Background Image
Previous Page  220 / 505 Next Page
Information
Show Menu
Previous Page 220 / 505 Next Page
Page Background

TBB Dergisi 2013 (107)

Mehmet YAYLA

219

Fatma Taşdemir,

Uluslararası Terörizme Karşı Devletlerin Kuvvete Başvurma Yetkisi

(1.

Baskı), Siyasal Basın Yayın Dağıtım, Ankara, 2006.

Funda Keskin,

Uluslararası Hukukta Kuvvet Kullanma: Savaş, Karışma ve Birleşmiş Millet-

ler

, Mülkiyeliler Birliği Vakfı Yayınları Tezler Dizisi:4, Ankara, 1998.

Hüseyin Pazarcı,

Uluslararası Hukuk Dersleri I. Kitap,

Turhan Kitabevi, Ankara, 1994,

s. 209-218; Edip Çelik,

Milletlerarası Hukuk, Birinci Kitap,

Filiz Kitabevi, İstanbul,

1987.

Jason Barkham, “Information Warfare and International Law on the Use of Force”,

New York University Journal of International Law & Policy,

V.34, 2001, s. 57-113.

Judith Gail Gardam, “Necessity and Proportionality in Jus Ad Bellum and Jus In Bel-

lo”,

International Law, The International Court of Justice and Nuclear Weapons,

Camb-

ridge University, Cambridge, s.275-292.

Michael N. Schmitt,

Computer Network Attack and the Use of Force in International Law:

Thoughts on a Normative Framework

, Research Publication 1 Information Series,

1999,

http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993

, erişim tarihi

10.11.2012.

Manila Declaration on the Peaceful Settlement of International Disputes

, G.A. Res. 37/10,

Annex, U.N. Doc. A/RES/37/10 (15.11.1982),

http://www.un.org/documents/

ga/ res/37/a37r010.htm, erişim tarihi 13.1.2013.

Matthew C. Waxman, “Cyber Attacks as “Force” Under UN Charter Article 2(4)”,

In-

ternational Law and the Changing Character of War

, V.87, 2011, s.43-57.

Matthew J. Sklerov, “Solving the Dilemma of State Responses to Cyberattacks: A Justi-

fication for the Use of Active Defenses Against States Who Neglect their Duty to

Prevent”,

Military Law Review

, V.201, 2009, s.1-85,

http://www.loc.gov/rr/frd/

Military_Law/Military_Law_ Review/pdf-files/201-fall-2009.pdf, erişim tarihi

15.1.2013.

Oona A. Hathaway & Rebecca Crootof & Philip Levitz & Haley Nix& Aileen Nowlan

& William Perdue & Julia Spiegel, “The Law of Cyber Attack”,

California Law

Review,

V.100, 1.8.2012, s.817-886.

Richard J

.

Erickson,

Legitimate Use of Force Against State-Sponsored Terrorism,

Air Uni-

versity Press, Washington D.C., 1989.

Richard Garnett ve Paul Clarke, “Cyberterrorism: A New Challege for International

Law”,

Enforcing International Law Norms Against Terrorosim

(Editör: Bianchi, And-

rea), 2004, s.465-487.

Ronald Deibert, . “Tracking the Emerging Arms Race in Cyberspace”,

Bulletin of the

Atomic Scientists,

Ocak/Şubat 2011, s.1-8.

Ryan Singel, “White House Cyber Czar: There is no Cyber War”,

Wired

(3.4.2010),

http://www.wired.com/threatlevel/2010/03/schmidt-cyberwar/

erişim tarihi

10.11.2012;

Sadi Çaycı,

Silahlı Kuvvetlerin Kullanılması

, Genelkurmay Basımevi, Ankara,1995.

Seha L. Meray,

Devletler Hukukuna Giriş

(İkinci Cilt)

, Yeniden Gözden Geçirilmiş Dör-

düncü Bası, Ankara, 1975.