List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
No edit summary
No edit summary
Line 55: Line 55:
** [[Internationally wrongful act]]
** [[Internationally wrongful act]]
*** [[Attribution]]
*** [[Attribution]]
**** State organs
**** Non-State actors
**** Evidence
*** [[Breach of an international obligation]]
*** [[Breach of an international obligation]]
*** Responses and justifications
*** Responses and justifications
Line 65: Line 68:
***** [[Necessity]]
***** [[Necessity]]
**** [[Retorsion]]
**** [[Retorsion]]
* [[Non-state actors]]
* Specialised regimes
* Specialised regimes
** [[International human rights law]]
** [[International human rights law]]

Revision as of 13:54, 10 October 2018

About the project

Main page (to include following info in frames: infographic for all scenarions [a la flag set]; "did you know..."/other trivia [a la Wikipedia Main Page]; about the project; one more)

About the project

FAQ

Note on the structure of articles

Editing rules

Glossary

Bibliography

Toolkit macrostructure (to be removed at some point)

Scenarios

Naming convention: S01: Election interference through cyber means

Order of scenarios to be finalized to broadly correspond to areas of law covered (as in section below), they must be listed in ascending numerical order (i.e. S01, S02, S03....)

Scenario 01: Election interference

Scenario 02: Cyber espionage against government departments

Scenario 03: Cyber attack against the power grid

Scenario 04: A State’s failure to assist an international organization

Scenario 05: State investigates and responds to cyber operations against private actors in its territory

Scenario 06: Cyber countermeasures against an enabling State

Scenario 07: Leak of State-developed hacking tools

Scenario 08: Certificate authority hack

Scenario 09: Economic cyber espionage

Scenario 10: Cyber weapons review

Scenario 12: Cyber operations against computer data

Scenario 13: Cyber operations as a trigger of the law of armed conflict

Areas of law

Each of these titles will link to an article containing a "frame" that may then be used (by way of transclusion) in several individual scenarios. Each such article must contain a list of scenarios in which the frame is used. Each frame will be designed to resemble frames used on Wikipedia Main Page, if possible, they will be yellow in colour and contain an icon representing the idea being described (eg a crown like this one for sovereignty).

General international law

Peacetime cyber operations

what else can we put here?

Use of force and law of armed conflict

Real-world examples

Keywords

TO BE ORGANIZED AS CATEGORY PAGES - LEVEL 1: LIST OF ALL KEYWORDS; LEVEL 2: EACH KEYWORD IS A CATEGORY WHICH CONTAINS (USUALLY) DEFINITION OF THE TERM; ALL (OTHER) ARTICLES WHICH CONTAIN KEYWORD

List of keywords