Research Handbook on International Law and Cyberspace
Show Less

Research Handbook on International Law and Cyberspace

Edited by Nicholas Tsagourias and Russell Buchan

This timely Research Handbook contains an analysis of various legal questions concerning cyberspace and cyber activities and provides a critical account of their effectiveness. Expert contributors examine the application of fundamental international law principles to cyberspace such as sovereignty, jurisdiction, state responsibility, individual criminal responsibility, and intellectual property rights. In addition to this, they explore the application of international law rules to cyber terrorism, cyber espionage, cyber crime, cyber attacks and cyber war and discuss the cyber security policies of international and regional institutions.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 17: International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

Terry D. Gill


This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application of the principle of proportionality and the duty to take precautions in conducting an attack in relation to attacks carried out in the cyber domain. In doing so, a preliminary examination is made of the likelihood of cyber warfare actually taking place and the scenarios which seem most likely for this to occur. It then goes on to examine how the aforementioned principle of proportionality would apply in relation to attacks whereby physical effects resulted and to attacks which simply had the effect of destroying or degrading digital data. It concludes by finding that while many cyber-attacks would not qualify as attacks under IHL, some would and that the law is applicable by analogy in much the same way it applies to conventional attacks by kinetic weapons.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.