Weitere Kapitel dieses Buchs durch Wischen aufrufen
Cyber law is needed to govern the cyberspace. While currently developed, it will be based on existing international human rights and criminal law standards. Moreover, a new cyber law regime will not seek new norms, but it aims to develop standards and mechanism that allow to hold providers and users accountable if they violate human rights norms in cyberspace. Cyber law is the foundation for the cyber and Internet governance regime.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is coming! Comparative Strategy, 12, 141–165. CrossRef
CCDCOE. (2013). Tallinn manual. Accessed April 19, 2017, from https://ccdcoe.org/research.html
CCDCOE NATO Cooperative Cyber Defence Center of Excellence. (2017). Accessed April 19, 2017, from https://www.ccdcoe.org/
Council of Europe. (2001). Convention on cybercrime. http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf
Council of Europe. (2017). Action against cybercrime. Accessed April 19, 2017, from https://www.coe.int/en/web/cybercrime
Eskens, S., van Daalen, O., & van Eijk, N. (2015). Ten standards for oversight and transparency of national intelligence services. Accessed April 19, 2017, from http://ivir.nl/publicaties/download/1591
European Court of Human Rights. (2015, June 16). Case Delfi AS v. Estonia, No. 64569/09.
European Court of Human Rights. (2012, December 18). Case Yildirim v. Turkey, No. 158.
Freedom Online Coalition. (2017). The freedom online coalition. Accessed April 19, 2017, from https://www.freedomonlinecoalition.com/
INSAFE-INHOPE Network. (2014). Annual report 2014. Accessed April 19, 2017, from http://inhope.org/Libraries/Annual_reports/Joint_Insafe_INHOPE_Annual_Report_2014.sflb.ashx
Internet Jurisdiction. (2017). Accessed April 19, 2017, from http://www.internetjurisdiction.net/
Kutnaeva, N. (2014). The fight against internet, crimes must not neglect democratic principles in concordiam. Journal of European Security and Defense Issues, 5(2), 15–17.
Lipton, J. (2015). Rethinking cyberlaw: A new vision for internet law. Cheltenham: Edward Elgar Publishing. CrossRef
Lotrionte, C. (2012). State sovereignty and self-defense in cyberspace: A normative framework for balancing legal rights. Emroy International Law Review, 26(1), 825–919. Accessed April 19, 2017, from http://www.law.emory.edu/fileadmin/journals/eilr/26/26.2/Lotrionte.pdf.
Maurer, T. (2011). Cyber norm emergence at the United Nations – An analysis of the UN’s activities regarding cyber-security?. Accessed April 19, 2017, from http://belfercenter.ksg.harvard.edu/files/maurer-cyber-norm-dp-2011-11-final.pdf
Melzer, N. (2011). Cyberwarfare in international law. Accessed April 19, 2017, from http://unidir.org/files/publications/pdfs/cyberwarfare-and-international-law-382.pdf
OSCE Office for Democratic Institutions and Human Rights. (2014). Hate crime laws: A practical guide. Accessed April 19, 2017, from http://osce.org/odihr
Radio Netherlands Worldwide. (2013). Stricter Indian internet laws ‘threaten human rights’. Accessed April 19, 2017, from http://www.rnw.nl/english/article/stricter-indian-internet-laws-threaten-human-rights
The Mailaymail Online. (2016). Cyber court to roll out Sept 1, Azalina tells lawyers to deepen IT knowledge. Accessed April 19, 2017, from http://www.themalaymailonline.com/malaysia/article/cyber-court-to-roll-out-sept-1-azalina-tells-lawyers-to-deepen-it-knowledge#sthash.MkxPdSyu.dpuf
Wolter, D. (2013). The UN takes a big step forward on cybersecurity: Arms control today. Accessed April 19, 2017, from https://www.armscontrol.org/act/2013_09/The-UN-Takes-a-Big-Step-Forward-on-Cybersecurity
Ziolkowski, K. (Ed.). (2013). Peacetime regime for state activities in cyberspace. Tallinn: CCDCOE NATO Cooperative Cyber Defence Center of Excellence. Accessed January 1, 2017.
- Cyber Law
- Chapter 6
Die Corporate Supply Strategy bei Phoenix Contact GmbH & Co. KG/© [M] michalchm89 | Fotolia