Despite being a crucially important domain for states, businesses, and individuals, cyberspace still suffers from a regulation deficit. This article takes up one such dangerously underregulated area: cyber warfare and regulation of cyber weapons. For that purpose, the authors first analyse the threats posed by weaponised malicious code, including some examples of its use and potential considerations that could sway states towards engaging in a multilateral cyber weapons regulation regime. These considerations are then converted into some major principles and points to be regarded should a potential cyber weapons convention be contemplated. These are subsequently further elaborated in light of the Chemical Weapons Convention, particularly wi...
Kopš datortehnoloģiju pieaugošās lomas mūsdienu sabiedrībā, kiberuzbrukumi kļūst arvien izplatītāki ...
Abstract. Article 2(4) of the UN Charter provides that nation-states will refrain from the threat or...
This essay explores the challenges of ensuring cyber security internationally and what needs to be d...
Despite being a crucially important domain for states, businesses, and individuals, cyberspace still...
Despite being a crucially important domain for states, businesses, and individuals, cyberspace still...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
In my bachelor thesis I consider security in cyberspace and attempt to establish, whether theoretica...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The book highlights international efforts in cyber environment regulation, reviews the best practice...
The upcoming research aspires to elucidate limits imposed by international public law on deployment ...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
This article examines the merits of defining a class of offensive destructive cyber weapons as weapo...
Cyberspace, already a few decades old, has become a matter of course for most of us, part of our eve...
In the article, the authors demonstrated a compelling understanding of the fact that the issue of co...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
Kopš datortehnoloģiju pieaugošās lomas mūsdienu sabiedrībā, kiberuzbrukumi kļūst arvien izplatītāki ...
Abstract. Article 2(4) of the UN Charter provides that nation-states will refrain from the threat or...
This essay explores the challenges of ensuring cyber security internationally and what needs to be d...
Despite being a crucially important domain for states, businesses, and individuals, cyberspace still...
Despite being a crucially important domain for states, businesses, and individuals, cyberspace still...
States’ capacity for using information and communication technology (ICT) to inflict grave economic,...
In my bachelor thesis I consider security in cyberspace and attempt to establish, whether theoretica...
The article focuses on the destructive phenomenon of cyberterrorism as an atypical manifestation (fo...
The book highlights international efforts in cyber environment regulation, reviews the best practice...
The upcoming research aspires to elucidate limits imposed by international public law on deployment ...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
This article examines the merits of defining a class of offensive destructive cyber weapons as weapo...
Cyberspace, already a few decades old, has become a matter of course for most of us, part of our eve...
In the article, the authors demonstrated a compelling understanding of the fact that the issue of co...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
Kopš datortehnoloģiju pieaugošās lomas mūsdienu sabiedrībā, kiberuzbrukumi kļūst arvien izplatītāki ...
Abstract. Article 2(4) of the UN Charter provides that nation-states will refrain from the threat or...
This essay explores the challenges of ensuring cyber security internationally and what needs to be d...