Constructing norms for global cybersecurity
M Finnemore, DB Hollis - American Journal of International Law, 2016 - cambridge.org
On February 16, 2016, a US court ordered Apple to circumvent the security features of an
iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple …
iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple …
Against sovereignty in cyberspace
ML Mueller - International studies review, 2020 - academic.oup.com
In discussing the historical origins of sovereignty, Jens Bartelson (2018, 510) wrote,“Making
sense of sovereignty... entails making sense of its component terms—supreme authority and …
sense of sovereignty... entails making sense of its component terms—supreme authority and …
[图书][B] Is international law international?
A Roberts - 2017 - books.google.com
This book takes the reader on a sweeping tour of the international legal field to reveal some
of the patterns of difference, dominance, and disruption that belie international law's claim to …
of the patterns of difference, dominance, and disruption that belie international law's claim to …
The new market manipulation
TCW Lin - Emory LJ, 2016 - HeinOnline
Markets face a new and daunting mode ofmanipulation. With this new mode ofmarket
manipulation, millions of dollars can vanish in seconds, rogue actors can halt the trading of …
manipulation, millions of dollars can vanish in seconds, rogue actors can halt the trading of …
Amazon and Alibaba: Internet Governance, Business Models, and Internationalization Strategies
X Wu, G Gereffi - International business in the information and digital …, 2018 - emerald.com
In the digital economy, what are the strategies of multinationals from developed countries
and emerging markets? How do regulations in the home country affect their growth? Recent …
and emerging markets? How do regulations in the home country affect their growth? Recent …
Artificial intelligence, finance, and the law
TCW Lin - Fordham L. Rev., 2019 - HeinOnline
Artificial intelligence is an existential component of modernfinance. The progress and
promise realized and presented by artificial intelligence in finance has been thus far …
promise realized and presented by artificial intelligence in finance has been thus far …
Public-private cybersecurity
KE Eichensehr - Tex. L. Rev., 2016 - HeinOnline
Articles Public-Private Cybersecurity Page 1 Articles Public-Private Cybersecurity Kristen E.
Eichensehr* Calls for public-private partnerships to address US cybersecurity failures have …
Eichensehr* Calls for public-private partnerships to address US cybersecurity failures have …
Searching places unknown: Law enforcement jurisdiction on the dark web
A Ghappour - Stan. L. Rev., 2017 - HeinOnline
The use of hacking tools by law enforcement to pursue criminal suspects who have
anonymized their communications on the dark web presents a looming flashpoint between …
anonymized their communications on the dark web presents a looming flashpoint between …
Grid Reliability Through Clean Energy
In the wake of recent high-profile power failures, policymakers and politicians have asserted
that there is an inherent tension between the aims of clean energy and grid reliability. But …
that there is an inherent tension between the aims of clean energy and grid reliability. But …
Litigating data sovereignty
AK Woods - The Yale Law Journal, 2018 - JSTOR
Because the internet is so thoroughly global, nearly every aspect of internet governance has
an extraterritorial effect. This is evident in a number of high-profile cases that cover a wide …
an extraterritorial effect. This is evident in a number of high-profile cases that cover a wide …