Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution (eBook)


ISBN13: 9781108846226
Published: April 2020
Publisher: Cambridge University Press
Country of Publication: UK
Format: eBook (ePub)
Price: £100.00
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in
Korea, [North] Democratic Peoples Republic Of

Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.30am to 5.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

In stock.
Need help with ebook formats?




Also available as

Addressing both scholars of international law and political science as well as decision makers involved in cybersecurity policy, the book tackles the most important and intricate legal issues that a State faces when considering a reaction to a malicious cyber operation conducted by an adversarial State. While often invoked in political debates and widely analysed in international legal scholarship, self-defence and countermeasures will often remain unavailable to states in situations of cyber emergency due to the pervasive problem of reliable and timely attribution of cyber operations to State actors. Analysing the legal questions surrounding attribution in detail, the book presents the necessity defence as an evidently available alternative. However, the shortcomings of the doctrine as based in customary international law that render it problematic as a remedy for states are examined in-depth. In light of this, the book concludes by outlining a special emergency regime for cyberspace.

  • Addresses the attribution problem in cyberspace from a legal perspective with a comprehensive, novel scope. This study closes a gap for both legal and political science scholarship, as well as policymakers, enabling them to make sense of the attribution problem
  • Focuses on unilateral remedies to cyber operations in order to tackle the legal questions most pressing for States
  • Instead of abstract analysis, the book bases its examination on real-world examples and concludes with a concrete proposal for future regulation of State conduct in cyberspace, providing useful insights for both academic and political spheres

Subjects:
Public International Law, eBooks, IT, Internet and Artificial Intelligence Law
Contents:
Part I. Cybersecurity Incidents and International Law:
1. The spectre of cyberwar
2. Terminology
3. International legal framework
Part II. Unilateral Remedies to Cybersecurity Incidents:
4. Self-defence
5. Countermeasures
6. Necessity
Part III. Outlines of an Emergency Regime for Cyberspace:
7. Transnational cybersecurity, unilateral remedies, and the rule of law
8. 'Such incidents might recur at any time': the intervention convention
9. Possible elements of the cyber emergency regime
10. Concluding remarks
Bibliography
Index