Constructing norms for global cybersecurity

M Finnemore, DB Hollis - American Journal of International Law, 2016 - cambridge.org
On February 16, 2016, a US court ordered Apple to circumvent the security features of an
iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple …

Against sovereignty in cyberspace

ML Mueller - International studies review, 2020 - academic.oup.com
In discussing the historical origins of sovereignty, Jens Bartelson (2018, 510) wrote,“Making
sense of sovereignty... entails making sense of its component terms—supreme authority and …

[图书][B] Is international law international?

A Roberts - 2017 - books.google.com
This book takes the reader on a sweeping tour of the international legal field to reveal some
of the patterns of difference, dominance, and disruption that belie international law's claim to …

The new market manipulation

TCW Lin - Emory LJ, 2016 - HeinOnline
Markets face a new and daunting mode ofmanipulation. With this new mode ofmarket
manipulation, millions of dollars can vanish in seconds, rogue actors can halt the trading of …

Amazon and Alibaba: Internet Governance, Business Models, and Internationalization Strategies

X Wu, G Gereffi - International business in the information and digital …, 2018 - emerald.com
In the digital economy, what are the strategies of multinationals from developed countries
and emerging markets? How do regulations in the home country affect their growth? Recent …

Artificial intelligence, finance, and the law

TCW Lin - Fordham L. Rev., 2019 - HeinOnline
Artificial intelligence is an existential component of modernfinance. The progress and
promise realized and presented by artificial intelligence in finance has been thus far …

Public-private cybersecurity

KE Eichensehr - Tex. L. Rev., 2016 - HeinOnline
Articles Public-Private Cybersecurity Page 1 Articles Public-Private Cybersecurity Kristen E.
Eichensehr* Calls for public-private partnerships to address US cybersecurity failures have …

Searching places unknown: Law enforcement jurisdiction on the dark web

A Ghappour - Stan. L. Rev., 2017 - HeinOnline
The use of hacking tools by law enforcement to pursue criminal suspects who have
anonymized their communications on the dark web presents a looming flashpoint between …

Grid Reliability Through Clean Energy

A Klass, J Macey, S Welton, H Wiseman - Stan. L. Rev., 2022 - HeinOnline
In the wake of recent high-profile power failures, policymakers and politicians have asserted
that there is an inherent tension between the aims of clean energy and grid reliability. But …

Litigating data sovereignty

AK Woods - The Yale Law Journal, 2018 - JSTOR
Because the internet is so thoroughly global, nearly every aspect of internet governance has
an extraterritorial effect. This is evident in a number of high-profile cases that cover a wide …