[1. Armitage, David. “The Elephant and the Whale: Empires of Land and Sea.” Journal for Maritime Research 9 (1) (2007): 23-36.10.1080/21533369.2007.9668360]Search in Google Scholar
[2. Banner, Stuart. Who Owns the Sky? The Struggle to Control Airspace from the Wright Brothers On. Cambridge (MA): Harvard University Press, 2008.10.4159/9780674020498]Search in Google Scholar
[3. Blau, John. “Battle Brewing over International Internet Regulation.” IEEESpectrum (December 2012) // http://spectrum.ieee.org/telecom/internet/battle-brewing-over-internationalinternet- regulation (accessed December 14, 2012).]Search in Google Scholar
[4. Bodini, Stefano Piedimonte. “Fighting Maritime Piracy under the European Convention on Human Rights.” The European Journal of International Law 22 (3) (2011): 829-848.10.1093/ejil/chr052]Search in Google Scholar
[5. Brenner, Susan W., and Marc D. Goodman. “The Emerging Consensus on Criminal Conduct in Cyberspace.” International Journal of Law and Information Technology 10 (2) (2002): 139-223.10.1093/ijlit/10.2.139]Search in Google Scholar
[6. Burgess, Douglas R. “Hostis Humani Generi: Piracy, Terrorism and a New International Law.” University of Miami International and Comparative Law Review 13 (2006): 293-341.]Search in Google Scholar
[7. Cade, Nicholas W. “An Adaptive Approach for an Evolving Crime: The Case for an International Cyber Court and Penal Code.” Brooklyn Journal of International Law 37 (3) (2012): 1139-1175.]Search in Google Scholar
[8. Caral, Jose MA. Emmanuel. “Lessons from ICANN: Is the Self-regulation of the Internet Fundamentally Flawed?” International Journal of Law and Information Technology 12 (1) (2004): 1-31.10.1093/ijlit/12.1.1]Search in Google Scholar
[9. Cerf, Vinton, Barry M. Leiner, David C. Clark, et al. “A Brief History of the Internet”, An International Electronic Publication of the Internet Society (1997) // http://www.isoc.org/oti/printversions/0797prleiner.html (accessed December 17, 2012).]Search in Google Scholar
[10. Chik, Warren B. “‘Customary Internet-tional Law’: Creating a Body of Customary Law to Cyberspace. Part 1: Developing Rules for Transitioning Custom into Law.” Computer Law & Security Review 26 (2010): 3-44.10.1016/j.clsr.2009.11.005]Search in Google Scholar
[11. Clough, Jonathan. “Cybercrime.” Commonwealth Law Bulletin 37 (4) (2011): 671-680.10.1080/03050718.2011.621277]Search in Google Scholar
[12. Clough, Jonathan. “Data Theft? Cybercrime and the Increasing Criminalization of Access to Data.” Criminal Law Forum 22 (1) (2011): 145-170.10.1007/s10609-011-9133-5]Search in Google Scholar
[13. Connery, Christopher L. “Ideologies of Land and Sea: Alfred Thayer Mahan, Carl Schmitt, and the Shaping of Global Myth.” Elements 28 (2) (2001): 173-201.10.1215/01903659-28-2-173]Search in Google Scholar
[14. De Leon, Pablo Mendes. “The Dynamics of Sovereignty and jurisdiction in International Aviation Law”: 483-496. In: Gerard Kreijen, ed. State,Sovereignty, and International Governance. Oxford and New York: Oxford University Press, 2002.]Search in Google Scholar
[15. Dean, Mitchell. “Nomos: Word and Myth”: 242-258. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror,Liberal War, and the Crisis of Global Order. Abingdon and New York: Routledge, 2007.]Search in Google Scholar
[16. Dunlap, Charles J. “Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors.” Nebraska Law Review 87 (2008-2009): 712-724.]Search in Google Scholar
[17. Frazzetto, Mark. “A Maritime Model for Cyberspace Legal Governance.” The National Strategy Forum Review (September 19, 2011) // http://nationalstrategy.wordpress.com/ (accessed November 4, 2012).]Search in Google Scholar
[18. Geiß, Robin, and Anna Petrig. Piracy and Armed Robbery at Sea. Oxford and New York: Oxford University Press, 2011.10.1093/acprof:oso/9780199609529.001.0001]Search in Google Scholar
[19. Ghosh, Sumit, and Elliot Turrini. Cybercrimes: A Multidisciplinary Analysis. Heidelberg: Springer, 2010.]Search in Google Scholar
[20. Grabosky, Peter. “The Global Dimension of Cybercrime.” Global Crime 6 (1) 2004: 146-157.10.1080/1744057042000297034]Search in Google Scholar
[21. Greenleaf, Graham. “Regulating Cyberspace: Architecture vs Law?” Universityof New South Wales Law Journal 21 (2) (1998): 593-604.]Search in Google Scholar
[22. Grewe, Wilhelm G. The Epochs of International Law. Berlin: Walter de Gruyter, 2000.10.1515/9783110902907]Search in Google Scholar
[23. Guilfoyle, Douglas. “Piracy off Somalia: UN Security Council Resolution 1816 and IMO Regional Counter-Piracy Efforts.” International Criminal LawQuarterly 57 (2) (2008): 690-699.10.1017/S0020589308000584]Search in Google Scholar
[24. Harris, Alexandra and Ray Harris. “The Need for Air Space and Outer Space Demarcation.” Space Policy 22 (2006): 3-7.10.1016/j.spacepol.2005.11.004]Search in Google Scholar
[25. Hartogh, Den, and Cees Maris. “The Commencement of Modern Age”: 91-110. In: Cees Maris and Frans Jacobs, eds. Law, Order and Freedom: A Historical Introduction to Legal Philosophy. Heidelberg; Springer, 2011.]Search in Google Scholar
[26. Illves, Toomas Hendrik. “It‘s the Economy, Stupid!” The Security Times (September 2012): 24.]Search in Google Scholar
[27. “Internet Regulation: A Digital Cold War?” The Economist (December 14, 2012) // http://www.economist.com/blogs/babbage/2012/12/internetregulation (accessed December 14, 2012).]Search in Google Scholar
[28. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 1.” Computer and Telecommunications Law Review 9 (3) (2003): 76-81.]Search in Google Scholar
[29. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 2.” Computer and Telecommunications Law Review 9 (4) (2003): 110-115.]Search in Google Scholar
[30. Johnson, David and David Post. “Law and Borders - The Rise of Law in Cyberspace.” Stanford Law Review 48 (1996): 1367-1402.10.2307/1229390]Search in Google Scholar
[31. Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. “Joint Publication 1-02” (2001) // http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf (accessed November 4, 2012).]Search in Google Scholar
[32. Judy, Henry L., and David Satola. “Business Interests Under Attack in Cyberspace: Is International Regulation the Right Response?” Business Law Today (December 2011) // http://apps.americanbar.org/buslaw/blt/content/2011/12/article-2-judysatola.shtml (accessed November 4, 2012).]Search in Google Scholar
[33. Kadens, Emily. “The Myth of the Customary Law Merchant.” Texas Law Review 90 (5) (2012): 1153-1206.]Search in Google Scholar
[34. Kempe, Michael. “Beyond the Law. The Image of Piracy in the Legal Writings of Hugo Grotius”: 379-395. In: Hans W Blom, ed. Property, Piracy and Punishment: Hugo Grotius on War and Booty in De Iure Praedae - Conceptsand Contexts. Leiden: Brill, 2009.]Search in Google Scholar
[35. Khalid, Nazery. “With a Little Help from My Friends: Maritime Capacity building Measures in the Straits of Malacca.” Contemporary Southeast Asia 31 (3) (2009): 424-446.10.1355/cs31-3c]Search in Google Scholar
[36. Klein, Natalie. Maritime Security and the Law of the Sea. Oxford and New York: Oxford University Press, 2011.10.1093/acprof:oso/9780199566532.001.0001]Search in Google Scholar
[37. Kleinwachter, Wolfgang. “Internet Governance Outlook 2012: Cold War or Constructive Dialogue.” Communications Law 17 (1) (2012): 14-18.]Search in Google Scholar
[38. Klimburg, Alexander. “Mobilising Cyber Power.” Survival: Global politics and Strategy 53 (1) (2011): 41-60.10.1080/00396338.2011.555595]Search in Google Scholar
[39. Koops, Bert-Jaap. “The Internet and its Opportunities for Cybercrime”: 735-754. In: M Herzog-Evans, ed. Transnational Criminology Manual. Nijmegen: Wold Legal Publishers, 2010.]Search in Google Scholar
[40. Lessig, Lawrence. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law Review 113 (1999): 501-546.10.2307/1342331]Search in Google Scholar
[41. Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, Arlington, and Pittsburgh: The RAND Corporation, 2009.]Search in Google Scholar
[42. Maier, Bernhard. “How Has the Law Attempted to Tackle the Borderless Nature of the Internet?” International Journal of Law and Information Technology 18 (2) (2010): 142-175.10.1093/ijlit/eaq001]Search in Google Scholar
[43. Marder, Michael. Groundless Existence: The Political Ontology of Carl Schmitt. New York and London: Continuum, 2010.]Search in Google Scholar
[44. Mayer, Franz C. “The Internet and Public International Law - Worlds Apart?” European Journal of International Law 12 (3) (2001): 612-622.10.1093/ejil/12.3.617]Search in Google Scholar
[45. Menthe, Darrel C. “Jurisdiction In Cyberspace: A Theory of International Spaces.” Michigan Telecommunications Law Review 4 (1998): 69-103.]Search in Google Scholar
[46. Newman, David. “Contemporary Research Agenda in Border Studies: An Overview”: 33-48. In: Doris Wastl-Walter, ed. The Ash gate Research Companion to Border Studies. Farnham and Burlington: Ashgate, 2011.]Search in Google Scholar
[47. O’Donnovan, Oliver, and Joan Lockwood O’Donnovan. “Isidore of Seville”: 204-206. In: Oliver O’Donnovan and Joan Lockwood O’Donnovan, eds. From Irenaeus to Grotius: A Sourcebook in Christian Political Thought, 100-1625. Grand Rapids and Michigan: William B. Eerdmans Publishing, 1999.]Search in Google Scholar
[48. Odysseos, Louiza, and Fabio Petito. “The International Political Thought of Carl Schmitt”: 1-18. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror, Liberal War, and theCrisis of Global Order. Abingdon and New York: Routledge, 2007.]Search in Google Scholar
[49. Orji, Uchenna Jerome. “An Analysis of China’s Regulatory Response to Cybersecurity.” Computer and Telecommunications Law Review 18 (7) (2012): 212-226.]Search in Google Scholar
[50. Pardo, Arvid. “The Law of the Sea: Its Past and its Future.” Oregon Law Review 63 (1) (1984): 7-17.]Search in Google Scholar
[51. Reed, Chris. “Online and Offline Equivalence: Aspiration and Achievement.” International Journal of Law and Information Technology 18 (3) (2010): 248-273.10.1093/ijlit/eaq006]Search in Google Scholar
[52. Ronzitti, Natalino. “The Use of Private Contractors in the Fight against Piracy: Policy Options”: 37-53. In: Francesco Francioni and Natalino Ronzitti, eds. War by Contract: Human Rights, Humanitarian Law, and Private Contractors. Oxford and New York: Oxford University Press, 2011.]Search in Google Scholar
[53. “Russia Calls for Internet Revolution.” Russia Today (May 28, 2012) // http://www.rt.com/news/itu-internet-revolution-russia-386 (accessed November 4, 2012).]Search in Google Scholar
[54. Schmitt, Carl. The Nomos of the Earth in the International Law of Jus Publicum Europaeum. New York: Telos, 2003.]Search in Google Scholar
[55. Scott, Jennifer. “ITU Internet Regulation Blocked by UK and US.” ComputerWeekly.com (December 14, 2012) // http://www.computerweekly.com/news/2240174668/ITU-regulation-blockedby- UK-and-US (accessed December 14, 2012).]Search in Google Scholar
[56. Stahl, William M. “The Uncharted Waters of the Cyberspace: Applying the Principles of International Maritime Law to the Problem of Cybersecurity.” Georgia Journal of International and Comparative Law 40 (2011): 247-273.]Search in Google Scholar
[57. Touloumis, Tara. “Buccaneers and Bucks from the Internet: Pirate Bay and the Entertainment Industry.” Seton Hall Journal of Sports & EntertainmentLaw 19 (2009): 253-281.]Search in Google Scholar
[58. Treves, Tullio. “Piracy, Law of the Sea, and Use of Force: Developments off the Coast of Somalia.” European Journal of International Law 20 (2) (2009): 399-414.10.1093/ejil/chp027]Search in Google Scholar
[59. US Department of State. “Fast Facts on United States Submitting Initial Proposals to World Telecom Conference” (August 1, 2012) // http://www.state.gov/e/eb/rls/fs/2012/195921.htm (accessed November 4, 2012).]Search in Google Scholar
[60. Wang, James C. F. Handbook on Ocean Politics and Law. Westport: Greenwood Press, 1992.]Search in Google Scholar
[61. Webb, Walter Prescott. The Great Frontier. Reno: University of Nevada Press, 2003.]Search in Google Scholar
[62. Williams, Alison J. “A Crisis in Aerial Sovereignty? Considering the Implications of Recent Military Violations of National Airspace.” Area 42 (1) (2010): 51-59.10.1111/j.1475-4762.2009.00896.x]Search in Google Scholar
[63. Williams, Alison J. “Blurring Boundaries / Sharpening Borders: Analysing the US’s Use of Military Aviation Technologies to Secure International Borders, 2001-2008”: 283-300. In: Doris Wastl-Walter, ed. The Ashgate ResearchCompanion to Border Studies. Farnham and Burlington: Ashgate, 2011.]Search in Google Scholar
[64. Yar, Majid. “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2 (2005): 407-427.10.1177/147737080556056]Search in Google Scholar
[65. Zekos, Georgios I. “Globalisation and States’ Cyber- Territory.” Web Journalof Current Legal Issues 5 (2001) [pagination not available].]Search in Google Scholar
[66. Zhou, Chenfeng Vincent, Christopher Leckie, and Shanika Karunasekera. “A Survey of Coordinated Attacks and Collaborative Intrusion Detection.” Computers & Security 19 (2010): 124-140.10.1016/j.cose.2009.06.008]Search in Google Scholar
[1. Anglo-Norwegian Fisheries Case. I.C.J. Reports 1951, 116.]Search in Google Scholar
[2. Convention on Cybercrime. Council of Europe. CETS no. 185 (Budapest; November 23, 2001).]Search in Google Scholar
[3. eDate Advertising GmbH v X (C-509/09) and Olivier Martinez and RobertMartinez v MGN Limited (C-161/10). European Court of Justice. Opinion of Advocate General Cruz Villalon (March 29, 2011).]Search in Google Scholar
[4. League against Racism and Antisemitism (LICRA), French Union of JewishStudents v Yahoo! Inc. (USA), Yahoo France. Tribunal de Grande Instance de Paris (The County Court of Paris). Interim Court Order (November 20, 2000). Electronic Business Law Reports 1(3) (2001): 110-120.]Search in Google Scholar
[5. Medvedyev and Others v France. ECHR Grand Chamber. Application no. 3394/03 (March 29, 2010).]Search in Google Scholar
[6. The Situation in Somalia. United Nations Security Council. Resolution no.]Search in Google Scholar
[1816. UN Docs. S/RES/1816 (2008).]Search in Google Scholar
[7. Towards a General Policy on the Fight against Cyber Crime. The Council and the Committee of the Regions. Communication from the Commission to the European Parliament. COM/2007/0267 Final. {SEC(2007) 641} {SEC(2007) 642}. ]Search in Google Scholar