The harm prevention rule in cyberspace: an obligation of due diligence
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Baden-Baden
Nomos
[2024]
|
Ausgabe: | 1st edition 2024 |
Schriftenreihe: | Beiträge zum ausländischen öffentlichen Recht und Völkerrecht
volume 335 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltstext Inhaltsverzeichnis |
Beschreibung: | 327 Seiten |
ISBN: | 9783756013562 3756013561 |
DOI: | 10.5771/9783748918844 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV049900431 | ||
003 | DE-604 | ||
005 | 20241209 | ||
007 | t| | ||
008 | 241010s2024 gw m||| 00||| eng d | ||
015 | |a 24,N19 |2 dnb | ||
016 | 7 | |a 1328038319 |2 DE-101 | |
020 | |a 9783756013562 |c hardback : EUR 109.00 (DE), EUR 112.10 (AT) |9 978-3-7560-1356-2 | ||
020 | |a 3756013561 |9 3-7560-1356-1 | ||
024 | 3 | |a 9783756013562 | |
035 | |a (OCoLC)1466930724 | ||
035 | |a (DE-599)DNB1328038319 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BW | ||
049 | |a DE-188 |a DE-29 |a DE-11 |a DE-20 | ||
084 | |a PR 2158 |0 (DE-625)139514: |2 rvk | ||
084 | |a PR 2202 |0 (DE-625)139521: |2 rvk | ||
084 | |a PR 2354 |0 (DE-625)139577: |2 rvk | ||
084 | |a PZ 3250 |0 (DE-625)141166: |2 rvk | ||
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
084 | |8 1\p |a 340 |2 23sdnb | ||
100 | 1 | |a Kreuzer, Leonhard |e Verfasser |0 (DE-588)1199626147 |4 aut | |
245 | 1 | 0 | |a The harm prevention rule in cyberspace |b an obligation of due diligence |c Leonhard Kreuzer |
250 | |a 1st edition 2024 | ||
264 | 1 | |a Baden-Baden |b Nomos |c [2024] | |
264 | 4 | |c © 2024 | |
300 | |a 327 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Beiträge zum ausländischen öffentlichen Recht und Völkerrecht |v volume 335 | |
502 | |b Dissertation |c Freie Universität Berlin |d 2022 | ||
650 | 0 | 7 | |a Due Diligence |0 (DE-588)4516677-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Obliegenheit |0 (DE-588)4172321-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationales Recht |0 (DE-588)4027447-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
653 | |a accountability mechanism | ||
653 | |a Cybergefahren | ||
653 | |a Cyberoperationen | ||
653 | |a cyber operations | ||
653 | |a cyber threats | ||
653 | |a Cyberspace | ||
653 | |a cyberspace | ||
653 | |a Due Dilligence | ||
653 | |a due diligence obligations | ||
653 | |a Mindeststandards | ||
653 | |a nicht-staatliche Akteure | ||
653 | |a duty of care | ||
653 | |a Praxisstandards | ||
653 | |a harm prevention rule | ||
653 | |a minimum standards | ||
653 | |a Schadensprävention | ||
653 | |a non-state actors | ||
653 | |a Schadensvermeidung | ||
653 | |a Sorgfaltspflicht | ||
653 | |a standards of practice | ||
653 | |a staatliche Akteure | ||
653 | |a state actors | ||
653 | |a Verantwortungsmechanismus | ||
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Internationales Recht |0 (DE-588)4027447-0 |D s |
689 | 0 | 1 | |a Obliegenheit |0 (DE-588)4172321-1 |D s |
689 | 0 | 2 | |a Due Diligence |0 (DE-588)4516677-8 |D s |
689 | 0 | 3 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 4 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-188 | |
710 | 2 | |a Nomos Verlagsgesellschaft |0 (DE-588)117513-0 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |o 10.5771/9783748918844 |z 978-3-7489-1884-4 |w (DE-604)BV049863342 |
830 | 0 | |a Beiträge zum ausländischen öffentlichen Recht und Völkerrecht |v volume 335 |w (DE-604)BV039949182 |9 335 | |
856 | 4 | 1 | |u https://doi.org/10.5771/9783748918844 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=5a3645175df74e5daa22bd64493f124f&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035239406&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a vlb |d 20240501 |q DE-101 |u https://d-nb.info/provenance/plan#vlb | |
912 | |a ebook | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035239406 |
Datensatz im Suchindex
_version_ | 1817960380230533120 |
---|---|
adam_text |
TABLE
OF
CONTENTS
LIST
OF
ABBREVIATIONS
19
INTRODUCTION
21
CHAPTER
1:
CURRENT
STATE
OF
THE
INTERNATIONAL
LEGAL
DISCOURSE
ON
CYBER
HARM
27
A.
POPULAR
CATEGORIES
OF
MALICIOUS
CYBER
OPERATIONS
27
I.
CYBER
ESPIONAGE
27
II.
CYBER
TERRORISM
29
III.
CYBER
WAR
31
IV.
CYBERATTACK
32
V.
CYBERCRIME
33
VI.
IMPRECISION
OF
CATEGORICAL
TERMS
34
B.
THE
CONCEPT
OF
CYBER
HARM
35
I.
CYBER
HARM
AS
EXPLOITATION
OF
CODE
VULNERABILITY
35
II.
MEANS
OF
CAUSING
CYBER
HARM
35
III.
EXCLUSION:
HUMAN
ERROR,
SOCIAL
ENGINEERING
AND
CONTENT
HARM
37
C.
DIFFERENT
DEGREES
OF
CYBER
HARM
39
I.
INTRUSIVE
ACCESS
OPERATIONS:
LOSS
OF
CONFIDENTIALITY
39
II.
DISRUPTIVE
OPERATIONS:
IMPAIRMENT
OR
LOSS
OF
FUNCTIONALITY
40
III.
DESTRUCTIVE
OPERATIONS:
PHYSICAL
HARM
40
IV.
OTHER
CATEGORIZATION
OF
CYBER
HARM
EFFECTS
41
D.
CURRENT
STATE
OF
THE
INTERNATIONAL
LEGAL
DISCOURSE
41
I.
GRADUAL
RECOGNITION
OF
THE
APPLICABILITY
OF
INTERNATIONAL
LAW
IN
CYBERSPACE
42
II.
STATES
'
PREFERENCE
FOR
STRATEGIC
AMBIGUITY
45
III.
FILLING
THE
VOID:
NON-STATE
ACTOR
PROPOSALS
46
IV.
TURN
TO
PREVENTIVE
APPROACHES
AGAINST
CYBER
SECURITY
RISKS
47
9
CHAPTER
2:THE
HARM
PREVENTION
RULE
IN
INTERNATIONAL
LAW
49
A.
THE
HARM
PREVENTION
RULE
IN
INTERNATIONAL
LAW
49
I.
THE
EVOLUTION
OF
THE
HARM
PREVENTION
RULE
IN
INTERNATIONAL
LAW
49
II.
HOLISTIC
PROTECTION
OF
INTERESTS
OF
OTHER
STATES
52
III.
TERRITORY,
JURISDICTION
OR
CONTROL:
RISK
PROXIMITY
AS
BASIS
OF
ACCOUNTABILITY
53
IV.
KNOWLEDGE
OF
RISK
OF
HARM
REQUIRED
55
V.
THE
DUTY
TO
EXERCISE
DUE
DILIGENCE
TO
PREVENT
AND
MITIGATE
HARM
56
1.
DUE
DILIGENCE
AS
AN
OBLIGATION
OF
CONDUCT
56
2.
THE
PREVENTIVE
AND
REMEDIAL
DIMENSION
OF
DUE
DILIGENCE
58
VI.
THE
NEGATIVE
PROHIBITIVE
DIMENSION
OFTHE
HARM
PREVENTION
RULE
59
B.
THE
HARM
PREVENTION
RULE
AS
THE
MOST
SUITABLE
TERM
FOR
EXPRESSING
THE
DUE
DILIGENCE
RATIONALE
62
C.
THE
DOCTRINAL
STATUS
OF
THE
HARM
PREVENTION
RULE
66
I.
THE
HARM
PREVENTION
RULE
AS
A
CUSTOMARY
RULE
OF
A
GENERAL
CHARACTER
66
II.
THE
HARM
PREVENTION
RULE
AS
A
GENERAL
PRINCIPLE
OF
INTERNATIONAL
LAW
67
D.
THRESHOLD
OF
RECOGNITION
IN
NEW
AREAS
OF
INTERNATIONAL
LAW
69
I.
THE
INDUCTIVE
APPROACH
AND
ITS
LIMITS
70
II.
COMPLEMENTARY
DEDUCTIVE
CONSIDERATIONS
71
III.
THRESHOLD
FOR
DEDUCTIVE
CONSIDERATIONS
73
IV.
ENDORSEMENT
OF
DEDUCTIVE
CONSIDERATIONS
IN
CYBERSPACE
75
V.
RELEVANT
STATE
PRACTICE
AND
OPINIO
IURIS
IN
CYBERSPACE
76
E.
RECOGNITION
OFTHE
HARM
PREVENTION
RULE
IN
CYBERSPACE
BY
INDIVIDUAL
STATES
77
I.
MOMENTUM
TOWARDS
RECOGNITION
OFTHE
RULE
77
II.
CONCERN
AND
PUSHBACK
81
1.
CONCERN
ABOUT
OVER-SECURITIZATION
81
2.
CAPACITY
CONCERNS
82
10
F.
RECOGNITION
OFTHE
RULE
ON
THE
UN
LEVEL
83
I.
ENDORSEMENT
OFTHE
HARM
PREVENTION
RULE
IN
THE
UN
GGE
REPORTS
83
II.
PROBLEMATIC
TERMINOLOGY
OF
THE
UN
GGE
REPORTS
85
1.
HORTATORY
LANGUAGE
OF
THE
UN
GGE
REPORTS
88
2.
PERMISSIVE
ASSERTIONS
OF
FREEDOM
OF
ACTION
90
G.
NEED
FOR
SPECIFICATION
IN
CYBERSPACE
91
CHAPTER
3:
THE
THRESHOLD
FOR
TRIGGERING
DUE
DILIGENCE
OBLIGATIONS
TO
PREVENT
95
A.
GENERAL
CRITERIA
95
I.
RISK
OF
SIGNIFICANT
CYBER
HARM
95
II.
INTEGRATING
ACTS
REACHING
THE
THRESHOLD
OF
PROHIBITIVE
RULES
INTO
THE
RISK
OF
HARM
THRESHOLD
100
III.
INTERPRETATION
OF
RISK
OF
SIGNIFICANT
HARM
IN
CYBERSPACE
102
IV.
NON-PHYSICAL
HARM
AS
RELEVANT
HARM
UNDER
THE
HARM
PREVENTION
RULE
103
V.
CUMULATIVE
HARM
AS
RELEVANT
HARM
UNDER
THE HARM
PREVENTION
RULE
106
VI.
CONTEXT-DEPENDENT
FLEXIBLE
ASSESSMENT
OF
SIGNIFICANT
CYBER
HARM
107
B.
ACTS
REACHING
THE
THRESHOLD
OF
PROHIBITIVE
RULES
107
I.
PROHIBITION
ON
THE
USE
OF
FORCE
108
1.
RECOGNITION
OFTHE
PROHIBITION
ON
THE
USE
OFFORCE
IN
CYBERSPACE
108
2.
ACTS
AMOUNTING
TO
A
USE
OF
FORCE
IN
CYBERSPACE
110
3.
APPLICATION
OFTHE
THRESHOLD
TO
SPECIFIC
CYBER
INCIDENTS
114
4.
THE
EXCEPTIONAL
IMPLICATION
OFTHE
THRESHOLD
OF
PROHIBITED
FORCE
IN
CYBERSPACE
116
II.
PROHIBITION
OF
INTERVENTION
116
1.
RECOGNITION
OFTHE
PROHIBITION
OF
INTERVENTION
IN
CYBERSPACE
116
2.
DOMAINE
RESERVE
118
3.
THE
CHALLENGE
OF
ASSERTING
COERCION
IN
CYBERSPACE
119
3.1
INTERFERENCE
WITH
ELECTIONS
121
3.2
INTERVENTION
IN
THE
FUNDAMENTAL OPERATION
OF
PARLIAMENT
122
11
3.3
CYBER
OPERATIONS
AGAINST
CRITICAL
INFRASTRUCTURE
124
3.4
IMPACTS
ON
THE
STABILITY
OF
THE
FINANCIAL
SYSTEM
125
3.5
HARM
TO
THE
POLITICAL
AND/OR
CULTURAL
SYSTEM
127
3.6
UNDERMINING
THE
TERRITORIAL
STATE
'
S
EXCLUSIVE
RIGHT
TO
ENFORCE
THE
LAW
127
4.
LACK
OF
CLARITY
REGARDING
THE
THRESHOLD
OF
PROHIBITED
INTERVENTION
129
III.
SOVEREIGNTY
129
1.
THE
SUGGESTION
OF
A
SOVEREIGNTY
RULE
IN
CYBERSPACE
129
2.
SOVEREIGNTY
AS
A
FUNDAMENTAL
PRINCIPLE
OF
INTERNATIONAL
LAW
131
3.
'
VIOLATIONS
OF
SOVEREIGNTY
'
IN
INTERNATIONAL
PRACTICE
132
4.
CONCEPTS
OF
SOVEREIGNTY
IN
CYBERSPACE
134
5.
LEGAL
CONTENT
OF
A
PROHIBITIVE
SOVEREIGNTY
RULE
IN
CYBERSPACE
136
5.1
THE
ABSOLUTIST
'
PURE
'
SOVEREIGNTIST
APPROACH
136
5.2
DEGREE
OF
INFRINGEMENT
ON
TERRITORIAL
INTEGRITY
139
5.3
INTERFERENCE
WITH
OR
USURPATION
OF
INHERENTLY
GOVERNMENTAL
FUNCTIONS
141
5.4
EXERCISE
OF
STATE
POWER
143
5.5
LACK
OF
SUFFICIENTLY
CLEAR
CONTENT
OF
A
SOVEREIGNTY
RULE
IN
CYBERSPACE
144
6.
ASSESSING
RISKS
AND
BENEFITS
OF
A
SOVEREIGNTY
RULE
IN
CYBERSPACE
145
C.
SIGNIFICANT
CYBER
HARM
BEYOND
ACTS
REACHING
THE
THRESHOLD
OF
PROHIBITIVE
RULES
147
I.
ECONOMIC
CYBER
HARM
AS
A
CATEGORY
OF
SIGNIFICANT
CYBER
HARM
147
1.
THE
PROBLEM
OF
ECONOMIC
CYBER
HARM
148
2.
INCREASING
CONCERN
ABOUT
ECONOMIC
CYBER
HARM
149
3.
CRITERIA
FOR
ASSESSING
THE
SIGNIFICANCE
OF
ECONOMIC
HARM
150
3.1
VIOLATION
OF
INTELLECTUAL
PROPERTY
RIGHTS
AND
TRADE
SECRETS
150
3.2
FURTHER
CRITERIA
FOR
ASSESSING
THE
GRAVITY
OF
ECONOMIC
HARM
154
4.
ECONOMIC
HARM
AS
AN
EMERGING
CATEGORY
OF
SIGNIFICANT
CYBER
HARM
155
12
II.
CYBER
HARM
TO
CRITICAL
INFRASTRUCTURE
AS
A
CATEGORY
OF
SIGNIFICANT
CYBER
HARM
156
1.
INCREASING
CONCERN
ABOUT
CYBER
OPERATIONS
AGAINST
CRITICAL
INFRASTRUCTURE
157
2.
DIVERGING
DEFINITIONS
OF
CRITICAL
INFRASTRUCTURE
158
III.
INCREASING
CONCERN
ABOUT
HARM
TO
THE
PUBLIC
CORE
OFTHE
INTERNET
161
IV.
CYBER
ESPIONAGE
AS
A
CATEGORY
OF
SIGNIFICANT
CYBER
HARM
164
1.
THE
LEGALITY
OF
ESPIONAGE
IN
INTERNATIONAL
LAW
165
2.
INCREASING
CONCERN
ABOUT
HARM
CAUSED
BY
MASS
SURVEILLANCE
OPERATIONS
166
3.
INCREASING
CONCERN
ABOUT
CYBER
ESPIONAGE
OPERATIONS
AGAINST
GOVERNMENTAL
AND
INTERNATIONAL
INSTITUTIONS
171
V.
EMERGING
LEGAL
YARDSTICKS
FOR
RISKS
OF
SIGNIFICANT
CYBER
HARM
174
CHAPTER
4:
NEGATIVE
AND
POSITIVE
OBLIGATIONS
UNDER
THE
HARM
PREVENTION
RULE
177
A.
THE
NEGATIVE
PROHIBITIVE
DIMENSION
OFTHE
HARM
PREVENTION
RULE
177
I.
RESTRICTIVE
FORMULATION
REGARDING
ATTACKS
ON
CRITICAL
INFRASTRUCTURE
IN
THE
UN
GGE
REPORTS
177
II.
STATES
'
NEGATIVE
OBLIGATIONS
REGARDING
ALL
CATEGORIES
OF
SIGNIFICANT
CYBER
HARM
181
B.
REQUIRED
STANDARD
FOR
DUE
DILIGENCE
UNDER
THE
HARM
PREVENTION
RULE
IN
CYBERSPACE
182
I.
DUE
DILIGENCE
AS
A
CAPACITY-DEPENDENT
BINDING
OBLIGATION
OFCONDUCT
184
II.
DUE
DILIGENCE
VS.
'
SOFT
'
BEST
PRACTICE
STANDARDS
185
III.
SYSTEMATIC
INTERPRETATION
OF
DUE
DILIGENCE
REQUIREMENTS
IN
CYBERSPACE
187
IV.
THE
RELEVANCE
OFTHE
DUTY
TO
PROTECT
UNDER
INTERNATIONAL
HUMAN
RIGHTSLAW
188
V.
CATEGORIES
OF
DUE
DILIGENCE
MEASURES
193
C.
PROCEDURAL
DUE
DILIGENCE
MEASURES
194
I.
DUTY
TO
COOPERATE
194
1.
COOPERATION
IN
INTERNATIONAL
LAW
195
2.
COOPERATION
AND
DUE
DILIGENCE
196
13
3.
COOPERATION
IN
CYBERSPACE
198
4.
FOCUS
ON
SPECIFIC
COOPERATIVE
DUTIES
PREFERABLE
200
II.
DUTY
TO
TAKE
ACTION
AGAINST
ONGOING
OR
IMMINENT
HARMFUL
OPERATIONS
201
1.
DUTY
TO
TAKE
ACTION
AND
DUE
DILIGENCE
201
2.
DUTY
TO
TAKE
ACTION
IN
CYBERSPACE
202
3.
KNOWLEDGE
204
4.
REQUIRED MEASURES
205
5.
WIDESPREAD
SUPPORT
OF
A
DUE
DILIGENCE
OBLIGATION
TO
TAKE
ACTION
IN
CYBERSPACE
208
III.
DUTY
TO
NOTIFY
208
1.
DUTY
TO
NOTIFY
IN
INTERNATIONAL
LAW
AND
WITH
REGARD
TO
DUEDILIGENCE
208
2.
DUTY
TO
NOTIFY
IN
CYBERSPACE
210
3.
RELUCTANCE
OF
STATES
TO
COMMIT
TO
A
DUTY
TO
NOTIFY
IN
CYBERSPACE
211
4.
NASCENT
EMERGENCE
OFA
DUE
DILIGENCE
OBLIGATION
TO
NOTIFY
IN
CYBERSPACE
213
IV.
DUTY
TO
COOPERATE
ON
THE
PROSECUTION
OF
CYBERCRIME
214
1.
PROHIBITION
OF
EXTRATERRITORIAL
LAW
ENFORCEMENT
AS
A
CHALLENGE
FOR
CYBERCRIME
PROSECUTION
215
2.
COOPERATION
IN
LEGAL
INSTRUMENTS
ON
CYBERCRIME:
DISCUSSIONS
ON
THE
UN
LEVEL
216
3.
COOPERATION
REQUIREMENTS
IN
CYBERCRIME
TREATIES
217
4.
TRACING
INTERNATIONAL
LEGAL
STANDARDS
FOR
CYBERCRIME
COOPERATION
219
4.1
FORMAL
COOPERATION:
MUTUAL
LEGAL
ASSISTANCE
219
4.2
PRINCIPLES
AND
LIMITS
OF
MUTUAL
LEGAL
ASSISTANCE
220
4.3
INFORMAL
COOPERATION
222
5.
THE
CHALLENGE
OF
ASSESSING
CYBERCRIME
COOPERATION
STANDARDS
BEYOND
A
MINIMUM
STANDARD
222
V.
RISK
MITIGATION
MEASURES
REGARDING
ICT
VULNERABILITIES
223
1.
DEFINITION
OFICT
VULNERABILITIES
224
2.
EXPLOITATION
OFICT
VULNERABILITIES
BY
INTELLIGENCE
AND
LAW
ENFORCEMENT
225
3.
VULNERABILITY
DISCLOSURE
AS
A
DUE
DILIGENCE
REQUIREMENT
226
3.1
REPORTING
OF
ICT
VULNERABILITIES
227
3.2
INFORMATION
ON
REMEDIES
230
14
4.
LINKS
OF
STATE
EXPLOITATION
TO
ATTACKS
ON
THE
INTEGRITY
OF
THE
SUPPLY
CHAIN
231
5.
THE
PROTECTION
OFTHE
INTEGRITY
OFTHE
SUPPLY
CHAIN
IN
THE
UN
GGE
REPORT
2015
232
6.
EMERGENCE
OFBEST
PRACTICE
STANDARDS
REGARDING ICT
VULNERABILITY
DISCLOSURE
233
VI.
SUMMARY
ON
PROCEDURAL
DUE
DILIGENCE
OBLIGATIONS
234
D.
DUE
DILIGENCE
MEASURES
REGARDING
A
STATE
'
S
INSTITUTIONAL
CAPACITY
235
I.
CYBERCRIME
LEGISLATION
AND
PROSECUTION
235
1.
CRIMINAL
LEGISLATION
AND
PROSECUTION
AS
DUE
DILIGENCE
REQUIREMENTS
236
2.
CRIMINAL
LEGISLATION
AND
PROSECUTION
UNDER
INTERNATIONAL
HUMAN
RIGHTSLAW
237
3.
ASSESSING
INTERNATIONAL
STANDARD
ON
CYBERCRIME
LEGISLATION
AND
PROSECUTION
239
3.1
CRIMINALIZATION
REQUIREMENTS
UNDER
CYBERCRIME
TREATIES
240
3.2
CONVERGENCE
ON
AN
INTERNATIONAL
MINIMUM
STANDARD
246
4.
CRIMINAL
PROCEDURAL
LAW
AS
A
DUE
DILIGENCE
REQUIREMENT
246
4.1
STANDARD
PROCEDURAL
MEASURES
247
4.2
DIVERGENCES
REGARDING
HUMAN
RIGHTS
SAFEGUARDS
248
4.3
DIVERGING
CAPACITIES
250
4.4
THE
GRADUAL
EMERGENCE
OF
AN
INTERNATIONAL
MINIMUM
STANDARD
AND
ASSOCIATED
RISKS
251
II.
LEVEL
OF
ACTUAL
OR
CONSTRUCTIVE
KNOWLEDGE
UNDER
THE
HARM
PREVENTION
RULE
252
1.
NO
REBUTTABLE
PRESUMPTION
OFKNOWLEDGE
252
2.
DUTY
TO
HAVE
KNOWN
UNDER
THE
HARM
PREVENTION
RULE
253
3.
CONTENT
OF
A
DUTY
TO
HAVE
KNOWN
IN
CYBERSPACE
255
4.
PRACTICAL
IMPLICATIONS
257
III.
CRITICAL
INFRASTRUCTURE
PROTECTION
259
1.
DUTY
TO
PROTECT
OWN
CRITICAL
INFRASTRUCTURE
AGAINST
CYBER
HARM
259
1.1
SPILL-OVER
EFFECTS
OF
CYBER
HARM
TO
CRITICAL
INFRASTRUCTURE
259
1.2
DUTY
TO
PROTECT
CRITICAL
INFRASTRUCTURE
UNDER
HUMAN
RIGHTSLAW
261
15
1.3
BEST
PRACTICE
STANDARDS
FOR
PROTECTING
CRITICAL
INFRASTRUCTURE
262
1.3.1
ENSURING
IT
SECURITY
STANDARDS
263
1.3.2
CRIMINAL
LEGISLATION
264
1.3.3
INTER-STATE
AND
PUBLIC-PRIVATE
COOPERATION
264
1.4
NON-BINDING
BEST
PRACTICE
STANDARDS
265
2.
DUTY
TO
PREVENT
CYBER
HARM
TO
THE
CRITICAL
INFRASTRUCTURE
OF
OTHER
STATES
266
IV.
THE
ESTABLISHMENT
OF
COMPUTER
EMERGENCY
RESPONSE
TEAMS
AND
POINTS
OF
CONTACT
FOR
INTERNATIONAL COOPERATION
267
1.
DIVERGENT
UNDERSTANDINGS
OF
EMERGENCY
RESPONSE
TEAMS
AND POINTS
OF
CONTACT
267
2.
ESTABLISHMENT
OF
CERTS
AND
POINTS
OF
CONTACT
AS
A
DUE
DILIGENCE
REQUIREMENT
268
3.
ESTABLISHMENT
OF
CERTS
AND
POINTS
OF
CONTACT
UNDER
BINDING
AND
NON-BINDING
NORMS
270
V.
EVOLVING
DUE
DILIGENCE
STANDARD
REGARDING
INSTITUTIONAL
CAPACITY
272
CHAPTER
5:
ENFORCEMENT
OF
THE
HARM
PREVENTION
RULE
275
A.
LEGAL
CONSEQUENCES
OF
NEGLIGENCE
275
I.
HARM
NOT
A
CONSTITUENT
ELEMENT
OF
AN
INTERNATIONALLY
WRONGFULACT
277
II.
COMPLEMENTARY
APPLICABILITY
OFTHE
PREVENTION
RULES
AND
THE
RULES
ON
STATE
RESPONSIBILITY
280
B.
THE
CONTENT
OF
STATE
RESPONSIBILITY
FOLLOWING
NEGLIGENCE
282
I.
COMPENSATION
AND
REPARATION
IN
CASES
OF
CYBER
HARM
282
II.
CESSATION
286
C.
COUNTERMEASURES
AGAINST
NEGLIGENCE
287
I.
PURPOSE
AND
PROPORTIONALITY
REQUIREMENTS
288
II.
NOTIFICATION
REQUIREMENT
290
III.
COUNTERMEASURES
AGAINST
STATES
291
IV.
THE
PROBLEM
OF
COLLECTIVE
COUNTERMEASURES
292
V.
THE
LIMITED
ROLE
OF
COUNTERMEASURES
FOR
THE
ENFORCEMENT
OF
THE
HARM
PREVENTION
RULE
294
16
CHAPTER
6:
GENERAL
CONCLUSIONS
297
A.
THE
POTENTIAL
OF
THE
HARM
PREVENTION
RULE
IN
CYBERSPACE
297
B.
CENTRAL
FINDINGS
301
BIBLIOGRAPHY
307
TABLE
OFCASES
325
17 |
any_adam_object | 1 |
author | Kreuzer, Leonhard |
author_GND | (DE-588)1199626147 |
author_facet | Kreuzer, Leonhard |
author_role | aut |
author_sort | Kreuzer, Leonhard |
author_variant | l k lk |
building | Verbundindex |
bvnumber | BV049900431 |
classification_rvk | PR 2158 PR 2202 PR 2354 PZ 3250 PZ 3700 |
collection | ebook |
ctrlnum | (OCoLC)1466930724 (DE-599)DNB1328038319 |
discipline | Rechtswissenschaft |
doi_str_mv | 10.5771/9783748918844 |
edition | 1st edition 2024 |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV049900431</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241209</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241010s2024 gw m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">24,N19</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1328038319</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783756013562</subfield><subfield code="c">hardback : EUR 109.00 (DE), EUR 112.10 (AT)</subfield><subfield code="9">978-3-7560-1356-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3756013561</subfield><subfield code="9">3-7560-1356-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783756013562</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1466930724</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1328038319</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PR 2158</subfield><subfield code="0">(DE-625)139514:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PR 2202</subfield><subfield code="0">(DE-625)139521:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PR 2354</subfield><subfield code="0">(DE-625)139577:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3250</subfield><subfield code="0">(DE-625)141166:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">340</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kreuzer, Leonhard</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1199626147</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The harm prevention rule in cyberspace</subfield><subfield code="b">an obligation of due diligence</subfield><subfield code="c">Leonhard Kreuzer</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Baden-Baden</subfield><subfield code="b">Nomos</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">327 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Beiträge zum ausländischen öffentlichen Recht und Völkerrecht</subfield><subfield code="v">volume 335</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Freie Universität Berlin</subfield><subfield code="d">2022</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Due Diligence</subfield><subfield code="0">(DE-588)4516677-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Obliegenheit</subfield><subfield code="0">(DE-588)4172321-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationales Recht</subfield><subfield code="0">(DE-588)4027447-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">accountability mechanism</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybergefahren</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberoperationen</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber operations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber threats</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyberspace</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyberspace</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Due Dilligence</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">due diligence obligations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mindeststandards</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">nicht-staatliche Akteure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">duty of care</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Praxisstandards</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">harm prevention rule</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">minimum standards</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Schadensprävention</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">non-state actors</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Schadensvermeidung</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sorgfaltspflicht</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">standards of practice</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">staatliche Akteure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">state actors</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Verantwortungsmechanismus</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internationales Recht</subfield><subfield code="0">(DE-588)4027447-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Obliegenheit</subfield><subfield code="0">(DE-588)4172321-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Due Diligence</subfield><subfield code="0">(DE-588)4516677-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Nomos Verlagsgesellschaft</subfield><subfield code="0">(DE-588)117513-0</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="o">10.5771/9783748918844</subfield><subfield code="z">978-3-7489-1884-4</subfield><subfield code="w">(DE-604)BV049863342</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Beiträge zum ausländischen öffentlichen Recht und Völkerrecht</subfield><subfield code="v">volume 335</subfield><subfield code="w">(DE-604)BV039949182</subfield><subfield code="9">335</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.5771/9783748918844</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=5a3645175df74e5daa22bd64493f124f&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035239406&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">vlb</subfield><subfield code="d">20240501</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#vlb</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035239406</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV049900431 |
illustrated | Not Illustrated |
indexdate | 2024-12-09T11:02:02Z |
institution | BVB |
institution_GND | (DE-588)117513-0 |
isbn | 9783756013562 3756013561 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035239406 |
oclc_num | 1466930724 |
open_access_boolean | 1 |
owner | DE-188 DE-29 DE-11 DE-20 |
owner_facet | DE-188 DE-29 DE-11 DE-20 |
physical | 327 Seiten |
psigel | ebook |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Nomos |
record_format | marc |
series | Beiträge zum ausländischen öffentlichen Recht und Völkerrecht |
series2 | Beiträge zum ausländischen öffentlichen Recht und Völkerrecht |
spelling | Kreuzer, Leonhard Verfasser (DE-588)1199626147 aut The harm prevention rule in cyberspace an obligation of due diligence Leonhard Kreuzer 1st edition 2024 Baden-Baden Nomos [2024] © 2024 327 Seiten txt rdacontent n rdamedia nc rdacarrier Beiträge zum ausländischen öffentlichen Recht und Völkerrecht volume 335 Dissertation Freie Universität Berlin 2022 Due Diligence (DE-588)4516677-8 gnd rswk-swf Obliegenheit (DE-588)4172321-1 gnd rswk-swf Internationales Recht (DE-588)4027447-0 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf accountability mechanism Cybergefahren Cyberoperationen cyber operations cyber threats Cyberspace cyberspace Due Dilligence due diligence obligations Mindeststandards nicht-staatliche Akteure duty of care Praxisstandards harm prevention rule minimum standards Schadensprävention non-state actors Schadensvermeidung Sorgfaltspflicht standards of practice staatliche Akteure state actors Verantwortungsmechanismus (DE-588)4113937-9 Hochschulschrift gnd-content Internationales Recht (DE-588)4027447-0 s Obliegenheit (DE-588)4172321-1 s Due Diligence (DE-588)4516677-8 s Cyberspace (DE-588)4266146-8 s Computerkriminalität (DE-588)4010452-7 s DE-188 Nomos Verlagsgesellschaft (DE-588)117513-0 pbl Erscheint auch als Online-Ausgabe, PDF 10.5771/9783748918844 978-3-7489-1884-4 (DE-604)BV049863342 Beiträge zum ausländischen öffentlichen Recht und Völkerrecht volume 335 (DE-604)BV039949182 335 https://doi.org/10.5771/9783748918844 Verlag kostenfrei Volltext X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=5a3645175df74e5daa22bd64493f124f&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035239406&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p vlb 20240501 DE-101 https://d-nb.info/provenance/plan#vlb |
spellingShingle | Kreuzer, Leonhard The harm prevention rule in cyberspace an obligation of due diligence Beiträge zum ausländischen öffentlichen Recht und Völkerrecht Due Diligence (DE-588)4516677-8 gnd Obliegenheit (DE-588)4172321-1 gnd Internationales Recht (DE-588)4027447-0 gnd Computerkriminalität (DE-588)4010452-7 gnd Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4516677-8 (DE-588)4172321-1 (DE-588)4027447-0 (DE-588)4010452-7 (DE-588)4266146-8 (DE-588)4113937-9 |
title | The harm prevention rule in cyberspace an obligation of due diligence |
title_auth | The harm prevention rule in cyberspace an obligation of due diligence |
title_exact_search | The harm prevention rule in cyberspace an obligation of due diligence |
title_full | The harm prevention rule in cyberspace an obligation of due diligence Leonhard Kreuzer |
title_fullStr | The harm prevention rule in cyberspace an obligation of due diligence Leonhard Kreuzer |
title_full_unstemmed | The harm prevention rule in cyberspace an obligation of due diligence Leonhard Kreuzer |
title_short | The harm prevention rule in cyberspace |
title_sort | the harm prevention rule in cyberspace an obligation of due diligence |
title_sub | an obligation of due diligence |
topic | Due Diligence (DE-588)4516677-8 gnd Obliegenheit (DE-588)4172321-1 gnd Internationales Recht (DE-588)4027447-0 gnd Computerkriminalität (DE-588)4010452-7 gnd Cyberspace (DE-588)4266146-8 gnd |
topic_facet | Due Diligence Obliegenheit Internationales Recht Computerkriminalität Cyberspace Hochschulschrift |
url | https://doi.org/10.5771/9783748918844 http://deposit.dnb.de/cgi-bin/dokserv?id=5a3645175df74e5daa22bd64493f124f&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035239406&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV039949182 |
work_keys_str_mv | AT kreuzerleonhard theharmpreventionruleincyberspaceanobligationofduediligence AT nomosverlagsgesellschaft theharmpreventionruleincyberspaceanobligationofduediligence |