Connections the quarterly journal

Search form

  • Like Connections page on Facebook(link is external)
  • Follow us on Twitter(link is external)
  • Find connections on Istagram(link is external)
  • Connect with us on LinkedIN(link is external)
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

International Law and the Use of Force: The Jus Ad Bellum

02.3.10_schmitt.pdf

Publication Type:

Journal Article

Authors:

Michael N. Schmitt

Source:

Connections: The Quarterly Journal , Volume 2, Issue 3, p.89-97 (2004)
  • 18674 reads
  • Google Scholar(link is external)
  • DOI(link is external)
  • RTF
  • EndNote XML

References

Augustine, St.. Quaestiones in Heptateuchum. Vol. Book VI., 420.
Aquinas, St. Thomas. Summa Theologica. Vol. Book II., 1274.
Machiavelli, Niccolo. The Prince. London: Penguin, 1968.
Hague Convention (I) for the Pacific Settlement of International Disputes., 1899.
Covenant of the League of Nations In 225 Consolidated Treaty Series., 1919.
General Treaty for Renunciation of War as an Instrument of National Policy (Kellogg–Briand Pact)., 1928.
Security Council Resolution 1441(link is external) In U.N. SCOR, 4644th mtg., 2002.
Security Council Resolution 1474(link is external) In U.N. SCOR, 4737th mtg., 2003.
"Judgment and Sentences." American Journal of International Law 41 (1947).
Military and Paramilitary Activities in and Against Nicaragua In International Court of Justice Reports., 1986.
Legality of the Threat or Use of Nuclear Weapons In International Court of Justice Reports., 1996.
Schacter, Oscar. "The Right of States to Use Armed Force." Michigan Law Review 82 (1984): 1634-35.
Carlsson, Ingvar, Han Sung-Joo, and M. Kupolati. Report of the Independent Inquiry into United Nations Actions during the 1994 Rwanda Genocide(link is external)., 1999.
Wingfield, Thomas. "Taking Aim at Regime Elites: Assassination, Tyrannicide, and the Clancy Doctrine." Maryland Journal of International Law and Trade 22 (1999).
The National Security Strategy of the United States of America(link is external)., 2002.
Glennon, Michael J.. "Why the Security Council Failed." Foreign Affairs 82, no. 3 (2003): 16-35.

Active calls for articles

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile(link is external)

  • Downloads
  • Cited in
  • How to cite
  • File Name: 02.3.10_schmitt.pdf
    Size: 226.93 KB
    Number of Downloads: 7060
Hadji-Janev, Metodi, and Stevan Aleksoski. "Use of Force in Self-Defense Against Cyber-Attacks and the Shockwaves in the Legal Community: One more Reason for Holistic Legal Approach to Cyberspace." Mediterranean Journal of Social Sciences 4, no. 14 (2013).
Yap, Gerald T.. When is a Hack an Attack? A Sovereign States Options if Attacked in Cyberspace: A Case Study of Estonia 2007 In Research Report. Alabama: Air Command And Staff College Air University Maxwell Air Force Base, 2009.
Category Archives: Uncategorized(link is external). The New Phoenix, 2011.
APA style: Schmitt, M. N. (2004).  International Law and the Use of Force: The Jus Ad Bellum. Connections: The Quarterly Journal . 2(3), 89-97.
Chicago style: Schmitt, Michael N.. "International Law and the Use of Force: The Jus Ad Bellum." Connections: The Quarterly Journal 2, no. 3 (2004): 89-97.
IEEE style: Schmitt, M. N., "International Law and the Use of Force: The Jus Ad Bellum", Connections: The Quarterly Journal , vol. 2, issue 3, pp. 89-97, September 2003, 2004.
DOI http://dx.doi.org/10.11610/Connections.02.3.10(link is external)
  • Trending
  • Latest(active tab)
  • Most cited
  • The Weaponization of Emerging Technologies and Their Impact on Global Risk: A Perspective from the PfPC Emerging Security Challenges Working Group (1,666)
  • Goodbye Globalization? Hello 'Fragmentegration'! - The World Economy and Strategic Competition (1,244)
  • Towards a New Role for the European Union in the South Caucasus? (1,239)
  • Hybrid Threats and Strategic Competition (1,213)
  • The PfP Consortium Regional Stability in South East Europe Working Group at 25: The Transformed Balkans and the Work Ahead (1,148)
view all
  • Communicating (In)Security in Ukraine
  • Hybrid Warfare in the Black Sea Region: Russian Information-Psychological Operations in Georgia
  • Ukraine's Component in the Platform of European Memory and Conscience
  • Kremlin's 'War on Terrorism' in the Northeastern Caucasus: How Chechnya Still 'Saves' Russia
  • A Theory of Change: 25 Years of the Partnership for Peace Consortium
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
From Civil-Military Relations to Resilience: The Fifth Wave of Strengthening Democracy through Research and Education (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes(link is external), 2012-2025
This site was designed and is maintained by Procon Ltd.(link is external), Executive publisher of Connections: The Quarterly Journal