Background Image
Previous Page  219 / 505 Next Page
Information
Show Menu
Previous Page 219 / 505 Next Page
Page Background

Uluslararası Hukukta Siber Saldırılara Karşı Kuvvet Kullanma

218

KAYNAKLAR

Andrew M. Colarik,

Cyber Terorism: Political and Economic Implications

, Idea Grup Pub-

lishing, 2006.

Andrew B. Foltz, “Stuxnet, Schmitt Analysis, and the Cyber “Use of Force” Debate”,

Joint Force Quarterly

, I.67, 4th Quarter, 2012, s.40-48,

http://www.au.af.mil/au/

awc/awcgate/jfq/foltz_stuxnet_ schmitt_oct2012.pdf, erişim tarihi 18.1.2013.

Anthony C. Arend ve Robert J. Beck,

International Law and Use of Force

, New York,

Routledge, 1995.

Aslan Gündüz,

Milletlerarası Hukuk Temel Belgeler Örnek Kararlar

(3. Baskı). Beta Yayın-

ları, İstanbul, 1998.

Ayhan Döner, “Kuvvet Kullanma Yasağı ve İnsani Müdahale Açısından II. Kör-

fez Savaşı”,

e-akademi-Hukuk, Ekonomi ve Siyasal Bilimler Aylık İnternet Dergisi

,

Sayı 17, Temmuz 2003,

http://e-akademi.org/incele.asp?konu=

’Kuvvet%20

Kullanma%20Yasa%F0%FD%20ve%20%DDnsani%20M%FCdahale%20

A%E 7%FD s %FDn d a n%2 0 I I . %2 0 K%F 6 r f e z%2 0 K r i z i ’ &k i m l i k = -

397695427&url=makaleler /adoner-1.htm, erişim tarihi 13.1.2013.

Berdal Aral,

Uluslararası Hukukta Meşru Müdafaa Hakkı

, Siyasal Kitabevi, Ankara, 1999.

Carsten Sthan, “Nicaragua is Dead-Long Live Nicaragua-the Rigt to Self Defence Un-

der Article 51 of UN Charter and International Terrorism”,

Terrorism as a Chal-

lenge for National and International Law: Securtiy versus Liberty

, Berlin&Heidelberg,

2003,

http://edoc.mpil.de/conference-on-terrorism/index.cfm

, erişim tarihi

10.10.2011

Christine Gray,

International Law and Use of Force

, Oxford University Press, Oxford,

2000.

Clay Wilson,

Bootnets, Cybercrime, and Cybe

rterrorism:Vulnerabilities

and Policy Issues for

Congress

, 2007,

http://www.fas.org/sgp/crs/terror/RL32114.pdf,

erişim tarihi

13.1.2013.

Daniel B. Silver, “Computer Network Attack as a Use of Force Under Article 2(4) of

the United Nations Charter”,

Computer Network Attack and International Law

, 1999,

s.73-98.

Declaration on Principles of International Law Concerning Friendly Relations and Co-

operation Among States in Accordance with the Charter of the United Nation

, G.A.

Res. 25/2625, U.N. Doc. A/RES/25/2625 (24.10.1970),

http://www.unhcr.org/

refworld/topic,459d17822,459d17a82,3dda 1f104,0.html, erişim tarihi 13.1.2013.

Duncan B. Hollis, “Why States Need an International Law for Information Operati-

ons”,

Lewis & Clark Law Review,

V.11, 1997, s.1023-1061.

Elisabeth Bumiller ve Thom Shanker, “Panetta Warns of Dire Threat of Cyberattack on

U.S.”,

TheNewYorkTimes

(11Ekim2012)

,http://www.nytimes.com/2012/10/12/

world/panetta-warns-of-dire-threat-of-cyberattack.html?pagewan

ted=all&_

r=0, erişim tarihi 3.11.2012.

EurActiv

(4.4.2008). NATO Agrees on Common Approach to Cyber Defence, http://

www.euractiv.com/en/infosociety/nato-agrees-common-approachcyber-defen-

ce/article-171377, erişim tarihi 1.11.2010.