top of page
RECENT PUBLICATIONS
Search
![](https://static.wixstatic.com/media/8700b0_e8112961e43d4500bec3d462838549ac~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/8700b0_e8112961e43d4500bec3d462838549ac~mv2.webp)
![Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target Under I](https://static.wixstatic.com/media/8700b0_e8112961e43d4500bec3d462838549ac~mv2.jpg/v1/fill/w_511,h_300,fp_0.50_0.50,q_90,enc_auto/8700b0_e8112961e43d4500bec3d462838549ac~mv2.webp)
Mar 17, 2014
Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target Under I
Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics holds that if the effects or consequences...
Jul 6, 2012
Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction
Cyberterrorism has become one of the most significant threats to the national and international security of the modern state, and...
bottom of page