Main Page: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(small changes to the brno incident)
(adding links to scenarios, pics for 15 and 18 are needed :))
Line 36: Line 36:
|[[File:Scenario_13.jpg|center|120px|link=Scenario 13: Cyber operations as a trigger of the law of armed conflict]][[Scenario 13: Cyber operations as a trigger of the law of armed conflict|S13<br>Armed<br>conflict]]
|[[File:Scenario_13.jpg|center|120px|link=Scenario 13: Cyber operations as a trigger of the law of armed conflict]][[Scenario 13: Cyber operations as a trigger of the law of armed conflict|S13<br>Armed<br>conflict]]
|[[File:Privacy-policy-445153 1920.jpg|center|120px|link=Scenario 14: Ransomware campaign]][[Scenario 14: Ransomware campaign|S14<br>Ransomware<br>campaign]]
|[[File:Privacy-policy-445153 1920.jpg|center|120px|link=Scenario 14: Ransomware campaign]][[Scenario 14: Ransomware campaign|S14<br>Ransomware<br>campaign]]
|[[File:White.png|center|120px|link=Scenario 15: Cyber deception during armed conflict]]<!--[[Scenario 15: Cyber deception during armed conflict|S15<br>Cyber<br>deception]]
|
|[[File:Shipsbridge-3x2.jpg|center|120px|link=Scenario 16: Cyber attacks against ships on the high seas]][[Scenario 16: Cyber attacks against ships on the high seas|S16<br>High<br>seas]]
|-
|[[File:Pexels-markus-spiske-1679618.jpg|center|120px|link=Scenario 17: Collective responses to cyber operations]][[Scenario 17: Collective responses to cyber operations|S17<br>Collective<br>responses]]
|[[File:White.png|center|120px|link=Scenario 18: Legal status of cyber operators during armed conflict]][[Scenario 18: Legal status of cyber operators during armed conflict|S18<br>Cyber<br>operators]]
|[[File:Social-3064515 1920.jpg|center|120px|link=Scenario 19: Hate speech]][[Scenario 19: Hate speech|S19<br>Hate<br>speech]]-->
|
|
|}
|}

Revision as of 13:30, 1 October 2020

__NONUMBEREDHEADINGS__

Welcome to the Cyber Law Toolkit, an interactive online resource on international law and cyber operations.

Other resources

  • FAQ – Frequently asked questions about the project and the Toolkit.
  • All articles – Updated list of all substantive articles in the Toolkit. In a printed book, this would be the table of contents.
  • Keywords – Overview of all keywords used across the Toolkit content. Serves the same purpose as an index would in a printed book.
  • Examples – List of real-world incidents that have inspired the analysis in the Toolkit.
  • Glossary – Glossary of the technical terms used in the Toolkit.
  • Short form citation – Abbreviated references for the most commonly used citations in the Toolkit.
  • Bibliography – Bibliography of resources used in the creation and development of the Toolkit.
  • People – List of all people involved in the project (including scenario authors, peer reviewers, research assistants...).