Editing FAQ

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 9: Line 9:
 
The Toolkit addresses a gap between the academia and practice as far as international cyber law is concerned. Although there is a growing body of research in this area of international law, its outputs are often not easily adaptable to the needs of legal practitioners dealing with cyber incidents on a daily basis. The Toolkit attempts to bridge this gap by providing accessible yet precise practical solutions to scenarios based on real-life examples of cyber operations with international law relevance.
 
The Toolkit addresses a gap between the academia and practice as far as international cyber law is concerned. Although there is a growing body of research in this area of international law, its outputs are often not easily adaptable to the needs of legal practitioners dealing with cyber incidents on a daily basis. The Toolkit attempts to bridge this gap by providing accessible yet precise practical solutions to scenarios based on real-life examples of cyber operations with international law relevance.
 
=== Who is the target audience? ===
 
=== Who is the target audience? ===
The Toolkit is primarily addressed to legal practitioners with a working knowledge of international law. However, the language used is comprehensive and explanatory and should be generally accessible to non-lawyers, as well. Each [[:Category:Legal_concepts|concept]] that underpins the analysis is explained in detail to provide a complete understanding of the relevant [[:Category:Scenario|scenario]]. Whilst the target audience are those with a degree of familiarity with international law and specifically cyber law, it does not preclude those with a general interest in the area, but no relevant expertise, from reading, using and enjoying the content of the Toolkit.
+
The Toolkit is primarily addressed to legal practitioners with a working knowledge of international law. However, the language used is comprehensive and explanatory and should be generally accessible to non-lawyers, as well. Each [[Category:Legal_concepts|concept]] that underpins the analysis is explained in detail to provide a complete understanding of the relevant [[Category:Scenario|scenario]]. Whilst the target audience are those with a degree of familiarity with international law and specifically cyber law, it does not preclude those with a general interest in the area, but no relevant expertise, from reading, using and enjoying the content of the Toolkit.
 
=== Is the Toolkit applicable to my country? ===
 
=== Is the Toolkit applicable to my country? ===
 
The analytical focus of the Toolkit is on international law applicable to cyber operations. By contrast, it does not specifically address the domestic law of any particular country, nor does it adopt the view of any country or group of countries. As such, it is applicable to all countries in the world – including yours.  
 
The analytical focus of the Toolkit is on international law applicable to cyber operations. By contrast, it does not specifically address the domestic law of any particular country, nor does it adopt the view of any country or group of countries. As such, it is applicable to all countries in the world – including yours.  
Line 38: Line 38:
 
== Usage FAQ ==
 
== Usage FAQ ==
 
=== How do I use the Toolkit? ===
 
=== How do I use the Toolkit? ===
The Toolkit may be explored and utilized in a number of different ways. First of all, you may want to browse the hypothetical scenarios (available from the [[Main Page|Main Page]] or at [[:Category:Scenario|this link]]), each of which contains a description of cyber incidents inspired by real-world examples, accompanied by detailed legal analysis. The aim of the analysis is to examine the applicability of international law to the scenarios and the issues they raise. In addition, you may explore the Toolkit by looking for [[Keywords|keywords]] you’re interested in; by viewing its overall [[List of articles|article structure]]; or by reading about individual [[List_of_articles#Real-world_examples|real-world examples]] that serve as the basis of the Toolkit scenarios. Finally, you may want to use the search function in the top right corner of this page to look for specific words across all of the Toolkit content.
+
The Toolkit may be explored and utilized in a number of different ways. First of all, you may want to browse the hypothetical scenarios (available from the [[Main Page|Main Page]] or at [[Category:Scenario|this link]]), each of which contains a description of cyber incidents inspired by real-world examples, accompanied by detailed legal analysis. The aim of the analysis is to examine the applicability of international law to the scenarios and the issues they raise. In addition, you may explore the Toolkit by looking for [[Special:Categories|keywords]] you’re interested in; by viewing its overall [[List of articles|article structure]]; or by reading about individual [[List_of_articles#Real-world_examples|real-world examples]] that serve as the basis of the Toolkit scenarios. Finally, you may want to use the search function in the top right corner of this page to look for specific words across all of the Toolkit content.
 
=== Why is this an online resource, and not simply a book? ===
 
=== Why is this an online resource, and not simply a book? ===
 
The online format allows us to continuously update the Toolkit as new incidents arise or new developments in the applicable law emerge. The wiki format allows collaborative work on the Toolkit as well as highlighting interconnections between the various parts of the analysis.
 
The online format allows us to continuously update the Toolkit as new incidents arise or new developments in the applicable law emerge. The wiki format allows collaborative work on the Toolkit as well as highlighting interconnections between the various parts of the analysis.
Line 44: Line 44:
 
The Toolkit is based on reliable and publicly available sources. The analysis aims to provide a clear guidance, but when the law is unsettled, this is noted and the existing reasonable views are explained. All scenarios have been [[Peer reviewers|peer-reviewed]]. The full list of sources can be found in the [[Bibliography]] of the Toolkit.
 
The Toolkit is based on reliable and publicly available sources. The analysis aims to provide a clear guidance, but when the law is unsettled, this is noted and the existing reasonable views are explained. All scenarios have been [[Peer reviewers|peer-reviewed]]. The full list of sources can be found in the [[Bibliography]] of the Toolkit.
 
=== I am dealing with an actual cyber incident, but none of the scenarios matches the factual situation. What can I do? ===
 
=== I am dealing with an actual cyber incident, but none of the scenarios matches the factual situation. What can I do? ===
You may want to browse the existing content by reference to the individual [[Keywords|keywords]], by reviewing the overall [[List of articles|article structure]], or through the full-text search function (available in the top-right corner of every page). In addition, it may well be that your cyber incident shares some similarity with one of the real-world examples detailed in this Toolkit. If that is so, you will find links to specific scenarios where aspects of the example in question are analysed from the legal perspective. Finally, you are welcome to contact us to suggest new content for the Toolkit.
+
You may want to browse the existing content by reference to the individual [[Special:Categories|keywords]], by reviewing the overall [[List of articles|article structure]], or through the full-text search function (available in the top-right corner of every page). In addition, it may well be that your cyber incident shares some similarity with one of the real-world examples detailed in this Toolkit. If that is so, you will find links to specific scenarios where aspects of the example in question are analysed from the legal perspective. Finally, you are welcome to contact us to suggest new content for the Toolkit.
 
{{anchor|Citations}}
 
{{anchor|Citations}}
 
=== How do I cite Toolkit articles? ===
 
=== How do I cite Toolkit articles? ===

Please note that all contributions to International cyber law: interactive toolkit are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) (see International cyber law: interactive toolkit:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)