Nirwandy
Published: (2018)
Reframing Israel-Palestine: critical Israeli responses to the Palestinian call for Just Peace
by: Todorova, Teodora
Published: (2014)
by: Todorova, Teodora
Published: (2014)
State of the Art in the Development of Adaptive Soft Sensors based on Just-In-Time Models
by: Saptoro, Agus
Published: (2014)
by: Saptoro, Agus
Published: (2014)
War and conflict and their relationship with exchange rate volatility, governance and biodiversity
by: Yiew, Thian Hee
Published: (2016)
by: Yiew, Thian Hee
Published: (2016)
RTPD/MACSC: a novel approach for effective pervasive information retrieval
by: Wu, R., et al.
Published: (2005)
by: Wu, R., et al.
Published: (2005)
The Korean War and the post-war prisoners of war (POW) regime, 1945-1956
by: Wylie, Neville, et al.
Published: (2015)
by: Wylie, Neville, et al.
Published: (2015)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
The just-noticeable difference in speech-to-noise ratio
by: McShefferty, David, et al.
Published: (2015)
by: McShefferty, David, et al.
Published: (2015)
Rapidly increasing trend of recorded alcohol consumption since the end of the armed conflict in Sri Lanka
by: Nugawela, Manjula D., et al.
Published: (2017)
by: Nugawela, Manjula D., et al.
Published: (2017)
War and trauma in chimamanda ngozi adichie's half of a yellow sun and chris abani's song for night
by: Che Jamal, Inna Malissa
Published: (2015)
by: Che Jamal, Inna Malissa
Published: (2015)
Aggressive scrollers: investigating online aggression and its relationship with social media use, envy, self-control and aggressive behaviour
by: Sumarno, L.C.
Published: (2021)
by: Sumarno, L.C.
Published: (2021)
Forgetting the wars: Australian war memorials and amnesia
by: Stephens, John
Published: (2014)
by: Stephens, John
Published: (2014)
Conflict Management Styles Among Public Sector Managers in Malaysia.
by: Suppiah, Waitchalla Rrv
Published: (2007)
by: Suppiah, Waitchalla Rrv
Published: (2007)
In whose interest?: Comment on "Toward a sociology of conflict of interest in medical research" by Sarah Winch and Michael Sinnott
by: Shields, Linda
Published: (2012)
by: Shields, Linda
Published: (2012)
The Impact of War on David Malouf's Novels: A Historical-Biographical Approach
by: Abbas, Hussein Ali
Published: (2003)
by: Abbas, Hussein Ali
Published: (2003)
Beyond the battlefield: the political economy of armed conflict and peace in Colombia
by: Dodd, Oliver
Published: (2025)
by: Dodd, Oliver
Published: (2025)
Picturing the Civil War: visual culture of the rank and file
by: Brookes, James
Published: (2020)
by: Brookes, James
Published: (2020)
Similar Items
-
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017) -
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012) -
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017) -
Small states and the strategic utility of cyber capabilities
by: Domingo, Francis Rico
Published: (2018) -
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012)