Works matching DE "CYBERTERRORISM laws"
Results: 71
Illegal access to information systems and the Directive 2013/40/EU.
- Published in:
- International Review of Law, Computers & Technology, 2015, v. 29, n. 1, p. 50, doi. 10.1080/13600869.2015.1016278
- By:
- Publication type:
- Article
UK cyber security and critical national infrastructure protection.
- Published in:
- International Affairs, 2016, v. 92, n. 5, p. 1079, doi. 10.1111/1468-2346.12706
- By:
- Publication type:
- Article
What Made the Ostrich Lift Its Head? Significant Developments in Cybersecurity.
- Published in:
- Business Lawyer, 2015, v. 71, n. 1, p. 257
- By:
- Publication type:
- Article
‘My President is a Pair of Buttocks’: the limits of online freedom of expression in Uganda.
- Published in:
- International Journal of Law & Information Technology, 2018, v. 26, n. 3, p. 252, doi. 10.1093/ijlit/eay009
- Publication type:
- Article
CONVENTIONAL MILITARY FORCE AS A RESPONSE TO CYBER CAPABILITIES: ON SENDING PACKETS AND RECEIVING MISSILES.
- Published in:
- Air Force Law Review, 2015, v. 73, p. 111
- By:
- Publication type:
- Article
IS YOUR HOME NETWORK AS SAFE AS YOU THINK?
- Published in:
- 2023
- By:
- Publication type:
- Interview
Cyber Attacks and the Beginnings of an International Cyber Treaty.
- Published in:
- North Carolina Journal of International Law & Commercial Regulation, 2013, v. 39, n. 1, p. 223
- By:
- Publication type:
- Article
Respect for Sovereignty in Cyberspace.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1639
- By:
- Publication type:
- Article
Beyond Self-Defense and Countermeasures: A Critical Assessment of the Tallinn Manual's Conception of Necessity.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1619
- By:
- Publication type:
- Article
Squinting Through the Pinhole: A Dim View of Human Rights from Tallinn 2.0.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1599
- By:
- Publication type:
- Article
Give Them an Inch, They'll Take a Terabyte: How States May Interpret Tallinn Manual 2.0's International Human Rights Law Chapter.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1515
- By:
- Publication type:
- Article
State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1487
- By:
- Publication type:
- Article
Networking Security in Asia.
- Published in:
- Washington Quarterly, 2017, v. 40, n. 3, p. 45, doi. 10.1080/0163660X.2017.1370359
- By:
- Publication type:
- Article
Military Implications of Cyber Warfare: What's In Store For The Cyber Threat Landscape in 2018.
- Published in:
- Career Planning & Adult Development Journal, 2018, v. 34, n. 1, p. 58
- Publication type:
- Article
FROM CYBER ATTACKS TO SOCIAL MEDIA REVOLUTIONS: ADAPTING LEGAL FRAMEWORKS TO THE CHALLENGES AND OPPORTUNITIES OF NEW TECHNOLOGY.
- Published in:
- Emory International Law Review, 2012, v. 26, n. 2, p. 733
- By:
- Publication type:
- Article
Applying the Law of Proportionality to Cyber Conflict: Suggestions for Practitioners.
- Published in:
- Vanderbilt Journal of Transnational Law, 2017, v. 50, n. 1, p. 217
- By:
- Publication type:
- Article
HACKTIVISM AND THE FIRST AMENDMENT: DRAWING THE LINE BETWEEN CYBER PROTESTS AND CRIME.
- Published in:
- Harvard Journal of Law & Technology, 2013, v. 27, n. 1, p. 301
- By:
- Publication type:
- Article
THE OBLIGATION TO PREVENT TRANSBOUNDARY CYBER HARM: EXPAND THE REGULATORY REGIME OR CONTINUE DEFLECTING RESPONSIBILITY.
- Published in:
- George Washington International Law Review, 2023, v. 54, n. 2, p. 219
- By:
- Publication type:
- Article
Reviving the Principle of Non-Intervention in Cyberspace: The Path Forward.
- Published in:
- Journal of Conflict & Security Law, 2020, v. 25, n. 3, p. 423, doi. 10.1093/jcsl/kraa011
- By:
- Publication type:
- Article
Violations of International Humanitarian Law by Non-State Actors during Cyberwarfare: Challenges for Investigations and Prosecutions.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 555, doi. 10.1093/jcsl/krw018
- By:
- Publication type:
- Article
Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 429, doi. 10.1093/jcsl/krw011
- By:
- Publication type:
- Article
Individual Criminal Responsibility for Cyber Aggression.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 495, doi. 10.1093/jcsl/krw010
- By:
- Publication type:
- Article
Cyberspace, Terrorism and International Law.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 475, doi. 10.1093/jcsl/krw013
- By:
- Publication type:
- Article
Command Responsibility and Cyberattacks.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 505, doi. 10.1093/jcsl/krw012
- By:
- Publication type:
- Article
Non-State Actors, Ungoverned Spaces and International Responsibility for Cyber Acts.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 455, doi. 10.1093/jcsl/krw020
- By:
- Publication type:
- Article
Decoding Article 8 of the International Law Commission's Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 405, doi. 10.1093/jcsl/krw014
- By:
- Publication type:
- Article
THE NEED FOR INTERNATIONAL LAWS OF WAR TO INCLUDE CYBER ATTACKS INVOLVING STATE AND NON-STATE ACTORS.
- Published in:
- Pace International Law Review Online Companion, 2013, v. 3, n. 9, p. 278
- By:
- Publication type:
- Article
The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law.
- Published in:
- Acta Universitatis Danubius: Juridica, 2017, v. 13, n. 1, p. 141
- By:
- Publication type:
- Article
Resilience of Cyber Systems with Over- and Underregulation.
- Published in:
- Risk Analysis: An International Journal, 2017, v. 37, n. 9, p. 1644, doi. 10.1111/risa.12729
- By:
- Publication type:
- Article
FOREIGN INTERFERENCE IN ELECTIONS UNDER THE NON-INTERVENTION PRINCIPLE: WE NEED TO TALK ABOUT "COERCION".
- Published in:
- Duke Journal of Comparative & International Law, 2020, v. 31, n. 1, p. 161
- By:
- Publication type:
- Article
THE CYBER CIVIL WAR.
- Published in:
- Hofstra Law Review, 2015, v. 44, n. 1, p. 41
- By:
- Publication type:
- Article
An International Law Response to Economic Cyber Espionage.
- Published in:
- Connecticut Law Review, 2014, v. 46, n. 4, p. 1165
- By:
- Publication type:
- Article
State and Local Cybersecurity Improvement Act.
- Published in:
- Contract Management, 2021, v. 61, n. 10, p. 62
- Publication type:
- Article
AVERTING A "CYBER PEARL HARBOR" WITHOUT SINKING CORPORATE AMERICA: THE RAMIFICATIONS OF CYBERSECURITY REGULATIONS ON THE PRIVATE SECTOR.
- Published in:
- Contract Management, 2013, v. 53, n. 4, p. 34
- By:
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2013, v. 53, n. 3, p. 86
- Publication type:
- Article
Proposing a Self-Help Privilege for Victims of Cyber Attacks.
- Published in:
- George Washington Law Review, 2014, v. 82, n. 4, p. 1229
- By:
- Publication type:
- Article
ANONYMOUS ARMIES: MODERN "CYBER-COMBATANTS" AND THEIR PROSPECTIVE RIGHTS UNDER INTERNATIONAL HUMANITARIAN LAW.
- Published in:
- Pace International Law Review, 2016, v. 28, n. 1, p. 233, doi. 10.58948/2331-3536.1366
- By:
- Publication type:
- Article
Les cyberattaques étatiques constituent-elles des actes d 'agression en vertu du droit international public?: Deuxième partie.
- Published in:
- Ottawa Law Review, 2015, v. 47, n. 2, p. 199
- By:
- Publication type:
- Article
ACTIVE CYBER DEFENSE CERTAINTY: A DIGITAL SELF-DEFENSE IN THE MODERN AGE.
- Published in:
- Oklahoma City University Law Review, 2018, v. 43, n. 2, p. 101
- By:
- Publication type:
- Article
AN ADAPTIVE APPROACH FOR AN EVOLVING CRIME: THE CASE FOR AN INTERNATIONAL CYBER COURT AND PENAL CODE.
- Published in:
- Brooklyn Journal of International Law, 2012, v. 37, n. 3, p. 1139
- By:
- Publication type:
- Article
TOWARD CYBERPEACE: MANAGING CYBERATTACKS THROUGH POLYCENTRIC GOVERNANCE.
- Published in:
- American University Law Review, 2013, v. 62, n. 5, p. 1273
- By:
- Publication type:
- Article
ACKNOWLEDGING THE THREAT: SECURING UNITED STATES PIPELINE SCADA SYSTEMS.
- Published in:
- Energy Law Journal, 2015, v. 36, n. 1, p. 157
- By:
- Publication type:
- Article
Cyber Responsibility to Protect: Legal Obligations of States Directly Affected by Cyber-Incidents.
- Published in:
- Cornell International Law Journal, 2015, v. 48, n. 3, p. 481
- By:
- Publication type:
- Article
The Securities and Exchange Commission and the Growing Need for Cybersecurity in Modern Corporate America.
- Published in:
- Washburn Law Journal, 2014, v. 54, n. 1, p. 193
- By:
- Publication type:
- Article
Fighting the Fight: Cyber attacks on industrial control systems are increasing. What can you do?
- Published in:
- TCE: The Chemical Engineer, 2018, n. 923, p. 45
- By:
- Publication type:
- Article
The Law and Politics of Cyberattack Attribution.
- Published in:
- UCLA Law Review, 2020, v. 67, n. 3, p. 520
- By:
- Publication type:
- Article
CYBER WARS: APPLYING CONVENTIONAL LAWS OF WAR TO CYBER WARFARE AND NON-STATE ACTORS.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 535
- By:
- Publication type:
- Article
BUGS IN THE MARKET: CREATING A LEGITIMATE, TRANSPARENT, AND VENDOR-FOCUSED MARKET FOR SOFTWARE VULNERABILITIES.
- Published in:
- Arizona Law Review, 2016, v. 58, n. 3, p. 753
- By:
- Publication type:
- Article
Modernization of Romanian Legislation on Preventing and Combating Cybercrime and Implementation Gap at European level.
- Published in:
- Revista de Stiinte Politice / Revue des Sciences Politiques, 2015, n. 45, p. 186
- By:
- Publication type:
- Article
THE DARKENING STORM OF CYBERTERRORISM: INTERNATIONAL POLICY ADAPTATION FOR AUTOMOTIVE CYBERSECURITY REGULATIONS.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2019, v. 59, n. 3, p. 267
- By:
- Publication type:
- Article