Skip to main content
  • Utility Menu
  • Search

Cyber_Logohuji_logo
The Federmann Cyber Security Center – Cyber Law Program

  • https://www.facebook.com/HUJICyberLaw
  • https://twitter.com/HUJICyberLaw
  • https://www.youtube.com/channel/UCN44F32RgFrdix_grZYiGcA
  • Subscribe
  • Contact Us
  • Home
  • About
    • About The Center
    • Funders and Partners
    • Galleries
    • Newsroom
  • People
    • Faculty
    • Research Associates
    • Research Fellows
    • Visiting Scholars
    • Administration
    • Advisory Board
    • Past Members
  • The Clinic
    • About the Clinic
    • File a Complaint to the Clinic
    • Activity of the Clinic
    • People of the Clinic
  • Research
    • Current Research
    • Individual Research
    • Research Fellows Program
    • Research Groups
      • Cyber-Conflicts in the Middle-East
      • Regulation of Cyber Security Standards for Private Market
      • The Internet of Things – Chevruta Study Group
    • Past Research
    • Law and Cyberspace
  • Resources
    • Cyber Centers and Relevant Links
    • Calls for Funding
    • Courses
    • Employment @ CyberLaw
    • Lex Cybernetica Podcast
  • Publications
    • Cyberlaw Blogospace
    • Newsletters
    • Publications
  • Events
    • Upcoming Conferences
    • Cyberlaw Program Workshop
    • CyberLunch
    • The Future is Here

Current Research

  • Agent-Based Model for Radicalization
  • AI Policy Document – Human, Intellect, Machine and State
  • An Analysis of Human Rights Future Violations using Google Trends
  • Cyber Threats to 'Smart Cars'
  • Cybersecurity Breaches and Legal Liability Under Private Law
  • Democracy in Danger: Information manipulation, election intervention and organized "fake news"
  • Encryption Rights
  • Missing person project
  • NSM Activity and Behaviors of Terrorists
  • Pocket Security: Smartphone Cybercrime in the Wild
  • Prevention of Computer Focused Crimes
  • Re-conceptualizing Digital Rights
  • Regulation Of Communication Networks Surveillance
  • Regulating Military Applications of Cyber Enhancement of Humans
  • The Prospects for an International Attribution Mechanism for Cyber Operations
  • Current Research
  • Individual Research
  • Research Fellows Program
  • The Internet of Things – Chevruta Study Group
  • Regulation of Cyber Security Standards for Private Market – Research Group
  • Research Group on Cyber-Conflicts in the Middle-East
  • Past Research
  • Law and Cyberspace
Admin Login
OpenScholar