Confronting cyberespionage under international law:
We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for th...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Routledge
2018
|
Schriftenreihe: | Routledge research in international law
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law |
Beschreibung: | 1 online resource |
ISBN: | 9781351105996 135110599X 9781351106009 1351106007 9781351105989 1351105981 9781351106016 1351106015 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047014983 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201118s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781351105996 |9 978-1-351-10599-6 | ||
020 | |a 135110599X |9 1-351-10599-X | ||
020 | |a 9781351106009 |9 978-1-351-10600-9 | ||
020 | |a 1351106007 |9 1-351-10600-7 | ||
020 | |a 9781351105989 |9 978-1-351-10598-9 | ||
020 | |a 1351105981 |9 1-351-10598-1 | ||
020 | |a 9781351106016 |9 978-1-351-10601-6 | ||
020 | |a 1351106015 |9 1-351-10601-5 | ||
035 | |a (ZDB-7-TFC)9781351105996 | ||
035 | |a (DE-599)BVBBV047014983 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 345/.0231 |2 23 | |
100 | 1 | |a Pehlivan, Oğuz Kaan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Confronting cyberespionage under international law |c Oğuz Kaan Pehlivan |
264 | 1 | |a New York |b Routledge |c 2018 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Routledge research in international law | |
520 | |a We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law | ||
650 | 4 | |a Espionage | |
650 | 4 | |a International law | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Internet / Security measures | |
650 | 4 | |a Electronic surveillance | |
650 | 4 | |a Computer crimes | |
856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9781351106016 |x Verlag |z URL des Erstveroeffentlichers |3 Volltext |
912 | |a ZDB-7-TFC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032422520 |
Datensatz im Suchindex
_version_ | 1804181974834741248 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Pehlivan, Oğuz Kaan |
author_facet | Pehlivan, Oğuz Kaan |
author_role | aut |
author_sort | Pehlivan, Oğuz Kaan |
author_variant | o k p ok okp |
building | Verbundindex |
bvnumber | BV047014983 |
collection | ZDB-7-TFC |
ctrlnum | (ZDB-7-TFC)9781351105996 (DE-599)BVBBV047014983 |
dewey-full | 345/.0231 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 345 - Criminal law |
dewey-raw | 345/.0231 |
dewey-search | 345/.0231 |
dewey-sort | 3345 3231 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
discipline_str_mv | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03044nmm a2200457zc 4500</leader><controlfield tag="001">BV047014983</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201118s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351105996</subfield><subfield code="9">978-1-351-10599-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">135110599X</subfield><subfield code="9">1-351-10599-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351106009</subfield><subfield code="9">978-1-351-10600-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1351106007</subfield><subfield code="9">1-351-10600-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351105989</subfield><subfield code="9">978-1-351-10598-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1351105981</subfield><subfield code="9">1-351-10598-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781351106016</subfield><subfield code="9">978-1-351-10601-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1351106015</subfield><subfield code="9">1-351-10601-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-7-TFC)9781351105996</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047014983</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">345/.0231</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pehlivan, Oğuz Kaan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Confronting cyberespionage under international law</subfield><subfield code="c">Oğuz Kaan Pehlivan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Routledge</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Routledge research in international law</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Espionage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic surveillance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.taylorfrancis.com/books/9781351106016</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveroeffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032422520</subfield></datafield></record></collection> |
id | DE-604.BV047014983 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:58:15Z |
indexdate | 2024-07-10T09:00:11Z |
institution | BVB |
isbn | 9781351105996 135110599X 9781351106009 1351106007 9781351105989 1351105981 9781351106016 1351106015 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032422520 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-7-TFC |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Routledge |
record_format | marc |
series2 | Routledge research in international law |
spelling | Pehlivan, Oğuz Kaan Verfasser aut Confronting cyberespionage under international law Oğuz Kaan Pehlivan New York Routledge 2018 1 online resource txt rdacontent c rdamedia cr rdacarrier Routledge research in international law We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law Espionage International law Computer networks / Security measures Internet / Security measures Electronic surveillance Computer crimes https://www.taylorfrancis.com/books/9781351106016 Verlag URL des Erstveroeffentlichers Volltext |
spellingShingle | Pehlivan, Oğuz Kaan Confronting cyberespionage under international law Espionage International law Computer networks / Security measures Internet / Security measures Electronic surveillance Computer crimes |
title | Confronting cyberespionage under international law |
title_auth | Confronting cyberespionage under international law |
title_exact_search | Confronting cyberespionage under international law |
title_exact_search_txtP | Confronting cyberespionage under international law |
title_full | Confronting cyberespionage under international law Oğuz Kaan Pehlivan |
title_fullStr | Confronting cyberespionage under international law Oğuz Kaan Pehlivan |
title_full_unstemmed | Confronting cyberespionage under international law Oğuz Kaan Pehlivan |
title_short | Confronting cyberespionage under international law |
title_sort | confronting cyberespionage under international law |
topic | Espionage International law Computer networks / Security measures Internet / Security measures Electronic surveillance Computer crimes |
topic_facet | Espionage International law Computer networks / Security measures Internet / Security measures Electronic surveillance Computer crimes |
url | https://www.taylorfrancis.com/books/9781351106016 |
work_keys_str_mv | AT pehlivanoguzkaan confrontingcyberespionageunderinternationallaw |