Zusammenfassung
Im vorherigen Kapitel habe ich beschrieben, welche Akteure neben den klassischen Nationalstaaten als Akteure der internationalen Beziehungen gelten. Akteurstatus entsteht durch eine gemeinsame politische Identität und die (implizite) Anerkennung durch Interaktion mit anderen Akteuren der internationalen Beziehungen. In diesem Kapitel werde ich den politischen Teil der Lehre des gerechten Krieges behandeln. Zu ihm gehören neben ius ad bellum, den Bedingungen dafür, wann es erlaubt ist, in einen Krieg einzutreten, iust post bellum, die Bedingungen für einen akzeptablen Übergang in den Friedenszustand.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literaturverzeichnis
Akerman, Spencer (2012): Pentagon Chief Admits U.S. is atWar in Pakistan. Wired.com Danger Room, http://www.wired.com/dangerroom/2012/06/drone-war-admission/.
Al-Midani, M.A.;M. Cabanettes und S.M. Akram, (2006): Arab Charter on Human Rights 2004. Boston University International Law Journal, 24(2):147–164.
Anscombe, Gertrude Elizabeth Margaret (1981): Mr. Truman’s Degree. In: The collected philosophical papers of G.E.M. Anscombe, Volume 3: Ethics, Religion and Politics, Oxford.
Arquilla, John (2011): The Computer Mouse that Roared: Cyberwar in the Twenty-First Century. The Brown Journal of World Affairs, XVIII(1):39–48.
Associated Press (2011): U.S. report blasts China, Russia for cyberattacks. USA Today, http://www.usatoday.com/news/washington/story/2011–11-03/china-russiacybersecurity/51065010/1.
Ball, J.;J Borger und G. Greenwald, (2013): Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian Weekly, 6.9.
Bellamy, Alex J. (2011): Libya and the Responsibility to Protect. Ethics & International Affairs, 25(3):263–269.
Benjamin,Walter (1974): Das Kunstwerk im Zeitalter seiner technischen Reproduzierbarkeit. In: Gesammelte Schriften, Frankfurt/Main, Bd. I,2.
Bittner, Rüdiger (2004): Humanitäre Interventionen sind unrecht. In: Humanitäre Interventionsethik, Hg. Georg Meggle, Paderborn.
Bowden, Mark (2013): The Killing – How To Think About Drones. The Atlantic, September:58–70.
Broad,W. J.; J. Markoff und D. E. Sanger (2011): Israeli Test onWorm Called Crucial in Iran Nuclear Delay. The New York Times, 15.1.
Brown, Davis (2011): Judging the Judges. Journal of Military Ethics, 10(3):S133–147.
Buchanan, A. und R.O. Keohane (2004): The Preventive Use of Force: A Cosmopolitan Institutional Proposal. Ethics & International Affairs, 18(1):1–22.
Chomsky, Noam (1991): The Gulf Crisis. Z Magazine, Februar, http://www.chomsky.info/articles/199102–02.htm.
von Clausewitz, Carl (1966): Meine Vorlesungen über den kleinen Krieg, gehalten an der Kriegs-Schule 1810 und 1811. In: Schriften, Aufsätze, Studien, Briefe, Göttingen, Bd. 1.
Cook, James (2010): ’Cyberation’ and JustWar Doctrine: A Response to Randall Dipert. Journal of Military Ethics, 9(4):411–423.
Department of Defense (2011): Department of Defense Strategy for Operating in Cyberspace. http://www.defense.gov/news/d20110714cyber.pdf.
Deutscher Bundestag (1997): Plenarprotokoll 15/97. http://dipbt.bundestag.de/dip21/btp/15/15097.pdf.
Dipert, Randall R. (2010): The Ethics of Cyberwarfare. Journal of Military Ethics, 9(4):384–410.
Eberle, Christopher J. (2013): JustWar and Cyberwar. Journal of Military Ethics, 12(1):54–67.
Etzioni, Amitai Etzioni (2013): The Great Drone Debate. Military Review, March-April:2–13.
Finkelstein, C.;J.D. Ohlin und A. Altman, , Hg. (2012): Targeted Killings. Oxford.
Franciscus de Vitoria (1952): Vorlesungen über die kürzlich entdeckten Inder und das Recht der Spanier zum Krieg gegen die Barbaren. Tübingen.
Frankfurter Allgemeine Zeitung (2002): Karzai für türkische Führung der Schutztruppe. Frankfurter Allgemeine Zeitung, 6.4.
Gaycken, Sandro (2011): Cyberwar. München.
Gibbs, Samuel (2013): International Space Station attacked by ’virus epidemics’. theguardian.com, 12.11., http://www.theguardian.com/technology/2013/nov/12/international-space-stationvirus-epidemics-malware.
Gorman, Siobhan und Jennifer Valentino-Devries (2013): New Details Show Broader NSA Surveillance Reach. Wall Street Journal, 20.8., http://online.wsj.com/news/articles/SB10001424127887324108204579022874091732470.
Greenberg, Andy (2012): Shopping For Zero-Days: A Price List For Hackers’ Secret Software Exploits. Forbes, 23.3., http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-anprice-list-for-hackers-secret-software-exploits/.
Greenwald, Glenn (2012): Militants: Media Propaganda. Salon.com, 29.5., http://www.salon.com/2012/05/29/militants_media_propaganda/singleton/.
Gross, Michael L. (2010): Moral Dilemmas of Modern War. New York.
Harden, Blaine (2012): Escape from Camp 14. London.
Ignatieff, Michael (1998): The Warriors Honor. Toronto.
Ikenberry, G. J. und A.-M. Slaughter (2004): Forging aWorld of Liberty under Law: US National Security in the Twenty First Century. http://www.princeton.edu/#ppns/report/FinalReport.pdf.
International Human Rights and Conflict Resolution Clinic at Standford Law School and Global Justice Clinic at NYU School of Law (2012): Living under Drones. http://livingunderdrones.org/wp-content/uploads/2012/10/Stanford-NYU-LIVINGUNDER-DRONES.pdf.
Kaldor, Mary (2007): Neue und alte Kriege. Frankfurt/Main.
Kamm, Frances M. (2011): Reasons for StartingWar. In: Ethics for Enemies, Oxford/New York.
Kaplan, Fred (2013): TheWold as a Free-Fire Zone. MIT Technology Review, 116(4):36–45.
Kasher, A. und A. Yadlin (2005): Military Ethics of Fighting Terror: An Israeli Perspective. Journal of Military Ethics, 4(1):3–32.
Kaspersky Lab (2010): Kaspersky Lab provides its insights on Stuxnet worm. http://www.kaspersky.com/about/news/virus/2010/Kaspersky_Lab_provides_its_insights_on_Stuxnet_worm.
Keohane, Robert O. (2006): Decisiveness and Accountability as Part of a Principled Response to Nonstate Threats. Ethics & International Affairs, 20(2):219–224.
Knapp, K. und W. Boulton (2007): Ten information warfare trends. In: Cyber Warfare and Cyber Terrorism, Hg. Janczewski L. und A. Colarik, Hershey, PA.
Kravets, David (2012): CIA Refuses to Confirm or Deny Drone Attacks Obama Brags About. Wired.com Threat Level, http://www.wired.com/threatlevel/2012/06/cia-confirm-deny-drones/.
Lackey, Douglas (1982): A Modern Theory of JustWar. Ethics, 92(3):533–546.
Lee, Steven (2006): International Governance and the Fight against Terrorism. Ethics & International Affairs, 20(2):241–246.
von Leiter, Felix (2012): http://blog.fefe.de/?ts=b13ac298.
Leyden, John (2009): Russian spy agencies linked to Georgian cyber-attacks. The Register, 23.3., http://www.theregister.co.uk/2009/03/23/georgia_russia_cyberwar_analysis.
Libicki, Martin C. (2009): Cyberdeterrence and Cyberwar. Santa Monica.
Lucas, George R. (2011): The Strategy of Graceful Decline. Ethics & International Affairs, 25(2):133–142.
Mahbubani, Kishore (2009): The Dangers of Democratic Delusions. Ethics & International Affairs, 18(1):19–25.
McMahan, Jeff (2010): The Just Distribution of Harm Between Combatants and Noncombatants. Philosophy & Public Affairs, 38(4):342–379.
McMahan, Jeff (2011): Proportionality in the AfghanistanWar. Ethics & International Affairs, 25(2):143–154.
McMahan, Jeff (2012): Hobbesian Defenses of Orthodox JustWar Theory. In: Hobbes Today, Hg. Sharon Lloyd, New York.
McNamara, Robert Strange (1970): Die Sicherheit des Westens. München.
Meggle, Georg (2004): NATO-Moral und Kosovo-Krieg: Ein ethischer Kommentar ex post. In: Humanitäre Interventionsethik, Hg. Georg Meggle, Paderborn.
Mill, John Stuart (1867): A FewWords on Non-Intervention. In: Dissertations and Discussions, London, Bd. 3.
Miller, RichardW. (2011): The Ethics of America’s AfghanWar. Ethics & International Affairs, 25(2):103–131.
Moellendorf, Darell (2011): Jus Ex Bello in Afghanistan. Ethics & International Affairs, 25(3):155–164.
Müller, Olaf L. (2004):Was wissen Sie über Kosovo? In: Humanitäre Interventionsethik, Hg. Georg Meggle, Paderborn.
Münkler, Herfried (2005): Die neuen Kriege. Reinbek bei Hamburg.
Münkler, Herfried (2006): Der Wandel des Krieges. Weilerswist.
Münkler, Herfried (2007a): Elemente einer neuen Sicherheitsarchitektur. Internationale Politik: IP, 62(5):6–14.
Münkler, Herfried (2007b): Neues vom Chamäleon Krieg. Aus Politik und Zeitgeschichte (APuZ), 16–17:3–9.
Nakashima, Ellen (2012): China testing cyber-attack capabilities, report says. The Washington Post, 8.3.
de Nevers, Renée (2007): Sovereignty and Ethical Argument in the Struggle against State Sponsors of Terrorism. Journal of Military Ethics, 6(1):1–18.
Orend, Brian (2006): The Morality of War. Ontario.
Pattison, James (2011): Ethics of Humanitarian Intervention in Libya. Ethics & International Affairs, 25(3):271–277.
Perlroth, Nicole (2013): Hackers in China Attacked The Times for Last 4 Months. The New York Times, 30.1.
Perry, David L. (2009): Partly Cloudy – Ethics in War, Espionage, Covert Action and Interrogation. Lanham, MD.
Pfaff, T. und J.R. Tiel (2004): The Ethics of Espionage. Journal of Military Ethics, 3(1):1–15.
Pinker, Steven (2011): Gewalt. Frankfurt/Main.
Rawls, John (1999a): The Law of Peoples. Oxford.
Rawls, John (1999b): A Theory of Justice. Oxford.
Rodin, David (2011): EndingWar. Ethics & International Affairs, 25(3):359–367.
Rowe, Neil C. (2010): The Ethics of Cyberweapons inWarfare. International Journal of Cyberethics, 1(1):20–31.
Saad, H. und N. Cumming-Bruce (2012): Civilian Attacks Rise in Syria, U.N. Says. The New York Times, 17.9.
Sanger, D. E. und E. Bumiller (2011): Pentagon to Consider Cyberattacks Acts ofWar. The New York Times, 31.5.
Sanger, David E. (2012): Obama Order Sped UpWave of Cyberattacks Against Iran. The New York Times, 1.6.
Schlesinger, Stephen (2009): Why a ’League of Democracies’ will notWork. Ethics & International Affiars, 18:13–18.
Schmitt, Carl (1963): Theorie des Partisanen. Berlin.
Schwenkenbecher, Anne (2009): Terrorism, Supreme Emergency and Killing the Innocent. Perspectives, 17(1).
Shachtman, Noah (2005): Drone School: A Ground’s Eye View. Wired Magazine, Mai.
Shachtman, Noah (2011): Exclusive: Computer Virus Hits U.S. Drone Fleet. Wired.com Danger Room, http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/.
Simonite, Tom (2013):Welcome to the Malware-Industrial Complex. MIT Technology Review Computing News, 3.2., http://www.technologyreview.com/news/507971/welcome-to-themalware-industrial-complex/.
Singer, PeterW. (2010): The Ethics of Killer Applications. Journal of Military Ethics, 9(4):299–312.
Sparrow, Robert (2009): Building a BetterWarBot: Ethical Issues in the Design of Unmanned Systems for Military Applications. Science and Engineering Ethics, 15(2):169–187.
Spiegel Online (2012): SWR-Server hält Ermittleransturm nicht stand. Spiegel Online, 14.5., http://www.spiegel.de/kultur/tv/tatort-online-ermittlung-des-moerders-fuehrt-zu-swrserverabsturz-a–833069.html.
Straits Times (2011): NATO Chief Urges Quick UN Deal on Libya. Straits Times, 17.3., http://www.straitstimes.com/BreakingNews/World/Story/STIStory_646287.html.
Sutch, Peter (2012): Human rights and the use of force: Assertive liberalism and just war. European Journal of Political Theory, 11(2):172–190.
theguardian.com (2013): Former US general James Cartwright named in Stuxnet leak inquiry. theguardian.com, 28.2., http://www.theguardian.com/world/2013/jun/28/generalcartwright-investigated-stuxnet-leak.
Thompson, Ian (2012): US Navy buys Linux to guide drone fleet. The Register, 8.6.
United Nations General Assembly (2010): Sixtieth session, items 48 and 121 of the provisional agenda. A/60/L.1. http://www.who.int/hiv/universalaccess2010/worldsummit.pdf.
Walzer, Michael (2006): Just and Unjust Wars. New York.
Weiss, Thomas G. (2011): RtoP Alive andWell after Libya. Ethics & International Affairs, 25(3):287–292.
Welsh, Jennifer (2011): Civilian Protection in Libya: Putting Coercion and Controversy Back into RtoP. Ethics & International Affairs, 25(3):255–262.
Zalman, A. und J. Clarke (2009): The GlobalWar on Terror: A Narrative in Need of a Rewrite. Ethics & International Affairs, 20(2):101–113.
Zupan, Dan (2008): A Presumption of the Moral Equality of Combatants: a Citizen-Soldier’s Perspective. In: Just and Unjust Warriors, Hg. D. Rodin und H. Shue, Oxford/New York.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
von dem Knesebeck, P. (2014). Ius ad bellum und ius post bellum. In: Soldaten, Guerilleros, Terroristen. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-05152-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-658-05152-5_4
Published:
Publisher Name: Springer VS, Wiesbaden
Print ISBN: 978-3-658-05151-8
Online ISBN: 978-3-658-05152-5
eBook Packages: Humanities, Social Science (German Language)