000 03709nam a2200601Ii 4500
001 9781351106016
003 FlBoTFG
005 20240213122834.0
006 m o d
007 cr
008 181112t20182019fluab ob 001 0 eng d
020 _a9781351106016
_q(e-book : PDF)
035 _a(OCLC)1053623221
040 _aFlBoTFG
_cFlBoTFG
_erda
041 1 _aeng
072 7 _aLAW
_x051000
_2bisacsh
072 7 _aLAW
_x104000
_2bisacsh
072 7 _aLAW
_x026000
_2bisacsh
072 7 _aLB
_2bicscc
100 1 _aPehlivan, Oğuz Kaan,
_eauthor.
245 1 0 _aConfronting Cyberespionage Under International Law /
_cby Oğuz Kaan Pehlivan.
250 _aFirst edition.
264 1 _aBoca Raton, FL :
_bRoutledge,
_c[2018].
264 4 _c©2019.
300 _a1 online resource (146 pages) :
_b7 illustrations, text file, PDF.
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
490 1 _aRoutledge Research in International Law
504 _aIncludes bibliographical references and index.
505 0 0 _tIntroduction --
_t1.--Cyberspace, Espionage and Cyberespionage --
_t2. Legal Responses to Economic and Industrial Espionage --
_t
520 3 _aWe have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage.Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
530 _aAlso available in print format.
650 7 _aLAW / Computer & Internet.
_2bisacsh
650 7 _aLAW / Criminal Law / General.
_2bisacsh
650 7 _aCommercial Secrets.
_2bisacsh
650 7 _aCyberespionage.
_2bisacsh
650 7 _aCybersecurity.
_2bisacsh
650 7 _aCyber Crimes.
_2bisacsh
650 7 _aEconomic Espionage.
_2bisacsh
650 7 _aEspionage.
_2bisacsh
650 7 _aIndustrial Espionage.
_2bisacsh
650 7 _aInternational Law.
_2bisacsh
650 7 _aInternational Treaty Law.
_2bisacsh
650 7 _aPeacetime Espionage.
_2bisacsh
650 7 _aRegulation.
_2bisacsh
650 7 _aWartime Espionage.
_2bisacsh
655 0 _aElectronic books.
710 2 _aTaylor and Francis.
776 0 8 _iPrint version:
_z9781138476424
830 0 _aRoutledge Research in International Law.
856 4 0 _uhttps://www.taylorfrancis.com/books/9781351106016
_zClick here to view.
999 _c6372
_d6372