Skip to main content
  • Utility Menu
  • Search

cyberlawprogramhujilogo
The Federmann Cyber Security Research Center – Cyber Law Program

  • https://www.facebook.com/HUJICyberLaw
  • https://twitter.com/HUJICyberLaw
  • https://www.linkedin.com/in/federmann-cyber-law-program/
  • https://www.youtube.com/channel/UCN44F32RgFrdix_grZYiGcA
  • Subscribe
  • Contact Us
  • Home
  • About
    • About The Center
    • Funders and Partners
    • Galleries
    • Newsroom
  • People
    • Faculty
    • Research Associates
    • Research Fellows
    • Visiting Scholars
    • Administration
    • Advisory Board
    • Past Members
  • The Clinic
    • About the Clinic
    • Activity of the Clinic
    • Database
    • People of the Clinic
  • Research
    • Current Research
    • Individual Research
    • Research Fellows Program
    • Research Groups
      • Cyber-Conflicts in the Middle-East
      • Regulation of Cyber Security Standards for Private Market
      • The Internet of Things – Chevruta Study Group
    • Past Research
    • Law and Cyberspace
  • Resources
    • Cyber Centers and Relevant Links
    • Calls for Funding
    • Blogs
    • Courses
    • Employment @ CyberLaw
    • Lex Cybernetica Podcast
  • Events
    • Upcoming Conferences
    • Cyberlaw Program Workshop
    • CyberLunch
    • Ethics & Technology
    • The Future is Here
  • Publications
    • Cyberlaw Blogospace
    • Newsletters

Galleries

    • View larger image
      photo-2019-06-06-11-19-35.jpg
    When Practice Meets the Academy: Digital Activism
    [8]
    • View larger image
      img_5590.jpg
    Regulation of Cryptocurrencies
    [3]
    • View larger image
      20190522_152149.jpg
    The King’s New Sword: Predictive Algorithms and the Threat of Overextending International Humanitarian Law’s Preventative Logic / Eitan Diamond
    [3]
    • View larger image
      img_5516.jpg
    The Chilling Effect of Governance-by-Data on Data Driven Innovation / Prof. Niva Elkin-Koren
    [5]
    • View larger image
      20190402_165901.jpg
    The Future is Here – Child Protection, Surveillance and Children Rights
    [4]
    • View larger image
      20190326_1627510.jpg
    Bots Flock to the Polls: The Use of Technology Tools for the Purpose of Shaping Public Opinion During Elections
    [14]
    • View larger image
      photo-2019-02-26-10-38-20.jpg
    Cybersecurity Executive Training 2019
    [15]
    • View larger image
      img_5466.jpg
    Regulating Military Applications of Cyber Enhancement of Humans
    [5]
    • 5
      5_02.jpeg
    Enhancing Cyber Security – The Role of Innovation Ecosystems
    [12]
    • View larger image
      8.jpg
    Challenges of Cyber Security Legislation – On the New Draft Cybersecurity Law
    [13]

Pages

  • first
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
  • last
  • About The Center
  • Funders and Partners
  • Galleries
  • Newsroom

1e1de48adbcdeb538784139ac5c48165

Admin Login
OpenScholar

The Hebrew University websites utilize cookies to enhance user experience and analyze site usage. By continuing to browse these sites, you consent to our use of cookies.