Confronting Cyberespionage Under International Law / (Record no. 72240)

000 -LEADER
fixed length control field 03711nam a2200601Ii 4500
001 - CONTROL NUMBER
control field 9781351106016
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220531132429.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181112t20182019fluab ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351106016
-- (e-book : PDF)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCLC)1053623221
040 ## - Cataloging Source
-- FlBoTFG
-- FlBoTFG
-- rda
041 1# -
-- eng
072 #7 -
-- LAW
-- 051000
-- bisacsh
072 #7 -
-- LAW
-- 104000
-- bisacsh
072 #7 -
-- LAW
-- 026000
-- bisacsh
072 #7 -
-- LB
-- bicscc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Pehlivan, Oğuz Kaan,
Relator term author.
245 10 - TITLE STATEMENT
Title Confronting Cyberespionage Under International Law /
Statement of responsibility, etc. by Oğuz Kaan Pehlivan.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 -
-- Boca Raton, FL :
-- Routledge,
-- [2018].
264 #4 -
-- ©2019.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (146 pages) :
Other physical details 7 illustrations, text file, PDF.
336 ## -
-- text
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
490 1# -
-- Routledge Research in International Law
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 00 -
-- Introduction --
-- 1.--Cyberspace, Espionage and Cyberespionage --
-- 2. Legal Responses to Economic and Industrial Espionage --
--
520 3# -
-- We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage.Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
530 ## -
-- Also available in print format.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element LAW / Computer & Internet.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element LAW / Criminal Law / General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Commercial Secrets.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberespionage.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cybersecurity.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber Crimes.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Economic Espionage.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Espionage.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Industrial Espionage.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element International Law.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element International Treaty Law.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Peacetime Espionage.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Regulation.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wartime Espionage.
Source of heading or term bisacsh
655 #0 -
-- Electronic books.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Taylor and Francis.
776 08 -
-- Print version:
-- 9781138476424
830 #0 -
-- Routledge Research in International Law.
856 40 -
-- https://www.taylorfrancis.com/books/9781351106016
-- Click here to view.

No items available.

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571