1 Ph.D. Student in International Law, Department of Law, Islamic Azad University, Najafabad Branch, Najafabad, Iran

2 Associate Professor, Faculty of Law, Shahid Beheshti University, Tehran, Iran

3 Associate Professor, International Law Department, Faculty of Law and Political Sciences, Allameh Tabataba’i University, Tehran, Iran


21st century is the beginning of change in one of the areas of International Law namely the law of armed conflicts. Access to new weapons, technological developments and resorting to today’s tactics, not only lead the insidious phenomenon of war to be totally departed from International Law but by some recent changes, more complexities are added. The conflict and its forms that were primarily being accepted in traditional international law as a principle in International Relations and in the light of subsequent developments of various legal instruments were accepted as an exception in states relations, with the development of technology, have been transformed significantly faster than the conceptual evolution in rights and obligations. Conceptual evolution in the use of force not only has changed the fundamental concepts and principles of conflict but also the elements of traditional conflict and propounded subjects including principle of distinction, legality and legitimacy. With analyzing the concept of cyber warfare, we intend to assess the possibility of extending the rules governing traditional armed conflicts to cyberspace and evaluating its legal limitations. Since this matter would not be possible without concentrating on international practice, cyber-attacks on Georgia will be examined as a case study. 


الف) فارسی
اصلانی، جبار (1393). «حملات سایبری از منظر حقوق بشردوستانه با نگاهی به قضیۀ استاکس نت و ایران»، فصل‌نامۀ مطالعات بین‌المللی، سال دهم، شمارۀ 4، 1-28.
باث، میشل (1391). حقوق بشردوستانه در مخاصمات مسلحانه، حقوق بی‌طرفی، ترجمۀ سیدقاسم زمانی، تهران: مؤسسۀ مطالعات و پژوهش‌های حقوقی شهر دانش.
تدینی، عباس و کازرونی، سیدمصطفی (1395). «کاربردهای نظامی فناوری نانو از منظر حقوق بین‌الملل بشردوستانه»، مجلۀ حقوقی بین‌المللی، شمارۀ 54، 257-306.
حسن‌بیکی، ابراهیم (1384). حقوق و امنیت در فضای سایبر، تهران: مؤسسۀ فرهنگی مطالعات و تحقیقات بین‌المللی ابرار معاصر.
خلف‌رضایی، حسین (1392). «حملات سایبری از منظر حقوق بین‌الملل» (مطالعۀ موردی: استاکس نت)، فصل‌نامۀ مجلس و راهبرد، سال بیستم، شمارۀ 73، 125-153.
خلیل‌زاده، مونا (1393). مسئولیت بین‌المللی دولت‌ها در قبال حملات سایبری، تهران: مجمع علمی و فرهنگی مجد.
زمانی، سیدقاسم و رفیعی، سیدرضا (1392). «کاربرد سلاح‌های حاوی اورانیوم ضعیف‌شده از منظر حقوق بشردوستانۀ بین‌المللی»، مجلۀ حقوقی بین‌المللی، شمارۀ 49، 35-60.
ساعد، نادر (1393). حقوق بشردوستانه و مسائل نوظهور (جنگ‌های پسانوین)، چاپ دوم، تهران: انتشارات خرسندی.
شایگان، فریده (1395). «اعمال حقوق بی‌طرفی در فضای سایبر»، فصل‌نامۀ مطالعات حقوق عمومی، دورۀ 46، 337-357.
ضیایی‌بیگدلی، محمدرضا (1392). حقوق بین‌الملل بشردوستانه، چاپ اول، تهران: گنج دانش.
عبداللهی، محسن (1388). تروریسم، حقوق بشر و حقوق بشردوستانه، چاپ اول، مؤسسۀ مطالعات و پژوهش‌های حقوقی شهر دانش.
ممتاز، جمشید و شایگان، فریده (1393). حقوق بین‌الملل بشردوستانه در برابر چالش‌های مخاصمات مسلحانۀ عصر حاضر، مؤسسۀ مطالعات و پژوهش‌های حقوقی شهر دانش.
نواده‌توپچی، حسین (1393). حقوق جنگ و مخاصمات مسلحانه، چاپ اول، تهران: انتشارات خرسندی.
ب) انگلیسی
Ashmore, William C (2009). "Impact of Alleged Russian Cyber Attacks", Baltic Security & Defence Review, Vol. 11, 4-40.
Bothe, Michael (2011). "Setting the scene: New Challenges for IHL, International Humanitarian Law and New Weapon Technologies", 34th Round Table on Current Issues of International Humanitarian Law (Sanremo, 8th-10th September 2011), International Institute of Humanitarian Law,Available at:, Visited on 10 September 2016.
Brenner, Susan W. & Clarke, Leo L (2010). "Civilians in Cyberwarfare: conscripts", Vanderbilt Journal of Transnational Law, Vol. 43: 1011-1076.
Cornish, Paul & Others (2010). On Cyber Warfare, A Chatham House Report, Available at:, Visited on 9 May 2016.
Dill, Janina (2010). Applying the Principle of Proportionality in Combat Operations, Policy Briefing, Oxford Institute for Ethics, Law and Armed Conflict.
Dormann, Knut (2004). Applicability of the Additional Protocols to Computer Network Attacks, International Committee of the Red Cross, Available at:, Visited on 11 September 2016.
Geib, Robin (2010). The Legal Regulation of Cyber Attacks in times of Armed Conflict, Proceedings of the Bruges Colloquium, Technological Challenges for the Humanitarian Legal Framework, 11th Bruges Colloquium, 21-22 October 2010, Available at:, Visited on 20 September 2016.
Graham, David E (2010)."Cyber Threats and the Law of War", Journal of National Security Law and Policy, Vol, 4, 87-102.
Hathaway, Oona A. & others (2012). "The Law of Cyber-Attack", California Law Review, Vol. 100:817-876.
Henckaerts, Jean-Mari & Doswald-Beck, Louise (2009). "Customary International Humanitarian Law",Vol 1: Rules, International Committee of the Red Cross, Cambridge University Press.
Hollis, Duncan B (2007). "Why States Need an International Law for Information Operations", Lewis & Clark L. Review, Vol. 11:4, 1023-1061.
Hughes, Rex (2009). Towards a Global Regime for Cyber Warfare, Cyber Security Project, Chatham House, London, Available at:, Visited on 14 October 2016.
Ishøy, Rikke (2008). Handbook on the Practical Use of International Humanitarian Law, Danish Red Cross, Second Edition, Revised Edition.
Jastram, Kate & Quintin, Anne (2011). "The Internet in Bello: Cyber War Law, Ethics and Policy", Seminar held 18 November 2011, Berkeley Law, 2011, Available at:, Visited on 19 September 2016.
Kelsey, Jeffrey T. G (2009). Note, "Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare", Michigan Law Review, Vol. 106:1427-1451.
Kodar, Erki (2012). "Applying the Law of Armed Conflict to Cyber Attacks: From the Martens Clause to Additional Protocol 1", ENDC Proceedings, Vol 15, 107-132.
Kozlowski, Andrzej (2014). "Comparative Analysis of Cyberattacks on Estonia, Georgia and Kyrgyzstan", European Scientific Journal, February 2014 /SPECIAL/ edition vol.3, 237-245.
Lipson, Howard F (2002).Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Carnegie Mellon Software Engineering Institute, Special Report CMU/sei-2002-sr-009.
Lobel, Hannah (2012). "Cyber War Inc.: The Law of War Implications of the Private Sector’s Role in Cyber Conflict", Texas International Law Journal, Vol 47, Issue 3, 617-640.
Lomidze, Irakli (2011). Cyber Attacks against Georgia, Ministry of Justice of Georgia, Data Exchange Agency, Available at:, Visited on 6 October 2016.
Roscini, Marco (2014). Cyber Operations and the Use of Force, Oxford University Press.
Sandvik, Kristin Bergtora (2012). Towards a Militarization of Cyberspace?, Cyberwar as an Issue of International Law, Peace Research Institute Oslo, Available at:, Visited on 26 December 2016.
Schmitt, Michael N (2013). "Reaction, Cyberspace and International Law: The Penumbral Mist of Uncertainty", Harvard Law Review Forum, Vol. 126:176.
Swanson, Lesley (2010). "The Era of Cyber Warfare: Applying International Humanitarian Law to the 2008 Russian-Georgian Cyber Conflict", Loyola of Los Angeles International and Comparative Law Review, Vol. 32:303-333.
Talbot, Eric Jensen (2013). "Cyber Attacks: Proportionality and Precautions in Attack", International Law Studies, Vol 89, 198-217.
Tsagourias, Nicholas & Buchan, Russell (2015). Research Handbook on International Law and Cyberspace, Edward Elgar Publishing.
The Law of Armed Conflict, Neutrality, International Committee of the Red Cross (2002). Available at:, Visited on 7 June 2016.
Valo, Janne (2014). "Cyber Attacks and the Use of Force in International Law", University of Helsinki, Master's Thesis, Available at:, Visited on 7 October 2016.
Watts, Sean (2011). "Low-Intensity Computer Network Attack and Self-Defense, International Law and the Changing Character of War", International Law Studies, Vol. 87, 59-87.
Waxman, Matthew C (2011). Cyber-Attacks and the Use of Force: Back to the Future of Article 2 (4), The Yale Journal of International Law, Vol. 36: 421-459.
Yde, Iben (2013). The Law of Cyber Armed Conflicts: Translating Existing Norms of International Humanitarian Law into Cyber Language, Royal Danish Defense College, Available at:, Visited on 2 September 2016.
ج) آرا و اسناد
Cyber Warfare and International Humanitarian Law: The ICRC Position (2013). Available at:, Visited on 28 December 2016.
Final Report on the Meaning of Armed Conflict in International Law (Summary). International Law Association, The Hague Conference, Use of Force, 2010
Legality of the Treat or Use of Nuclear Weapons (1996). Advisory Opinion, International Court of Justice.
Protocol additional to the Geneva Conventions of 12 August 1949, and relating to the protection of victims of international armed conflicts (Protocol I) 1977.
Research Report, XVII. Model United Nations of Lübeck (MUNOL). 2014, Available at:, Visited on 16 September 2016.
Rules of International Humanitarian Law and Other Rules Relating to the Conduct of Hostilities, Collection of Treaties and Other Instruments, International Committee of the Red Cross, Geneva 1989, Revised and updated Edition, 2005.
Tallinn Manual on the International Law Applicable to Cyber Warfare (2013). Prepared by International Group of Experts at the Invitation of NATO Cooperative Cyber Defence Centre of Excellence (edited by M. N. Schmitt), Cambridge University Press.
Summary of the Geneva Convention s of 1949 and their Additional Protocol”, International Humanitarian Law, American Red Cross, April 2011, Available at:, Visited on 12 September 2016.
United Nations General Assembly, A/RES/3314 (XXIX) 14 December 1974, Available at:, Visited on 11 September 2016.