Jump to navigation
Jump to search
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
fill this in!
== Content FAQ == === Which areas of law are covered by the Toolkit? === The Toolkit covers, in principle, the entirety of international law, ranging from general international law to international human rights law and humanitarian law. Please refer to the full [[List of articles]] to find out which specific topics of international law are covered. === Why is the Toolkit organized around specific scenarios? === The scenarios reflect the pragmatic approach of the Toolkit. The analysis in individual scenarios is based on actual cyber incidents with some relevance for international law. By gathering the relevant cyber incidents and the applicable law in a single place, the Toolkit offers an organized vision of the main legal issues at stake, while encouraging the development of international cyber law in the future. === Which scenarios does the Toolkit consist of? === Please refer to the [[Main Page]], which contains an overview of all scenarios. You may also refer to the [[List of articles]], which places the scenarios in the overall context of all substantive articles in the Toolkit. Also, when reading about a specific real-world example, you will find cross-references to the scenarios, which analyse legal issues that arise from the example in question. The Toolkit is continuously updated and new scenarios and other content are being added on an ongoing basis. === What is the structure of individual scenarios? === In brief, every scenario consists of the following sections: * '''0 Executive summary''' (presented without a section header) * '''1 Scenario''' (keywords, factual description, and real-world examples) * '''2 Legal analysis''' (the central part of the scenario; see [[Note on the structure of articles|Note on the structure of analysis]] for its internal structure) * '''3 Checklist''' (questions for legal advisors facing similar situations in practice) * '''4 Appendixes''' (further information, such as other relevant articles in the toolkit; endnotes; and bibliography) === How does the analysis in the Toolkit relate to real life? === Virtually all scenarios are accompanied by a list of real-world examples. The scenarios are hypothetical, but there are many similarities between the hypothetical facts and the real incidents. The Toolkit aims to make the legal analysis in the individual scenarios easily adaptable to existing and future real-life incidents. === Does the Toolkit reflect the approach of a certain country or legal school to international law? === No. The starting point of the Toolkit is that, as a matter of principle, international law does apply to the conduct in cyberspace. This reflects the currently existing broad consensus in the international community as well as in the scholarly writing. Beyond this foundational assumption, the analysis in the Toolkit only reflects the views of the authors of the relevant content and it does not aspire to represent any particular country or school of thought. === Where can I find further resources about the application of international law in cyberspace? === Although non-exhaustive, each scenario provides a list of relevant bibliography and further readings. In addition, a consolidated list of sources used in the creation of the Toolkit can be found in the general [[Bibliography]] section.
Please note that all contributions to International cyber law: interactive toolkit are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) (see
International cyber law: interactive toolkit:Copyrights
for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource.
Do not submit copyrighted work without permission!
(opens in new window)
Retrieved from "
Not logged in
What links here
Get shortened URL