User contributions for Exeter683
Jump to navigation
Jump to search
31 January 2019
- 23:1223:12, 31 January 2019 diff hist −120 Bibliography Recommended changes made Tag: Visual edit
- 18:3918:39, 31 January 2019 diff hist +7 m Sovereignty Minor reference change Tag: Visual edit
- 18:3718:37, 31 January 2019 diff hist +7,481 Bibliography →International reports and other public documents: Added remaining bibliography Tag: Visual edit
- 12:5712:57, 31 January 2019 diff hist +1 Bibliography →Books and monographs: Added JustSecurity sources to 'online sources' rather than journals Tag: Visual edit
- 10:4310:43, 31 January 2019 diff hist +880 Bibliography →Newspaper articles and online news: Added more online sources Tag: Visual edit
- 10:3610:36, 31 January 2019 diff hist +1,052 Bibliography →Blog posts and other online sources: Added speeches to bibliography Tag: Visual edit
- 10:2610:26, 31 January 2019 diff hist +16 Scenario 13: Cyber operations as a trigger of the law of armed conflict →Bibliography and further reading: Added full name Tag: Visual edit
- 09:4309:43, 31 January 2019 diff hist +11,614 Bibliography →Books and monographs: Added full bibliography Tag: Visual edit
30 January 2019
- 16:0116:01, 30 January 2019 diff hist +153 Scenario 13: Cyber operations as a trigger of the law of armed conflict →Bibliography and further reading: Added TM to Bibliography Tag: Visual edit
- 15:5815:58, 30 January 2019 diff hist +165 m Scenario 12: Cyber operations against computer data →Bibliography and further reading: Added TM to Bibliography Tag: Visual edit
- 15:5715:57, 30 January 2019 diff hist +160 m Scenario 11: Sale of surveillance tools in defiance of international sanctions →Bibliography and further reading: Added TM to Bib Tag: Visual edit
- 15:5615:56, 30 January 2019 diff hist +40 m Scenario 10: Legal review of cyber weapons →Bibliography: Hyperlinked TM Tag: Visual edit
- 15:5615:56, 30 January 2019 diff hist +166 m Scenario 09: Economic cyber espionage →Bibliography and further reading: Added TM Tag: Visual edit
- 15:5415:54, 30 January 2019 diff hist +162 Scenario 08: Certificate authority hack →Bibliography and further reading: Added TM to Bibliography Tag: Visual edit
- 15:5315:53, 30 January 2019 diff hist +165 m Scenario 07: Leak of State-developed hacking tools →Bibliography and further reading: Added TM to Bibliograhy Tag: Visual edit
- 15:5215:52, 30 January 2019 diff hist +122 Scenario 06: Cyber countermeasures against an enabling State →Bibliography and further reading: Added Bibliography Tag: Visual edit
- 15:5015:50, 30 January 2019 diff hist +157 m Scenario 05: State investigates and responds to cyber operations against private actors in its territory →Bibliography and further reading: Added TM to Bibliography Tag: Visual edit
- 15:4915:49, 30 January 2019 diff hist +157 m Scenario 04: A State’s failure to assist an international organization →Bibliography and further reading: Added TM Tag: Visual edit
- 15:4715:47, 30 January 2019 diff hist +131 Scenario 03: Cyber operation against the power grid →Bibliography and further reading: Added TM Tag: Visual edit
- 15:4515:45, 30 January 2019 diff hist +141 Scenario 02: Cyber espionage against government departments →Bibliography and further reading: Added TM Tag: Visual edit
- 15:4315:43, 30 January 2019 diff hist +141 Scenario 01: Election interference →Bibliography and further reading: Added TM to bibliography Tag: Visual edit
- 15:4015:40, 30 January 2019 diff hist +133 Scenario 10: Legal review of cyber weapons →Bibliography: Added complete bibliography Tag: Visual edit
- 15:3315:33, 30 January 2019 diff hist +1,864 Scenario 11: Sale of surveillance tools in defiance of international sanctions →Bibliography and further reading: Added bibliography Tag: Visual edit
- 13:1213:12, 30 January 2019 diff hist +2,255 Scenario 12: Cyber operations against computer data →Bibliography and further reading: Added bibliography Tag: Visual edit
29 January 2019
- 23:2023:20, 29 January 2019 diff hist +2,917 Scenario 13: Cyber operations as a trigger of the law of armed conflict →Bibliography and further reading: Added bibliography Tag: Visual edit
- 22:5122:51, 29 January 2019 diff hist +3,115 Scenario 09: Economic cyber espionage →Bibliography and further reading: Added bibliography Tag: Visual edit
- 22:2022:20, 29 January 2019 diff hist +1,639 Scenario 08: Certificate authority hack →Bibliography and further reading: Added Bibliography Tag: Visual edit
- 22:0422:04, 29 January 2019 diff hist +2,275 Scenario 07: Leak of State-developed hacking tools →Bibliography and further reading: Added bibliography Tag: Visual edit
- 21:4821:48, 29 January 2019 diff hist +1,251 Scenario 06: Cyber countermeasures against an enabling State →Bibliography and further reading: Added bibliography Tag: Visual edit
- 19:4219:42, 29 January 2019 diff hist +2,970 Scenario 05: State investigates and responds to cyber operations against private actors in its territory →Bibliography and further reading: Added bibliography Tag: Visual edit
- 19:1519:15, 29 January 2019 diff hist +621 Scenario 04: A State’s failure to assist an international organization →Bibliography and further reading: Added bibliography Tag: Visual edit
- 18:1018:10, 29 January 2019 diff hist +38 Use of force Added link to reference after finding it for main bibliography Tag: Visual edit
- 18:0818:08, 29 January 2019 diff hist +2,382 Scenario 03: Cyber operation against the power grid →Bibliography and further reading: Added bibliography Tag: Visual edit
- 17:3417:34, 29 January 2019 diff hist +1,334 Scenario 02: Cyber espionage against government departments →Bibliography and further reading: Added the complete bibliography Tag: Visual edit
- 17:1917:19, 29 January 2019 diff hist +10 Sovereignty Added full author names Tag: Visual edit
- 17:1817:18, 29 January 2019 diff hist +10 Scenario 01: Election interference →Bibliography and further reading: minor amendment to name Tag: Visual edit
- 17:1717:17, 29 January 2019 diff hist +1,325 Scenario 01: Election interference →Bibliography and further reading: Added relevant academic sources to the bibliography Tag: Visual edit
12 December 2018
- 16:0616:06, 12 December 2018 diff hist +291 m Scenario 05: State investigates and responds to cyber operations against private actors in its territory Checked the references left by G outside of the yellow boxes (covered under previous scenarios) and corrected any issues Tag: Visual edit
- 15:4815:48, 12 December 2018 diff hist +53 m Peacetime cyber espionage hyperlinks and punctuation Tag: Visual edit
- 15:4015:40, 12 December 2018 diff hist +55 m Countermeasures Hyperlink added Tag: Visual edit
8 December 2018
- 14:3814:38, 8 December 2018 diff hist −2 m International human rights law No edit summary Tag: Visual edit
- 14:3714:37, 8 December 2018 diff hist −3 m International human rights law Minor punctuation changes Tag: Visual edit
- 14:3114:31, 8 December 2018 diff hist −1 m Prohibition of intervention Corrected grammar Tag: Visual edit
- 14:2914:29, 8 December 2018 diff hist −10 m Due diligence OSCOLA Compliance to three references Tag: Visual edit
- 14:2514:25, 8 December 2018 diff hist +4 m Scenario 07: Leak of State-developed hacking tools Added full names Tag: Visual edit
- 12:2112:21, 8 December 2018 diff hist +15 m Scenario 06: Cyber countermeasures against an enabling State full names added Tag: Visual edit
- 12:0612:06, 8 December 2018 diff hist +3 m Scenario 09: Economic cyber espionage Added full name Tag: Visual edit
- 12:0412:04, 8 December 2018 diff hist +398 m Scenario 09: Economic cyber espionage Made the references exclusive to Scenario 9 OCSOLA Compliant and added hyperlinks Tag: Visual edit
6 December 2018
- 09:1909:19, 6 December 2018 diff hist +37 m Peacetime cyber espionage added full names Tag: Visual edit
- 09:0909:09, 6 December 2018 diff hist +394 Diplomatic and consular law Checked OSCOLA Compliance, still have to add hyperlinks to cases and articles Tag: Visual edit