KIBER MAKONDA QUROLLI MOJAROLAR: XALQARO GUMANITAR HUQUQNING YANGI SINOVLARI VA QO‘LLANILISH CHEGARALARI
PDF (English)

Ключевые слова

xalqaro gumanitar huquq, kiber mojaro, qurolli mojaro, proporsionallik prinsipi, ajratish prinsipi, ehtiyot chorasi, Tallin qo‘llanmasi, xalqaro huquq, raqamli xavfsizlik, kiber urush, xalqaro nizolar.

Аннотация

Mazkur maqolada kiber makonda yuzaga kelayotgan qurolli mojarolar doirasida xalqaro gumanitar huquq (XGH) me’yorlarining tatbiq etilishi, ularning huquqiy va amaliy muammolari tahlil qilinadi. Raqamli texnologiyalarning harbiy maqsadlarda tobora faol qo‘llanilishi XGH tamoyillarining – ajratish, proporsionallik va ehtiyot choralarini ko‘rish prinsiplari – zamonaviy kiber harakatlarga qanday moslashishini qayta ko‘rib chiqishni taqozo qilmoqda. Tadqiqot davomida xalqaro huquqshunoslikdagi eng nufuzli yondashuvlar, xususan Tallin qo‘llanmasi asosida XGHning amaldagi zaif jihatlari ko‘rsatilib, mavjud normativ bo‘shliqlar aniqlanadi. Shu bilan birga, ayrim davlatlarning milliy strategiyalari tahlili orqali xalqaro huquqning zamonaviy urush shakllariga ta'siri va yetishmovchiligi yoritiladi. Muallif kiber makonda inson huquqlari va xalqaro tinchlikni ta’minlashda XGHning moslashtirilgan va kuchaytirilgan huquqiy mexanizmlar bilan boyitilishi lozimligini asoslaydi.

PDF (English)

Библиографические ссылки

The Geneva conventions of 12 august 1949 // available at: https://www.icrc.org/sites/default/files/external/doc/en/assets/files/publications/icrc-002-0173.pdf

The official website: International Committee of the Red Cross, Cyber Warfare: does International Humanitarian Law apply? April 1, 2025. Available at: https://www.icrc.org/en/document/cyber-warfare-and-international-humanitarian-law

Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. New York: Crown Publishers, 2014: 156-189.

Lin, Herbert. Cyber Conflict and International Humanitarian Law. International Review of the Red Cross 94, no. 886 (2012): 515-531.

United Nations. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. A/70/174, 2015.

Charter of the United Nations // http://treaties.un.org/

doc/publication/ctc/uncharter.pdf

Haataja, S, The 2007 cyber-attacks against Estonia and international law on the use of force: an informational approach // https://research-repository.griffith.edu.au/server/api/core/bitstreams/e6e5408e-5ff9-5afb-bd29-e54ba1cc932b/content

Schmitt, Michael N. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.

ICRC. International humanitarian law and the challenges of contemporary armed conflicts. Geneva: ICRC, 2019: 45-67.

Shackelford, Scott. (2012). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace. Managing Cyber Attacks in International Law, Business, and Relations in Search of Cyber Peace. 1-393. 10.1017/CBO9781139021838.

Rid, Thomas. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies. 35. 5-32. 10.1080/01402390.2011.608939.

Dinstein, Yoram. The Conduct of Hostilities under the Law of International Armed Conflict. Cambridge: Cambridge University Press, 2016.

Benvenisti, Eyal. (2014). The Law of Global Governance. 10.1163/9789004279124.

Graham, David E. Cyber Threats and the Law of War. Journal of National Security Law & Policy 4, no. 1 (2010): 87-102.

Droege, Cordula. Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross 94, no. 886 (2012): 533-578.

ICRC. International humanitarian law and cyber operations during armed conflicts. Position Paper, Geneva: ICRC, 2019: 23-45.

Schmitt, Michael N., ed. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017

The White House. National Cyber Strategy of the United States of America. Washington D.C., 2018. // https://bidenwhitehouse.archives.gov/oncd/national-cybersecurity-strategy/

Herzog, Stephen. “Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses.” Journal of Strategic Security, vol. 4, no. 2, 2011, pp. 49–60. JSTOR, http://www.jstor.org/stable/26463926.

Langner, Ralph. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security & Privacy. 9. 49-51. 10.1109/MSP.2011.67.

Tsagourias, Nicholas, Cyber Attacks, Self-Defence and the Problem of Attribution (July 24, 2012). Journal of Conflict & Security Law (2012), Vol. 17 No. 2, 229–244, Available at SSRN: https://ssrn.com/abstract=253827