Jump to Content
Jump to Main Navigation
Get Access or Sign In
Register
Browse
About
How to Subscribe
Contact our Sales Department
Subscription Prices
Librarian Services
Contact our Sales Department
Customer Service
Authentication
Licensing Terms and Conditions
MARC Records
KBART Lists
Indexing & Discoverability
Free Trial
Help
Academic Libraries
Non Academic Libraries
Researchers & Students
Other Products
Major Annual Subject Collections
Essentials Collections
Handbook Collections
Encyclopedia
Subject Specific Collections
Tailored/Pick & Choose Collections
Journals
Practitioner Law Collections
Open Access
Search
Advanced Search
Help
Advanced Search
Help
Get Access or Sign In
Register
Browse
About
How to Subscribe
Contact our Sales Department
Subscription Prices
Librarian Services
Contact our Sales Department
Customer Service
Authentication
Licensing Terms and Conditions
MARC Records
KBART Lists
KBART Lists
Indexing & Discoverability
Free Trial
Help
Academic Libraries
Non Academic Libraries
Researchers & Students
Other Products
Major Annual Subject Collections
Essentials Collections
Handbook Collections
Encyclopedia
Subject Specific Collections
Tailored/Pick & Choose Collections
Journals
Practitioner Law Collections
Open Access
Previous Chapter
Index
David P. Fidler
Free access
Publication Date:
30 Jun 2022
Page Range:
152–157
DOI:
https://doi.org/10.51952/9781800883352.bm001
Free access
Flowing Text
Back matter
Index
5G wireless
10
,
147
11 September 2001
52
,
55
,
59
,
60
,
65
,
66
,
69
,
70
,
74
,
76
,
83
,
91
,
92
,
116
active defence
40
,
41
,
50
Afghanistan
76
,
143
African Convention on Cyber Security and Personal Data Protection
45
,
46
,
47
,
48
,
50
African Union
45
,
46
,
47
,
68
aggression
120
act of
109
,
120
,
121
,
130
crime of
120
,
121
,
135
Agreement on Access to Electronic Data for the Purpose of Countering Serious Crime
45
Agreement on Cooperation in Combating Offenses Related to Computer Information
45
Agreement on Cooperation in the Field of International Information Security
45
,
63
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
87
,
88
“all hazards” approach
8
,
22
,
66
,
67
,
98
Al Qaeda
76
,
144
American Convention on Human Rights
73
Annan, Kofi
60
anticipatory self-defence
116
,
117
,
118
,
119
anti-terrorism treaties
57
,
61
,
62
,
65
,
68
,
75
Arab Convention on Combating Information Technology Offenses
45
,
47
,
48
armed attack
viii,
68
,
75
,
82
,
102
,
109
,
110
,
113
,
114
,
115
,
116
,
117
,
118
,
119
,
120
,
128
,
130
armed conflict
3
,
5
,
7
,
14
,
24
,
27
,
30
,
64
,
104
,
105
,
106
,
107
,
108
,
109
,
110
,
117
,
127
,
128
,
129
,
130
,
131
,
132
,
133
,
134
,
135
,
136
,
138
,
139
,
145
,
146
,
148
,
149
,
150
arms control
82
,
105
,
139
artificial intelligence
10
,
54
,
147
Association of Southeast Asian Nations Convention on Counter-Terrorism
62
attribution
9
,
65
,
75
,
80
,
101
,
137
,
148
Australia
38
,
45
,
67
,
137
,
143
authoritarian
5
,
10
,
16
,
20
,
23
,
25
,
37
,
70
,
72
,
74
,
124
,
142
,
144
,
146
,
148
,
149
authoritarianism
14
,
146
balance of power
10
,
17
,
93
balance-of-power politics
14
,
28
,
54
,
91
,
145
blockchain
10
Bush, George W.,
70
Canada
89
,
99
,
143
Caribbean
37
China
5
,
10
,
14
,
16
,
19
,
20
,
25
,
27
,
38
,
46
,
48
,
50
,
54
,
79
,
87
,
88
,
89
,
91
,
94
,
100
,
101
,
108
,
124
,
130
,
140
,
142
,
144
,
146
,
147
Clean Network Program,
25
,
88
Cold War
10
,
13
,
14
,
91
,
122
,
140
,
149
p.
153
post-
10
,
14
,
91
,
149
Commonwealth Model Law on Computer and Computer-Related Crime
35
,
36
Commonwealth of Independent States
45
Comprehensive Convention on International Terrorism
63
confidence-building measures (CBMs)
105
,
138
,
140
Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation
61
Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
61
Convention for the Suppression of Unlawful Seizure of Aircraft
61
Convention on Cybercrime
45
,
46
,
47
,
48
,
49
,
143
Convention on Offences and Certain Other Acts Committed on Board Aircraft
61
Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons, including Diplomatic Agents
62
Convention on the Suppression of the Financing of Terrorism
62
Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation
61
Convention on Transnational Organized Crime
45
Council of Europe (COE)
37
,
45
,
46
,
47
,
48
counterintelligence
4
,
38
,
69
,
79
,
83
,
90
,
91
,
92
,
95
,
96
,
101
,
106
,
144
,
147
countermeasures
10
,
53
,
75
,
116
,
119
,
126
counterterrorism
3
,
4
,
38
,
52
,
58
,
65
,
68
,
69
,
70
,
71
,
72
,
73
,
74
,
76
,
83
,
92
,
95
,
96
,
143
,
144
,
147
,
148
covert cyber operations
79
,
80
,
102
,
103
COVID-19 pandemic
31
,
40
,
142
,
143
crimes against humanity
135
critical infrastructure
6
,
8
,
9
,
15
,
17
,
24
,
39
,
41
,
50
,
51
,
52
,
53
,
54
,
55
,
58
,
66
,
67
,
68
,
75
,
79
,
97
,
98
,
99
,
101
,
106
,
108
,
124
,
139
critical-infrastructure protection
66
,
68
cryptocurrencies
10
,
31
customary international law
25
,
26
,
28
,
41
,
49
,
50
,
64
,
81
,
84
,
85
,
89
,
100
,
127
cyberattacks
3
,
6
,
8
,
9
,
24
,
55
,
56
,
57
,
59
,
64
,
65
,
68
,
75
,
107
,
111
,
121
,
132
,
134
,
143
cybercrime
2
,
6
,
7
,
9
,
16
,
17
,
21
,
22
,
24
,
25
,
27
,
30
,
31
,
32
,
33
,
34
,
35
,
36
,
37
,
38
,
39
,
40
,
41
,
42
,
43
,
44
,
45
,
46
,
49
,
50
,
51
,
52
,
53
,
54
,
57
,
58
,
61
,
68
,
72
,
75
,
76
,
78
,
80
,
88
,
90
,
94
,
95
,
97
,
107
,
108
,
109
,
118
,
123
,
142
,
143
,
145
,
146
,
147
,
148
,
150
,
151
cyber defence
39
,
49
,
105
,
106
,
108
,
127
cyber-defence approach
8
,
66
cyber deterrence
vi,
8
,
17
,
22
,
30
,
32
,
39
,
49
,
50
,
105
,
107
,
108
,
142
cyber-deterrence approach
8
,
22
,
40
,
52
cyber espionage
22
,
25
,
30
,
78
,
79
,
80
,
81
,
82
,
83
,
84
,
85
,
86
,
89
,
90
,
91
,
92
,
93
,
94
,
95
,
96
,
97
,
98
,
101
,
103
,
105
,
107
,
109
,
118
,
125
,
126
,
130
,
143
,
144
,
145
,
146
,
147
,
148
,
149
,
150
cybersecurity
2
,
3
,
4
,
5
,
6
,
7
,
8
,
9
,
10
,
11
,
14
,
15
,
16
,
17
,
18
,
19
,
20
,
21
,
22
,
23
,
24
,
25
,
26
,
27
,
30
,
31
,
34
,
35
,
38
,
39
,
40
,
46
,
49
,
50
,
52
,
54
,
55
,
56
,
57
,
63
,
66
,
67
,
68
,
72
,
78
,
80
,
94
,
96
,
97
,
98
,
99
,
100
,
103
,
104
,
106
,
107
,
108
,
123
,
126
,
139
,
140
,
141
,
142
,
143
,
146
,
147
,
148
,
149
,
150
p.
154
cyber sovereignty
20
,
72
,
124
,
147
,
148
,
149
cyberspace
2
,
4
,
6
,
7
,
8
,
10
,
11
,
13
,
14
,
15
,
16
,
20
,
21
,
22
,
23
,
25
,
26
,
27
,
33
,
34
,
37
,
38
,
40
,
42
,
52
,
55
,
56
,
69
,
72
,
78
,
80
,
95
,
106
,
109
,
112
,
115
,
123
,
125
,
130
,
131
,
132
,
137
,
143
,
144
,
146
,
147
,
148
,
149
,
151
cyber terrorism
viii,
30
,
39
,
55
,
56
,
57
,
58
,
60
,
61
,
62
,
63
,
64
,
65
,
66
,
67
,
74
,
75
,
76
,
79
,
109
,
142
cyber-threat approach
7
cyber threats
3
,
4
,
7
,
22
,
27
,
39
,
50
,
66
,
67
,
68
,
98
,
104
,
105
cyber war
viii,
42
,
104
,
144
democracies
10
,
13
,
14
,
16
,
20
,
23
,
25
,
37
,
60
,
69
,
70
,
71
,
72
,
92
,
143
,
146
,
147
,
148
,
149
,
151
democracy
10
,
14
,
20
,
90
,
141
,
146
democratic
3
,
5
,
15
,
16
,
20
,
25
,
37
,
60
,
70
,
71
,
93
,
100
,
102
,
143
,
146
,
148
,
150
deterrence
40
,
50
,
65
,
79
,
80
,
81
,
103
,
147
by denial
8
,
40
,
95
,
127
by norms
39
,
90
,
115
,
127
by punishment
8
,
39
,
40
,
79
,
95
,
103
,
105
,
107
,
127
nuclear
139
digital authoritarianism
10
,
14
,
16
,
60
,
69
,
72
,
74
,
86
,
93
,
143
,
146
,
148
,
149
digital repression
69
,
72
,
74
,
149
disinformation
4
,
5
,
14
,
16
,
20
,
101
,
102
,
107
,
119
,
123
,
126
,
150
distributed denial of service
101
,
108
,
136
Domain Name System (DNS)
12
,
18
Economic and Trade Agreement between China and the United States
89
economic cyber espionage
vii,
16
,
21
,
84
,
87
,
88
,
89
,
96
,
97
,
98
,
140
economic espionage
78
,
83
,
88
,
89
,
96
electronic communications
36
,
37
,
70
,
72
,
92
,
95
electronic mail
3
,
4
,
71
,
134
electronic surveillance
3
,
4
,
16
,
20
,
24
,
25
,
55
,
69
,
73
,
74
,
86
,
95
,
143
,
147
encryption
31
,
37
,
38
,
39
,
72
,
73
,
96
,
98
Engels, Friedrich
15
espionage
24
,
73
,
78
,
79
,
80
,
81
,
82
,
83
,
84
,
85
,
86
,
89
,
90
,
91
,
92
,
93
,
94
,
95
,
96
,
101
,
104
,
123
,
137
,
144
,
145
,
147
,
148
European Convention on Human Rights
60
,
74
,
86
European Court of Human Rights
60
,
74
European Law Enforcement Agency (Europol)
31
,
49
European Union (EU)
21
,
22
,
31
,
37
,
45
,
68
,
73
,
86
,
98
,
100
,
143
export controls
140
,
141
extradition
34
,
41
,
43
,
44
,
45
,
46
,
48
,
51
,
75
,
94
,
97
extraterritorial application
of domestic law
33
of international law
84
,
85
,
86
,
87
,
88
,
89
France
46
,
56
,
60
,
124
Freedom House
10
,
20
,
72
freedom of expression
13
,
35
,
59
,
60
,
69
,
72
,
73
,
150
“full spectrum” capabilities
8
,
80
genocide
65
,
111
,
135
geopolitical
10
,
13
,
14
,
15
,
25
,
28
,
54
,
71
,
91
,
122
,
140
,
145
,
146
,
147
,
148
,
149
geopolitics
32
,
54
Germany
46
,
56
,
88
,
93
,
99
,
110
,
143
going dark
vi,
37
,
38
,
73
hackers
21
,
88
,
98
,
141
hacking
3
,
4
,
24
,
37
,
38
,
39
,
50
,
51
,
80
,
88
,
141
“harden the target” strategy
8
,
39
hardware
3
,
12
Hobbes, Thomas
15
humanitarian intervention
111
,
113
,
122
p.
155
human rights
27
,
71
,
73
,
81
,
83
,
84
,
85
,
86
,
87
,
88
,
89
,
146
,
148
ideological
10
,
58
,
122
,
146
,
147
,
148
,
149
,
151
ideology
14
,
24
India
58
,
63
,
100
,
143
information and communication technologies (ICTs)
2
,
3
,
4
,
7
,
26
,
31
,
33
,
34
,
46
,
48
,
49
,
50
,
55
,
56
,
57
,
65
,
69
,
72
,
73
information operations
5
,
103
,
112
,
126
,
130
,
136
,
137
information security
5
,
16
,
68
intellectual property
15
,
32
,
83
,
84
,
87
,
88
,
89
,
96
international armed conflict
128
,
134
,
137
International Committee of the Red Cross (ICRC)
104
,
105
,
131
,
134
International Convention for the Suppression of Acts of Nuclear Terrorism
62
International Convention for the Suppression of Terrorist Bombings
62
,
65
International Covenant on Civil and Political Rights (ICCPR)
73
,
74
,
85
International Criminal Court (ICC)
120
,
121
,
135
International Criminal Police Organization (INTERPOL)
43
international humanitarian law (IHL)
59
,
68
,
104
,
106
,
110
,
120
,
121
,
122
,
127
,
128
,
129
,
130
,
131
,
132
,
133
,
134
,
135
,
136
,
137
,
138
,
139
,
145
international human rights law
27
,
73
,
74
,
84
,
85
,
86
,
87
,
148
international law
vi, vii,
2
,
4
,
6
,
7
,
8
,
9
,
10
,
11
,
17
,
19
,
21
,
23
,
24
,
25
,
26
,
27
,
30
,
32
,
37
,
41
,
42
,
49
,
51
,
52
,
53
,
54
,
55
,
56
,
57
,
60
,
64
,
68
,
71
,
73
,
74
,
75
,
76
,
79
,
81
,
82
,
83
,
84
,
86
,
88
,
89
,
91
,
92
,
93
,
95
,
96
,
100
,
101
,
102
,
105
,
108
,
109
,
110
,
113
,
114
,
115
,
116
,
117
,
119
,
120
,
121
,
122
,
123
,
124
,
125
,
126
,
127
,
130
,
135
,
136
,
138
,
139
,
142
,
143
,
144
,
145
,
147
,
148
,
149
,
151
international politics
2
,
11
,
89
international relations
10
,
23
,
25
,
32
,
79
,
92
,
145
,
147
,
148
,
150
,
151
international system
7
,
10
,
14
,
23
,
28
,
54
,
81
,
93
,
107
,
149
International Telecommunication Regulations (ITRs)
19
,
20
,
26
,
27
International Telecommunication Union (ITU)
19
,
20
,
26
International Telegraph Union
19
internet
2
,
4
,
6
,
7
,
11
,
12
,
13
,
14
,
15
,
16
,
17
,
18
,
19
,
20
,
23
,
24
,
25
,
26
,
31
,
33
,
36
,
37
,
38
,
44
,
49
,
55
,
56
,
58
,
59
,
64
,
69
,
70
,
73
,
75
,
76
,
78
,
80
,
90
,
94
,
99
,
101
,
132
,
142
,
143
,
146
freedom
6
,
10
,
20
,
24
,
27
,
72
,
143
,
146
,
147
,
149
,
151
governance
6
,
7
,
11
,
17
,
18
,
19
,
20
,
26
,
27
,
123
,
146
of things
13
,
31
sovereignty
6
,
20
,
24
,
27
,
124
Internet Corporation for Assigned Names and Numbers (ICANN)
18
,
19
Internet Engineering Task Force (IETF)
18
,
19
Internet Governance Forum (IGF)
19
Iran
102
,
109
,
112
,
115
,
116
,
117
,
118
,
119
,
121
,
124
,
125
,
126
,
134
,
140
,
143
Iraq
5
,
110
,
136
Islamic State
5
,
6
,
56
,
76
,
107
,
109
,
137
,
138
,
144
Israel
58
,
59
,
75
,
102
,
109
,
117
,
118
,
121
,
126
,
136
,
141
,
143
Japan
110
,
124
jurisdiction
23
,
33
,
34
,
41
,
46
,
47
,
50
,
52
,
61
,
62
,
65
,
84
,
120
,
121
,
135
criminal
33
,
41
,
54
p.
156
enforcement
34
,
41
,
42
,
50
,
51
,
53
prescriptive
41
,
42
universal
64
,
65
Kant, Immanuel
15
,
150
,
151
kinetic
4
,
9
,
104
,
105
,
107
,
111
,
115
,
116
,
117
,
118
,
121
,
122
,
130
,
131
,
135
,
137
,
138
Kosovo
122
law enforcement
3
,
4
,
24
,
37
,
38
,
41
,
52
,
69
,
72
,
91
,
95
,
96
,
99
,
147
law-enforcement agencies
4
,
24
,
31
,
36
,
38
,
43
,
45
lawful hacking
4
,
37
,
38
law of armed conflict
2
,
9
,
26
,
104
,
106
,
127
League of Arab States
45
,
46
,
47
Libya
111
,
121
malware
3
,
34
,
58
,
75
,
80
,
94
,
101
,
134
,
139
Marx, Karl
15
Microsoft Exchange
78
,
88
multi-stakeholder governance
19
,
20
mutual legal assistance
43
mutual legal assistance treaties (MLATs)
41
,
42
,
43
,
44
,
45
,
50
,
94
,
97
national security
2
,
3
,
4
,
5
,
6
,
9
,
13
,
14
,
15
,
16
,
19
,
24
,
30
,
38
,
39
,
44
,
56
,
67
,
69
,
70
,
78
,
80
,
81
,
89
,
90
,
91
,
93
,
97
,
99
,
100
,
139
,
147
networks
3
,
4
,
5
,
20
,
25
,
47
,
56
,
63
,
69
,
72
,
80
,
94
,
97
,
98
,
102
,
134
,
136
,
144
,
147
New Zealand
125
non-democratic countries
14
,
100
,
149
non-governmental organizations
6
,
8
,
17
non-international armed conflict
128
,
137
non-intervention
vi,
27
,
41
,
42
,
81
,
101
,
102
,
123
,
124
,
125
,
126
,
139
,
148
,
149
non-state actors
3
,
6
,
8
,
10
,
11
,
21
,
24
,
52
,
55
,
75
,
76
,
78
,
96
,
104
,
107
,
119
,
142
norms
17
,
21
,
22
,
27
,
39
,
50
,
90
,
115
,
127
,
145
,
148
North Atlantic Treaty Organization (NATO)
16
,
22
,
27
,
68
,
76
,
104
,
111
,
113
,
122
,
143
North Korea
101
,
108
,
126
,
140
,
143
Obama administration
99
Obama, Barack
71
,
111
Pacific Island Regional Model Cybercrime Legislation
35
Pakistan
58
Paris Convention for the Protection of Industrial Property
87
privacy
4
,
25
,
37
,
38
,
69
,
70
,
72
,
73
,
74
,
83
,
85
,
86
,
92
,
93
private sector
16
,
17
,
18
,
25
,
39
,
40
,
66
,
83
,
97
,
98
,
108
,
141
private-sector enterprises
21
,
39
,
40
,
96
,
98
,
106
Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf
62
Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation
61
Protocol Supplemental to the Convention for the Suppression of Unlawful Seizure of Aircraft
61
quantum computing
10
,
147
ransomware
31
,
51
,
52
,
53
,
66
,
67
,
79
,
107
,
142
,
143
responsibility to protect (R2P)
122
retorsion
75
,
116
,
126
,
127
right to use force in self-defence
viii,
68
,
75
,
76
,
102
,
112
,
113
,
116
,
117
,
120
,
122
Rome Statute of the International Criminal Court
120
,
121
,
135
,
136
Rousseau, Jean-Jacques
150
,
151
p.
157
Russia
5
,
10
,
14
,
19
,
20
,
27
,
46
,
48
,
50
,
51
,
53
,
54
,
79
,
91
,
94
,
100
,
101
,
102
,
103
,
108
,
112
,
119
,
124
,
126
,
136
,
140
,
142
,
144
,
146
,
147
Rwanda
135
Shanghai Cooperation Organization
16
,
45
,
46
,
63
,
68
Snowden, Edward
69
,
70
,
71
,
72
,
73
,
78
,
83
,
86
,
90
,
92
,
95
,
96
,
99
,
143
social media
4
,
5
,
20
,
56
,
59
,
70
,
101
software
3
,
12
,
13
,
15
,
21
,
23
,
31
,
35
,
36
,
38
,
39
,
97
,
98
,
99
,
100
,
102
,
108
,
139
,
141
,
150
SolarWinds
78
,
144
South Africa
33
,
143
Southern African Development Community
34
South Korea
101
,
143
sovereignty
2
,
6
,
9
,
14
,
19
,
20
,
23
,
25
,
27
,
41
,
42
,
48
,
52
,
54
,
81
,
82
,
83
,
101
,
102
,
120
,
123
,
124
,
125
,
126
,
128
,
139
,
148
,
149
Stuxnet
102
,
109
,
111
,
113
,
114
,
115
,
117
,
118
,
121
,
122
,
124
,
125
,
129
,
130
,
132
,
145
surveillance
4
,
69
,
70
,
71
,
72
,
73
,
74
,
82
,
92
,
93
,
95
,
96
,
98
,
116
,
141
,
143
,
144
,
148
,
150
Syria
5
,
136
Taliban
76
,
143
terrorism
7
,
45
,
52
,
53
,
55
,
56
,
57
,
58
,
59
,
60
,
63
,
64
,
65
,
68
,
69
,
70
,
72
,
76
,
91
,
119
,
138
,
143
,
144
,
147
,
148
,
150
Transmission Control Protocol/Internet Protocol (TCP/IP)
12
,
18
transnational criminal organizations
4
,
9
,
31
,
38
treaty law
25
,
26
,
27
,
68
,
81
,
84
,
89
Trump administration
99
Trump, Donald
116
Ukraine
56
,
136
,
137
United Arab Emirates
141
United Kingdom (UK)
45
,
46
,
51
,
58
,
59
,
69
,
71
,
74
,
88
,
99
,
110
,
111
,
112
,
123
,
137
,
143
United Nations (UN)
19
,
22
,
23
,
25
,
27
,
32
,
43
,
45
,
46
,
49
,
50
,
54
,
59
,
60
,
63
,
64
,
68
,
73
,
74
,
75
,
86
,
112
,
113
,
120
,
121
,
122
,
130
,
143
,
145
,
147
United States-Mexico-Canada Agreement (USMCA)
89
United States (U.S.)
5
,
10
,
13
,
14
,
15
,
17
,
19
,
20
,
21
,
25
,
27
,
31
,
33
,
36
,
37
,
38
,
42
,
45
,
46
,
50
,
51
,
52
,
53
,
54
,
55
,
56
,
57
,
58
,
59
,
60
,
66
,
67
,
69
,
70
,
71
,
72
,
73
,
74
,
75
,
76
,
78
,
79
,
83
,
85
,
86
,
87
,
88
,
89
,
90
,
91
,
92
,
93
,
94
,
96
,
99
,
100
,
101
,
102
,
103
,
105
,
106
,
107
,
108
,
109
,
110
,
111
,
112
,
116
,
118
,
119
,
121
,
126
,
132
,
136
,
137
,
138
,
140
,
141
,
143
,
144
,
146
,
147
,
149
,
150
use of force
10
,
26
,
101
,
102
,
104
,
109
,
112
,
113
,
114
,
115
,
116
,
117
,
118
,
119
,
120
,
121
,
122
,
123
,
127
,
128
,
130
,
148
,
150
vulnerabilities equities process (VEP)
99
,
100
war
30
,
104
,
105
,
106
,
108
,
109
,
110
,
112
,
127
,
134
,
145
,
147
,
149
crimes
30
,
135
,
136
,
138
powers
vii,
108
,
110
,
111
,
112
Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies
140
,
141
weapons of mass destruction
117
,
140
World Trade Organization (WTO)
87
,
88
World War I
145
World War II
135
,
137
,
145
Yugoslavia, former
135
zero-day vulnerabilities
36
,
37
,
98
,
99
,
100
,
108
,
109
,
139
Advanced Introduction to Cybersecurity Law
Publication Date:
30 Jun 2022
Print ISBN:
9781800883345
eISBN:
9781800883352
DOI:
https://doi.org/10.4337/9781800883352
Page Count:
192
Buy Print
Table of Contents
Front Matter
Frontmatter
PART I
Background for cybersecurity law
1
Introduction: Cybersecurity and cybersecurity law
2
Cyberspace, security, and law
PART II
Cybersecurity and non-state actors: Crime and terrorism in cyberspace
3
Cybercrime
4
Cyber terrorism
PART III
Cybersecurity and state actors: Espionage and war in cyberspace
5
Cyber espionage
6
Cyber war
7
Conclusion: Cybersecurity law in a divided world
Back Matter
Index
Subjects
General Interest
Law General Interest
Innovation and Technology
Technology and ICT
Law - Academic
Intellectual Property Law
Internet and Technology Law
Public International Law
Regulation and Governance
Terrorism and Security Law
Politics and Public Policy
Regulation and Governance
Email this content
Share Link
Copy this link, or click below to email it to a friend
Email this content
or copy the link directly:
https://www.advancedintros.com/display/book/9781800883352/back-1.xml
The link was not copied. Your current browser may not support copying via this button.
Link copied successfully
Copy link
Share on facebook
Share on linkedin
Share on twitter
[3.239.59.31]
3.239.59.31
Sign in to annotate
Close
Edit
Character limit
500
/500
Delete
Cancel
Save
@!
Character limit
500
/500
Cancel
Save
View Expanded
View Table
View Full Size