{"title":"Cyber Espionage and the Doctrines of Self-Defence and Necessity","authors":"","doi":"10.5040/9781782257370.ch-008","DOIUrl":"https://doi.org/10.5040/9781782257370.ch-008","url":null,"abstract":"","PeriodicalId":192652,"journal":{"name":"Cyber Espionage and International Law","volume":"14 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Espionage and the Rules of Territorial Sovereignty, Non-Intervention and the Non-Use of Force","authors":"","doi":"10.5040/9781782257370.ch-003","DOIUrl":"https://doi.org/10.5040/9781782257370.ch-003","url":null,"abstract":"","PeriodicalId":192652,"journal":{"name":"Cyber Espionage and International Law","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining Cyber Espionage","authors":"","doi":"10.5040/9781782257370.ch-001","DOIUrl":"https://doi.org/10.5040/9781782257370.ch-001","url":null,"abstract":"","PeriodicalId":192652,"journal":{"name":"Cyber Espionage and International Law","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Economic Cyber Espionage and the World Trade Organization","authors":"","doi":"10.5040/9781782257370.ch-006","DOIUrl":"https://doi.org/10.5040/9781782257370.ch-006","url":null,"abstract":"","PeriodicalId":192652,"journal":{"name":"Cyber Espionage and International Law","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117249731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conclusion","authors":"","doi":"10.5040/9781782257370.0007","DOIUrl":"https://doi.org/10.5040/9781782257370.0007","url":null,"abstract":"","PeriodicalId":192652,"journal":{"name":"Cyber Espionage and International Law","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Espionage and Diplomatic and Consular Law","authors":"","doi":"10.5040/9781782257370.ch-004","DOIUrl":"https://doi.org/10.5040/9781782257370.ch-004","url":null,"abstract":"","PeriodicalId":192652,"journal":{"name":"Cyber Espionage and International Law","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Espionage and International Human Rights Law","authors":"","doi":"10.5040/9781782257370.ch-005","DOIUrl":"https://doi.org/10.5040/9781782257370.ch-005","url":null,"abstract":"","PeriodicalId":192652,"journal":{"name":"Cyber Espionage and International Law","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116868715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}