This module is a resource for lecturers
The following readings are (mostly open source) required readings that should be completed before taking a class based on this Module:
- Broadhurst, Roderic, Woodford-Smith, Hannah, Maxim, Donald, Sabol, Bianca, Orlando, Stephanie, Benjamin, Chapman-Schmidt, and Mamoun Alazab. (2017). Cyber Terrorism: Research Review. Research Report of the Australian National University Cybercrime Observatory for the Korean Institute of Criminology.
- Denning, Dorothy E. (2015). The Rise of Hacktivism. Georgetown Journal of International Affairs, 8 September 2015.
- Fidler, David P. (2012). Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous than you think. International Journal of Critical Infrastructure Protection, Vol. 5(1), 28-29.
- Gu, Lion, Vladimir Kropotov, and Fyodor Yarochkin. (2018). The Fake News Machine How Propagandists Abuse the Internet and Manipulate the Public.
- Letter of the Special Rapporteur on Freedom of Expression to Pakistan of 14 December 2015. (2015). Mandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
- Li, X. (2013). Hacktivism and the First Amendment: Drawing the Line Between Cyber Protests and Crime. Harvard Journal of Law & Technology, 27, 301-330.
- Liu, Ian Yuying. (2017). The due diligence doctrine under Tallinn Manual 2.0. Computer Law and Security Review, Vol. 33(3), 390-395.
- Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press. Chapter 14.
- Prier, Jarred. (2017). Commanding the Trend Social Media as Information Warfare. Strategic Studies Quarterly, Vol. 11(4), 50-85.
- Schmitt, Michael N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.
- UNIDIR. (2018). Preventing and Mitigating ICT-Related Conflict Cyber Stability Conference 2018: Summary Report.
- UNIDIR. (2017). The United Nations, Cyberspace and International Peace and Security Responding to Complexity in the 21st Century.
- UNODC. (forthcoming). Counter-Terrorism Legal Training Curriculum Module "Counter-terrorism in the International Law Context".
- Ziolkowski, Katharina. (2013). Peacetime Cyber Espionage - New Tendencies in Public International Law. In Katharina Ziolkowski (ed.). Peacetime Regime for State Activities in Cyberspace International Law, International Relations and Diplomacy (pp. 425-464). NATO Cooperative Cyber Defence Centre of Excellence.
Next: Advanced reading