Este módulo es un recurso para los catedráticos
Lecturas principales
Las siguientes lecturas (en su mayoría de código abierto) son lecturas obligatorias que se deben realizar antes de tomar una clase basada en este módulo:
- Broadhurst, Roderic, Woodford-Smith, Hannah, Maxim, Donald, Sabol, Bianca, Orlando, Stephanie, Benjamin, Chapman-Schmidt, and Mamoun Alazab. (2017). Cyber Terrorism: Research Review. Research Report of the Australian National University Cybercrime Observatory for the Korean Institute of Criminology.
- Denning, Dorothy E. (2015). The Rise of Hacktivism. Georgetown Journal of International Affairs, 8 September 2015.
- Fidler, David P. (2012). Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous than you think. International Journal of Critical Infrastructure Protection, Vol. 5(1), 28-29.
- Gu, Lion, Vladimir Kropotov, and Fyodor Yarochkin. (2018). The Fake News Machine How Propagandists Abuse the Internet and Manipulate the Public.
- Letter of the Special Rapporteur on Freedom of Expression to Pakistan of 14 de diciembre de 2015. (2015). Mandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
- Li, X. (2013). Hacktivism and the First Amendment: Drawing the Line Between Cyber Protests and Crime. Harvard Journal of Law & Technology, 27, 301-330.
- Liu, Ian Yuying. (2017). The due diligence doctrine under Tallinn Manual 2.0. Computer Law and Security Review, Vol. 33(3), 390-395.
- Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press. Chapter 14.
- Prier, Jarred. (2017). Commanding the Trend Social Media as Information Warfare. Strategic Studies Quarterly, Vol. 11(4), 50-85.
- Schmitt, Michael N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.
- UNIDIR. (2018). Preventing and Mitigating ICT-Related Conflict Cyber Stability Conference 2018: Summary Report.
- UNIDIR. (2017). The United Nations, Cyberspace and International Peace and Security Responding to Complexity in the 21st Century.
- UNODC. (forthcoming). Counter-Terrorism Legal Training Curriculum Module "Counter-terrorism in the International Law Context".
- Ziolkowski, Katharina. (2013). Peacetime Cyber Espionage - New Tendencies in Public International Law. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 425-464). NATO Cooperative Cyber Defence Centre of Excellence.