Journal of Law & Cyber Warfare, Volume 3, Issue 1, Spring 2014 |
Wat mensen zeggen - Een review schrijven
We hebben geen reviews gevonden op de gebruikelijke plaatsen.
Inhoudsopgave
I Introduction | 3 |
II Defining CyberRisk | 8 |
III Moral Hazard | 16 |
IV Insurance Regulation Information Sharing | 24 |
V How Information Sharing Mitigates Moral Hazard | 33 |
VI Conclusion | 41 |
I Introduction | 44 |
II The Challenge for Liberal Democratic States Their Militaries and their Security Services | 46 |
IV The Signal Power of Law and its Limitations | 49 |
V Conclusion | 51 |
I Introduction | 53 |
II Towards a legal definition of cyberweapon | 56 |
III The classification of Stuxnet and the following malware | 59 |
IV Anticipatory Outlines | 64 |
V Conclusions | 68 |
I Introduction | 70 |
Veelvoorkomende woorden en zinsdelen
activity anonymous anti-money laundering apply Bank Secrecy Act Bitcoin Blog civilian classified common Article context create criminal cyber cyber-risk coverage cyber-risk insurance cyber-warfare cyber-weapon cyberspace data breach defined Dwolla effects Egypt electronic financial transactions FinCEN formal financial institutions Geneva Conventions global harm historical loss data IMLAFA incentive information security infrastructure information sharing information systems insurance coverage insurance industry insurance policies Insurance Support Organizations insured’s international armed conflict Internet internet access investments ISPs IVTS jus in bello last visited Feb law enforcement law of armed liability malware McCarran-Ferguson Act military money laundering moral hazard MtGox non-international armed conflict operations physical damage potential premiums protection protestors Protocol rating bureau real world regulation result risk social media specific Stuxnet supra note 11 Symantec target underwriting updates users violent consequences virtual currencies virtual worlds warfare weapon websites