1. bookVolumen 17 (2021): Edición 4 (December 2021)
Detalles de la revista
License
Formato
Revista
eISSN
1801-3422
Primera edición
16 Apr 2015
Calendario de la edición
2 veces al año
Idiomas
Inglés
Acceso abierto

Economic Cyber-Espionage in the Visegrád Four Countries: a Hungarian Perspective

Publicado en línea: 30 Dec 2021
Volumen & Edición: Volumen 17 (2021) - Edición 4 (December 2021)
Páginas: 697 - 721
Detalles de la revista
License
Formato
Revista
eISSN
1801-3422
Primera edición
16 Apr 2015
Calendario de la edición
2 veces al año
Idiomas
Inglés

Abott, Rich (2015): U.K. Agrees With China Not To Support Cyber Theft Of Intellectual Property, Defense Daily (29 October): available at https://www.defensedaily.com/u-k-agrees-with-china--not-to-support-cyber-theft-of-intellectual-property-2/uncategorized/(31 May 2021). Search in Google Scholar

Bergenas, Johan (2008): The role of regional and sub-regional organizations in implementing UN Security Council Resolution 1540: a preliminary assessment of the African continent: available at http://www.vertic.org/media/assets/nim_docs/background%20articles/UNIDIR%20Scheinman%201540%20pdf2-act341.pdf (31 May 2021). Search in Google Scholar

Buchan, Russell (2018): Cyber Espionage and International Law, Hart Publishing. Search in Google Scholar

Cabada Ladislav (2018): Visegrad Group in the Context of Other Central European Cooperation Formats. Politics in Central Europe, Vol. 13, No. 2, 165–179. Search in Google Scholar

Cowan, Paris (2017): Australia, China agree to oppose cyber IP theft, IT News (24 April): avail-ableathttps://www.itnews.com.au/news/australia-china-ink-agreement-to-stop-industrial--hacking-459387#:~ (31 May 2021). Search in Google Scholar

Crawford, James (1997): Universalism and regionalism from the perspective of the work of the International Law Commission, in United Nations, ed., International Law on the Eve of the Twenty-fist Century. Views from the International Law Commission, 99–122, United Nations. Search in Google Scholar

Eder, Marton (2021): Hungary says vaccine registration website under cyber attack, Bloomberg Blog (19 February): available at https://www.bloomberg.com/news/articles/2021-02-19/hungary-says-vaccine-registration-website-under-cyber-attack (31May2021). Search in Google Scholar

European Union Intellectual Property Office (2018): The baseline of trade secrets litigation in the EU member states, EUIPO: available at https://euipo.europa.eu/tunnel-web/secure/webdav/guest/document_library/observatory/documents/reports/2018_Baseline_of_Trade_Secrets_Litigations_in_EU_Member_States/2018_Baseline_of_Trade_Secrets_Litigations_in_EU_Member_States_EN.pdf (31 May 2021.) Search in Google Scholar

Fidler, David P. (2020a): Cybersecurity in the Time of COVID-19, Council on Foreign Relations Blog (30 March): available at https://www.cfr.org/blog/cybersecurity-time-covid-19 (31 May 2021). Search in Google Scholar

Fidler, David P. (2020b): 2020 in Review: The COVID-19 Pandemic and Cyberspace, Council on Foreign Relations Blog (14 December): available at https://www.cfr.org/blog/2020-review--covid-19-pandemic-and-cyberspace (31 May 2021). Search in Google Scholar

Garcia-Mora, Manuel R, (1964: Treason, Sedition and Espionage as Political Offenses Under the Law of Extradition, U. PITT.L. REV. 26 (65): 79–80. Search in Google Scholar

Gebhard, Carmen (2013): Sub-Regional cooperation in Central Europe – past, present and future, AARMS 12 (1): 25–38.10.32565/aarms.2013.1.3 Search in Google Scholar

Górka, Marek (2018): The Cybersecurity Strategy of the Visegrad Group Countries, Politics in Central Europe 14 (2): 75–98.10.2478/pce-2018-0010 Search in Google Scholar

Hua, Jian (2015): Industrial Cyber Espionage, Journal of Management Systems 25 (3): 67–81 Search in Google Scholar

Jančárková, Taťána – Minárik, Tomáš (2019): Scenario 09: Economic cyber espionage, Cyber Law Toolkit: available at https://cyberlaw.ccdcoe.org/wiki/Scenario_09:_Economic_cyber_espionage (31 May 2021). Search in Google Scholar

Joubert, Vincent (2010): Getting the essence of cyberspace: a theoretical framework to face cyber issues, in Czosseck – Podins, eds, Conference on Cyber Conflict. Proceedings 2010, 111–124, CCD COE Publications. Search in Google Scholar

Kaan Pehlivan, Oğuz (2019): Confronting Cyberespionage Under International Law, Routledge.10.4324/9781351106016 Search in Google Scholar

Kenety, Brian (2020): ČSÚ: nearly 1 in 5 Czech companies faced cyberattack in 2018, Radio Prague International (13 January): available at https://www.radio.cz/en/section/business/csu-nearly-1-in-5-czech-companies-faced-cyberattack-in-2018 (3September2021). Search in Google Scholar

Kolbasuk McGee, Marianne (2018): U.S., China Reach Cyber Agreement, Bank Info Security (25 September): available at https://www.bankinfosecurity.com/us-china-a-8553 (31 May 2021). Search in Google Scholar

Legal Week Intelligence – CMS (2018): The Cybersecurity Challenge in Central and Eastern Europe. Are multinational companies prepared?, CMS Publication: available at https://cms.law/en/hun/publication/the-cybersecurity-challenge-in-central-and-eastern-europe(31May2021). Search in Google Scholar

Lennon, Mike (2013): TeamSpy – A Decade-long Cyber Espionage Operation Targeting Eastern Europe, Security Week (20 March): available at https://www.securityweek.com/teamspy--decade-long-cyber-espionage-operation-targeting-eastern-europe(31May2021). Search in Google Scholar

Lotrionte, Catherine (2015): Countering State-Sponsored Cyber Economic Espionage Under International Law, North Carolina Journal of International Law and Commercial Regulation 40: 443–541. Search in Google Scholar

Magen, Sharon (2017): Cybersecurity and Economic Espionage: The Case of Chinese Investments in the Middle East, Cyber, Intelligence, and Security 1 (3): 3–18. Search in Google Scholar

Nasheri, Hedieh (2003): The Intersection of Technology Crimes and Cyberspace in Europe: The Case of Hungary, Information & Communications Technology Law 12 (1): 25–48.10.1080/1360083032000052241 Search in Google Scholar

Panyi, Szabolcs (2021a): How Orbán’s Eastern Opening brought Chinese spy games to Budapest, Direkt36 (14 March): available at https://www.direkt36.hu/en/kemjatszmakat-hozott--budapestre-orban-kinai-nyitasa/ (31May2021). Search in Google Scholar

Panyi, Szabolcs (2021b): Hungary could turn into China’s trojan horse in Europe, Reporting Democracy (9 April): available at https://balkaninsight.com/2021/04/09/hungary-could-turn--into-chinas-trojan-horse-in-europe(31May2021). Search in Google Scholar

PRI (2018): Investor-company dialogue on cyber security: five emerging findings, PRI - Governance Issues (24 September): available at https://www.unpri.org/governance-issues/investor--company-dialogue-on-cyber-security-five-emerging-findings/3664.article(31May2021). Search in Google Scholar

PricewaterhouseCoopers (2018): Study on the scale and impact of industrial espionage and theft of trade secrets through cyber, Study prepared for the European Commission (18 December): available at https://ec.europa.eu/docsroom/documents/34841 (31 May 2021). Search in Google Scholar

Ravishankar, Vaishnavi – Mooney, Olivia – Hader, Nora (2018): Stepping up governance on cyber security. What is corporate disclosure telling investors?, Principles for Responsible Investment, UNEP Finance Initiative, UN Global Compact: available at https://www.unpri.org/download?ac=5134 (31 May 2021). Search in Google Scholar

Reynolds, Paul (2004): The World’s Second Oldest Profession, BBC News (26 February): available at https://perma.cc/B9KM-E5E5 (3 September 2021). Search in Google Scholar

Rudka, Andrzej (1997): Central Europe: regional cooperation and beyond, in Hayashi, Tadayuki, ed., The emerging new regional order in Central and Eastern Europe, 193–209, Hokkaido University. Search in Google Scholar

Shackelford, Scott J. et al. (2015): Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties, American Business Law Journal 52 (1): 1–74.10.1111/ablj.12041 Search in Google Scholar

Schmitt, Michael – Vihul, Liis (2017): Tallinn Manual 2.0 on the international law applicable to cyber operations, Cambridge University Press.10.1017/9781316822524 Search in Google Scholar

Strážay, Tomas (2011): Visegrád – arrival, survival, revival. Selected V4 Bibliography, Visegrad Group: available at http://www.visegradgroup.eu/documents/bibliography/visegradarrival--survival-120628 (31 May 2021). Search in Google Scholar

Strážay, Tomas (2019): When pragmatism wins: Slovakia in the Visegrád group, in Brezáni, Peter, ed., Yearbook of Slovakia’s foreign policy 2018, 67–74, Research Center of the Slovak Foreign Policy Association. Search in Google Scholar

Tasheva, Iva (2017): European cybersecurity policy. Trends and prospects, European Policy Centre – Policy Brief (8 June): available at https://www.epc.eu/pub_details.php?cat_id=3&pub_id=7739 (3 September 2021). Search in Google Scholar

UNODC (2018): Cyberespionage, E4J University Module Series: Cybercrime: available at https://www.unodc.org/e4j/en/cybercrime/module-14/key-issues/cyberespionage.html (31 May 2021). Search in Google Scholar

Van Arnam, Robert C. (2001): Business War: Economic Espionage in the United States and the European Union and the Need for Greater Trade Secret Protection, North Carolina Journal of International Law 27: 95–139. Search in Google Scholar

Wielgos, Alexander (2019): V4 in Changeful Espionage, The Warsaw Institute Review (4 November) available at https://warsawinstitute.org/v4-changeful-espionage (31 May 2021). Search in Google Scholar

Wołek, Artur (2013): Precipices beneath summits? The Visegrád cooperation seen from middle policy levels, in Marušiak, Juraj et al., eds., Internal cohesion of the Visegrád group, 86–99, VEDA. Search in Google Scholar

Zachová, Aneta et al. (2018): Is Visegrad group ready for cyber-attacks?, Visegrad.info (7 May): availableathttps://visegradinfo.eu/index.php/collaborative/560-is-visegrad-group-ready--for-cyberattack (31 May 2021). Search in Google Scholar

Artículos recomendados de Trend MD

Planifique su conferencia remota con Sciendo