Otwarty dostęp

Hostes Humani Generis: Cyberspace, the Sea, and Sovereign Control


Zacytuj

1. Armitage, David. “The Elephant and the Whale: Empires of Land and Sea.” Journal for Maritime Research 9 (1) (2007): 23-36.10.1080/21533369.2007.9668360Search in Google Scholar

2. Banner, Stuart. Who Owns the Sky? The Struggle to Control Airspace from the Wright Brothers On. Cambridge (MA): Harvard University Press, 2008.10.4159/9780674020498Search in Google Scholar

3. Blau, John. “Battle Brewing over International Internet Regulation.” IEEESpectrum (December 2012) // http://spectrum.ieee.org/telecom/internet/battle-brewing-over-internationalinternet- regulation (accessed December 14, 2012).Search in Google Scholar

4. Bodini, Stefano Piedimonte. “Fighting Maritime Piracy under the European Convention on Human Rights.” The European Journal of International Law 22 (3) (2011): 829-848.10.1093/ejil/chr052Search in Google Scholar

5. Brenner, Susan W., and Marc D. Goodman. “The Emerging Consensus on Criminal Conduct in Cyberspace.” International Journal of Law and Information Technology 10 (2) (2002): 139-223.10.1093/ijlit/10.2.139Search in Google Scholar

6. Burgess, Douglas R. “Hostis Humani Generi: Piracy, Terrorism and a New International Law.” University of Miami International and Comparative Law Review 13 (2006): 293-341.Search in Google Scholar

7. Cade, Nicholas W. “An Adaptive Approach for an Evolving Crime: The Case for an International Cyber Court and Penal Code.” Brooklyn Journal of International Law 37 (3) (2012): 1139-1175.Search in Google Scholar

8. Caral, Jose MA. Emmanuel. “Lessons from ICANN: Is the Self-regulation of the Internet Fundamentally Flawed?” International Journal of Law and Information Technology 12 (1) (2004): 1-31.10.1093/ijlit/12.1.1Search in Google Scholar

9. Cerf, Vinton, Barry M. Leiner, David C. Clark, et al. “A Brief History of the Internet”, An International Electronic Publication of the Internet Society (1997) // http://www.isoc.org/oti/printversions/0797prleiner.html (accessed December 17, 2012).Search in Google Scholar

10. Chik, Warren B. “‘Customary Internet-tional Law’: Creating a Body of Customary Law to Cyberspace. Part 1: Developing Rules for Transitioning Custom into Law.” Computer Law & Security Review 26 (2010): 3-44.10.1016/j.clsr.2009.11.005Search in Google Scholar

11. Clough, Jonathan. “Cybercrime.” Commonwealth Law Bulletin 37 (4) (2011): 671-680.10.1080/03050718.2011.621277Search in Google Scholar

12. Clough, Jonathan. “Data Theft? Cybercrime and the Increasing Criminalization of Access to Data.” Criminal Law Forum 22 (1) (2011): 145-170.10.1007/s10609-011-9133-5Search in Google Scholar

13. Connery, Christopher L. “Ideologies of Land and Sea: Alfred Thayer Mahan, Carl Schmitt, and the Shaping of Global Myth.” Elements 28 (2) (2001): 173-201.10.1215/01903659-28-2-173Search in Google Scholar

14. De Leon, Pablo Mendes. “The Dynamics of Sovereignty and jurisdiction in International Aviation Law”: 483-496. In: Gerard Kreijen, ed. State,Sovereignty, and International Governance. Oxford and New York: Oxford University Press, 2002.Search in Google Scholar

15. Dean, Mitchell. “Nomos: Word and Myth”: 242-258. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror,Liberal War, and the Crisis of Global Order. Abingdon and New York: Routledge, 2007.Search in Google Scholar

16. Dunlap, Charles J. “Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors.” Nebraska Law Review 87 (2008-2009): 712-724.Search in Google Scholar

17. Frazzetto, Mark. “A Maritime Model for Cyberspace Legal Governance.” The National Strategy Forum Review (September 19, 2011) // http://nationalstrategy.wordpress.com/ (accessed November 4, 2012).Search in Google Scholar

18. Geiß, Robin, and Anna Petrig. Piracy and Armed Robbery at Sea. Oxford and New York: Oxford University Press, 2011.10.1093/acprof:oso/9780199609529.001.0001Search in Google Scholar

19. Ghosh, Sumit, and Elliot Turrini. Cybercrimes: A Multidisciplinary Analysis. Heidelberg: Springer, 2010.Search in Google Scholar

20. Grabosky, Peter. “The Global Dimension of Cybercrime.” Global Crime 6 (1) 2004: 146-157.10.1080/1744057042000297034Search in Google Scholar

21. Greenleaf, Graham. “Regulating Cyberspace: Architecture vs Law?” Universityof New South Wales Law Journal 21 (2) (1998): 593-604.Search in Google Scholar

22. Grewe, Wilhelm G. The Epochs of International Law. Berlin: Walter de Gruyter, 2000.10.1515/9783110902907Search in Google Scholar

23. Guilfoyle, Douglas. “Piracy off Somalia: UN Security Council Resolution 1816 and IMO Regional Counter-Piracy Efforts.” International Criminal LawQuarterly 57 (2) (2008): 690-699.10.1017/S0020589308000584Search in Google Scholar

24. Harris, Alexandra and Ray Harris. “The Need for Air Space and Outer Space Demarcation.” Space Policy 22 (2006): 3-7.10.1016/j.spacepol.2005.11.004Search in Google Scholar

25. Hartogh, Den, and Cees Maris. “The Commencement of Modern Age”: 91-110. In: Cees Maris and Frans Jacobs, eds. Law, Order and Freedom: A Historical Introduction to Legal Philosophy. Heidelberg; Springer, 2011.Search in Google Scholar

26. Illves, Toomas Hendrik. “It‘s the Economy, Stupid!” The Security Times (September 2012): 24.Search in Google Scholar

27. “Internet Regulation: A Digital Cold War?” The Economist (December 14, 2012) // http://www.economist.com/blogs/babbage/2012/12/internetregulation (accessed December 14, 2012).Search in Google Scholar

28. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 1.” Computer and Telecommunications Law Review 9 (3) (2003): 76-81.Search in Google Scholar

29. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 2.” Computer and Telecommunications Law Review 9 (4) (2003): 110-115.Search in Google Scholar

30. Johnson, David and David Post. “Law and Borders - The Rise of Law in Cyberspace.” Stanford Law Review 48 (1996): 1367-1402.10.2307/1229390Search in Google Scholar

31. Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. “Joint Publication 1-02” (2001) // http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf (accessed November 4, 2012).Search in Google Scholar

32. Judy, Henry L., and David Satola. “Business Interests Under Attack in Cyberspace: Is International Regulation the Right Response?” Business Law Today (December 2011) // http://apps.americanbar.org/buslaw/blt/content/2011/12/article-2-judysatola.shtml (accessed November 4, 2012).Search in Google Scholar

33. Kadens, Emily. “The Myth of the Customary Law Merchant.” Texas Law Review 90 (5) (2012): 1153-1206.Search in Google Scholar

34. Kempe, Michael. “Beyond the Law. The Image of Piracy in the Legal Writings of Hugo Grotius”: 379-395. In: Hans W Blom, ed. Property, Piracy and Punishment: Hugo Grotius on War and Booty in De Iure Praedae - Conceptsand Contexts. Leiden: Brill, 2009.Search in Google Scholar

35. Khalid, Nazery. “With a Little Help from My Friends: Maritime Capacity building Measures in the Straits of Malacca.” Contemporary Southeast Asia 31 (3) (2009): 424-446.10.1355/cs31-3cSearch in Google Scholar

36. Klein, Natalie. Maritime Security and the Law of the Sea. Oxford and New York: Oxford University Press, 2011.10.1093/acprof:oso/9780199566532.001.0001Search in Google Scholar

37. Kleinwachter, Wolfgang. “Internet Governance Outlook 2012: Cold War or Constructive Dialogue.” Communications Law 17 (1) (2012): 14-18.Search in Google Scholar

38. Klimburg, Alexander. “Mobilising Cyber Power.” Survival: Global politics and Strategy 53 (1) (2011): 41-60.10.1080/00396338.2011.555595Search in Google Scholar

39. Koops, Bert-Jaap. “The Internet and its Opportunities for Cybercrime”: 735-754. In: M Herzog-Evans, ed. Transnational Criminology Manual. Nijmegen: Wold Legal Publishers, 2010.Search in Google Scholar

40. Lessig, Lawrence. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law Review 113 (1999): 501-546.10.2307/1342331Search in Google Scholar

41. Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, Arlington, and Pittsburgh: The RAND Corporation, 2009.Search in Google Scholar

42. Maier, Bernhard. “How Has the Law Attempted to Tackle the Borderless Nature of the Internet?” International Journal of Law and Information Technology 18 (2) (2010): 142-175.10.1093/ijlit/eaq001Search in Google Scholar

43. Marder, Michael. Groundless Existence: The Political Ontology of Carl Schmitt. New York and London: Continuum, 2010.Search in Google Scholar

44. Mayer, Franz C. “The Internet and Public International Law - Worlds Apart?” European Journal of International Law 12 (3) (2001): 612-622.10.1093/ejil/12.3.617Search in Google Scholar

45. Menthe, Darrel C. “Jurisdiction In Cyberspace: A Theory of International Spaces.” Michigan Telecommunications Law Review 4 (1998): 69-103.Search in Google Scholar

46. Newman, David. “Contemporary Research Agenda in Border Studies: An Overview”: 33-48. In: Doris Wastl-Walter, ed. The Ash gate Research Companion to Border Studies. Farnham and Burlington: Ashgate, 2011.Search in Google Scholar

47. O’Donnovan, Oliver, and Joan Lockwood O’Donnovan. “Isidore of Seville”: 204-206. In: Oliver O’Donnovan and Joan Lockwood O’Donnovan, eds. From Irenaeus to Grotius: A Sourcebook in Christian Political Thought, 100-1625. Grand Rapids and Michigan: William B. Eerdmans Publishing, 1999.Search in Google Scholar

48. Odysseos, Louiza, and Fabio Petito. “The International Political Thought of Carl Schmitt”: 1-18. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror, Liberal War, and theCrisis of Global Order. Abingdon and New York: Routledge, 2007.Search in Google Scholar

49. Orji, Uchenna Jerome. “An Analysis of China’s Regulatory Response to Cybersecurity.” Computer and Telecommunications Law Review 18 (7) (2012): 212-226.Search in Google Scholar

50. Pardo, Arvid. “The Law of the Sea: Its Past and its Future.” Oregon Law Review 63 (1) (1984): 7-17.Search in Google Scholar

51. Reed, Chris. “Online and Offline Equivalence: Aspiration and Achievement.” International Journal of Law and Information Technology 18 (3) (2010): 248-273.10.1093/ijlit/eaq006Search in Google Scholar

52. Ronzitti, Natalino. “The Use of Private Contractors in the Fight against Piracy: Policy Options”: 37-53. In: Francesco Francioni and Natalino Ronzitti, eds. War by Contract: Human Rights, Humanitarian Law, and Private Contractors. Oxford and New York: Oxford University Press, 2011.Search in Google Scholar

53. “Russia Calls for Internet Revolution.” Russia Today (May 28, 2012) // http://www.rt.com/news/itu-internet-revolution-russia-386 (accessed November 4, 2012).Search in Google Scholar

54. Schmitt, Carl. The Nomos of the Earth in the International Law of Jus Publicum Europaeum. New York: Telos, 2003.Search in Google Scholar

55. Scott, Jennifer. “ITU Internet Regulation Blocked by UK and US.” ComputerWeekly.com (December 14, 2012) // http://www.computerweekly.com/news/2240174668/ITU-regulation-blockedby- UK-and-US (accessed December 14, 2012).Search in Google Scholar

56. Stahl, William M. “The Uncharted Waters of the Cyberspace: Applying the Principles of International Maritime Law to the Problem of Cybersecurity.” Georgia Journal of International and Comparative Law 40 (2011): 247-273.Search in Google Scholar

57. Touloumis, Tara. “Buccaneers and Bucks from the Internet: Pirate Bay and the Entertainment Industry.” Seton Hall Journal of Sports & EntertainmentLaw 19 (2009): 253-281.Search in Google Scholar

58. Treves, Tullio. “Piracy, Law of the Sea, and Use of Force: Developments off the Coast of Somalia.” European Journal of International Law 20 (2) (2009): 399-414.10.1093/ejil/chp027Search in Google Scholar

59. US Department of State. “Fast Facts on United States Submitting Initial Proposals to World Telecom Conference” (August 1, 2012) // http://www.state.gov/e/eb/rls/fs/2012/195921.htm (accessed November 4, 2012).Search in Google Scholar

60. Wang, James C. F. Handbook on Ocean Politics and Law. Westport: Greenwood Press, 1992.Search in Google Scholar

61. Webb, Walter Prescott. The Great Frontier. Reno: University of Nevada Press, 2003.Search in Google Scholar

62. Williams, Alison J. “A Crisis in Aerial Sovereignty? Considering the Implications of Recent Military Violations of National Airspace.” Area 42 (1) (2010): 51-59.10.1111/j.1475-4762.2009.00896.xSearch in Google Scholar

63. Williams, Alison J. “Blurring Boundaries / Sharpening Borders: Analysing the US’s Use of Military Aviation Technologies to Secure International Borders, 2001-2008”: 283-300. In: Doris Wastl-Walter, ed. The Ashgate ResearchCompanion to Border Studies. Farnham and Burlington: Ashgate, 2011.Search in Google Scholar

64. Yar, Majid. “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2 (2005): 407-427.10.1177/147737080556056Search in Google Scholar

65. Zekos, Georgios I. “Globalisation and States’ Cyber- Territory.” Web Journalof Current Legal Issues 5 (2001) [pagination not available].Search in Google Scholar

66. Zhou, Chenfeng Vincent, Christopher Leckie, and Shanika Karunasekera. “A Survey of Coordinated Attacks and Collaborative Intrusion Detection.” Computers & Security 19 (2010): 124-140.10.1016/j.cose.2009.06.008Search in Google Scholar

1. Anglo-Norwegian Fisheries Case. I.C.J. Reports 1951, 116.Search in Google Scholar

2. Convention on Cybercrime. Council of Europe. CETS no. 185 (Budapest; November 23, 2001).Search in Google Scholar

3. eDate Advertising GmbH v X (C-509/09) and Olivier Martinez and RobertMartinez v MGN Limited (C-161/10). European Court of Justice. Opinion of Advocate General Cruz Villalon (March 29, 2011).Search in Google Scholar

4. League against Racism and Antisemitism (LICRA), French Union of JewishStudents v Yahoo! Inc. (USA), Yahoo France. Tribunal de Grande Instance de Paris (The County Court of Paris). Interim Court Order (November 20, 2000). Electronic Business Law Reports 1(3) (2001): 110-120.Search in Google Scholar

5. Medvedyev and Others v France. ECHR Grand Chamber. Application no. 3394/03 (March 29, 2010).Search in Google Scholar

6. The Situation in Somalia. United Nations Security Council. Resolution no.Search in Google Scholar

1816. UN Docs. S/RES/1816 (2008).Search in Google Scholar

7. Towards a General Policy on the Fight against Cyber Crime. The Council and the Committee of the Regions. Communication from the Commission to the European Parliament. COM/2007/0267 Final. {SEC(2007) 641} {SEC(2007) 642}. Search in Google Scholar

ISSN:
2029-0454
Język:
Angielski
Częstotliwość wydawania:
2 razy w roku
Dziedziny czasopisma:
Law, History, Philosophy and Sociology of Law, other