Main Page: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
No edit summary
No edit summary
Line 33: Line 33:
|[[File:Data2.jpg|center|75px|link=Scenario 12: Cyber operations against computer data]][[Scenario 12: Cyber operations against computer data|S12 (Computer data)]]
|[[File:Data2.jpg|center|75px|link=Scenario 12: Cyber operations against computer data]][[Scenario 12: Cyber operations against computer data|S12 (Computer data)]]
|-
|-
|[[File:Cyberwar2.jpg|center|75px|link=Scenario 13: Cyber operations as a trigger of the law of armed conflict]][[Scenario 13: Cyber operations as a trigger of the law of armed conflict|S13 (Armed conflict)]]
|[[File:Scenario_13.jpg|center|75px|link=Scenario 13: Cyber operations as a trigger of the law of armed conflict]][[Scenario 13: Cyber operations as a trigger of the law of armed conflict|S13 (Armed conflict)]]
|
|
|
|

Revision as of 11:42, 28 March 2019

Welcome to the Cyber Law Toolkit, an interactive online resource on international law and cyber operations.

Other resources

  • FAQ – Frequently asked questions about the project and the Toolkit.
  • All articles – Updated list of all substantive articles in the Toolkit. In a printed book, this would be the table of contents.
  • Keywords – Overview of all keywords used across the Toolkit content. Serves the same purpose as an index would in a printed book.
  • Examples – List of real-world incidents that have inspired the analysis in the Toolkit.
  • Glossary – Glossary of the technical terms used in the Toolkit.
  • Short form citation – Abbreviated references for the most commonly used citations in the Toolkit.
  • Bibliography – Bibliography of resources used in the creation and development of the Toolkit.
  • People – List of all people involved in the project (including scenario authors, peer reviewers, research assistants...).