Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader Nov 2022

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader

Vanderbilt Journal of Transnational Law

On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …


Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple Jan 2022

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple

Georgia Journal of International & Comparative Law

No abstract provided.


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight Jan 2022

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …