Skip to main content
  • Utility Menu
  • Search

cyberlawprogramhujilogo
The Federmann Cyber Security Research Center – Cyber Law Program

  • https://www.facebook.com/HUJICyberLaw
  • https://twitter.com/HUJICyberLaw
  • https://www.linkedin.com/in/federmann-cyber-law-program/
  • https://www.youtube.com/channel/UCN44F32RgFrdix_grZYiGcA
  • Subscribe
  • Contact Us
  • Home
  • About
    • About The Center
    • Funders and Partners
    • Galleries
    • Newsroom
  • People
    • Faculty
    • Research Associates
    • Research Fellows
    • Visiting Scholars
    • Administration
    • Advisory Board
    • Past Members
  • The Clinic
    • About the Clinic
    • Activity of the Clinic
    • Database
    • People of the Clinic
  • Research
    • Current Research
    • Individual Research
    • Research Fellows Program
    • Research Groups
      • Cyber-Conflicts in the Middle-East
      • Regulation of Cyber Security Standards for Private Market
      • The Internet of Things – Chevruta Study Group
    • Past Research
    • Law and Cyberspace
  • Resources
    • Cyber Centers and Relevant Links
    • Calls for Funding
    • Blogs
    • Courses
    • Employment @ CyberLaw
    • Lex Cybernetica Podcast
  • Events
    • Upcoming Conferences
    • Cyberlaw Program Workshop
    • CyberLunch
    • Ethics & Technology
    • The Future is Here
  • Publications
    • Cyberlaw Blogospace
    • Newsletters

Past Research

  • Cybersecurity Breaches and Legal Liability Under Private Law – Guy Pessach
  • International Attribution Mechanism - Yuval Shany, Michael Schmitt, Paul Ducheine, Yaël Ronen, Dan Efrony and Jack Kenny
  • Some Procedural Dimensions of Attributing Cyber Operations to States – Yaël Ronen
  • Cyberwar, International Law, and the Tallinn Manual – Nimrod Karin
  • No More Humans? Enhanced Soldiers as a Weapon, Means or Method of Warfare – Thibault Moulin
  • Alternative Enforcement For Content Related Offences – Haim Wismonsky
  • Are we Human. Are we Robot – Amit Rechavi, David Maimon and Tamar Berenblum
  • Cyber-crimes in the International Criminal Court: What is and What Ought to be – Adi Libsker-Hazut
    • Democracy in Danger – Ron Shamir and Eli Bahar
  • Hackers Topology Matter – Amit Rechavi, David Maimon and Tamar Berenblum
  • Labour Rights in the Internet Age – Tammy Katsabian
  • Online Bullying and Online Harassment – Haim Wismonsky
  • Online Shaming – Michal Lavi
  • Product Liability in the Age of Connected Devices and Artificial Intelligence – Omri Rachum-Twaig
  • Reconstruction and Analysis of an International Hacking Network – Amit Rechavi, David Maimon and Tamar Berenblum
  • Regulation Of Communication Networks Surveillance – Yuval Shany and Amir Cahane
  • Tallinn Manual on Cyber Operations & Laws of War – Yuval Shany, Dan Efrony and Michael Schmitt
  • The Future of Law, Business and Finance: Cryptocurrencies – Hadar Jabotinsky
  • Current Research
  • Individual Research
  • Research Fellows Program
  • The Internet of Things – Chevruta Study Group
  • Regulation of Cyber Security Standards for Private Market – Research Group
  • Research Group on Cyber-Conflicts in the Middle-East
  • Past Research
  • Law and Cyberspace
Admin Login
OpenScholar

The Hebrew University websites utilize cookies to enhance user experience and analyze site usage. By continuing to browse these sites, you consent to our use of cookies.