Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cyber Weapons and Export Control: Incorporating Dual Use with the PrEP Model
by
Rosenzweig, Paul
, Herr, Trey
in
Computer viruses
/ Internet
/ National security
/ Propagation
/ Regulation
/ Weapons
2016
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cyber Weapons and Export Control: Incorporating Dual Use with the PrEP Model
by
Rosenzweig, Paul
, Herr, Trey
in
Computer viruses
/ Internet
/ National security
/ Propagation
/ Regulation
/ Weapons
2016
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cyber Weapons and Export Control: Incorporating Dual Use with the PrEP Model
Journal Article
Cyber Weapons and Export Control: Incorporating Dual Use with the PrEP Model
2016
Request Book From Autostore
and Choose the Collection Method
Overview
To date, our definition is an extensional one - we characterize a cyber tool (such as malware) as a weapon if it is used in a warfare-like manner. [...]the drafters of the Tallinn Manual characterize a cyber weapon by the effects it may have, rather than by its nature or components, or means of operation or construction.5 But that sort of ex post definition is unsatisfactory for a host of reasons. Yet, as we have said, no definition of a cyber weapon exists today other than a definition that operates only through practical application. [...]a definition \"may provide a basis for a more objective determination of the nature of activities in cyberspace,\"6 and would form the basis of a larger cyber weapons proliferation control enterprise.
Publisher
University of the Pacific, McGeorge School of Law
Subject
This website uses cookies to ensure you get the best experience on our website.