Skip to main content
  • Utility Menu
  • Search

cyberlawprogramhujilogo
The Federmann Cyber Security Research Center – Cyber Law Program

  • https://www.facebook.com/HUJICyberLaw
  • https://twitter.com/HUJICyberLaw
  • https://www.linkedin.com/in/federmann-cyber-law-program/
  • https://www.youtube.com/channel/UCN44F32RgFrdix_grZYiGcA
  • Subscribe
  • Contact Us
  • Home
  • About
    • About The Center
    • Funders and Partners
    • Galleries
    • Newsroom
  • People
    • Faculty
    • Research Associates
    • Research Fellows
    • Visiting Scholars
    • Administration
    • Advisory Board
    • Past Members
  • The Clinic
    • About the Clinic
    • Activity of the Clinic
    • Database
    • People of the Clinic
  • Research
    • Current Research
    • Individual Research
    • Research Fellows Program
    • Research Groups
      • Cyber-Conflicts in the Middle-East
      • Regulation of Cyber Security Standards for Private Market
      • The Internet of Things – Chevruta Study Group
    • Past Research
    • Law and Cyberspace
  • Resources
    • Cyber Centers and Relevant Links
    • Calls for Funding
    • Blogs
    • Courses
    • Employment @ CyberLaw
    • Lex Cybernetica Podcast
  • Events
    • Upcoming Conferences
    • Past Conferences
    • Cyberlaw Program Workshop
    • CyberLunch
    • Ethics & Technology
    • The Future is Here
  • Publications
    • Cyberlaw Blogospace
    • Newsletters

Past Research

  • Cybersecurity Breaches and Legal Liability Under Private Law – Guy Pessach
  • International Attribution Mechanism - Yuval Shany, Michael Schmitt, Paul Ducheine, Yaël Ronen, Dan Efrony and Jack Kenny
  • Some Procedural Dimensions of Attributing Cyber Operations to States – Yaël Ronen
  • Cyberwar, International Law, and the Tallinn Manual – Nimrod Karin
  • No More Humans? Enhanced Soldiers as a Weapon, Means or Method of Warfare – Thibault Moulin
  • Alternative Enforcement For Content Related Offences – Haim Wismonsky
  • Are we Human. Are we Robot – Amit Rechavi, David Maimon and Tamar Berenblum
  • Cyber-crimes in the International Criminal Court: What is and What Ought to be – Adi Libsker-Hazut
    • Democracy in Danger – Ron Shamir and Eli Bahar
  • Hackers Topology Matter – Amit Rechavi, David Maimon and Tamar Berenblum
  • Labour Rights in the Internet Age – Tammy Katsabian
  • Online Bullying and Online Harassment – Haim Wismonsky
  • Online Shaming – Michal Lavi
  • Product Liability in the Age of Connected Devices and Artificial Intelligence – Omri Rachum-Twaig
  • Reconstruction and Analysis of an International Hacking Network – Amit Rechavi, David Maimon and Tamar Berenblum
  • Regulation Of Communication Networks Surveillance – Yuval Shany and Amir Cahane
  • Tallinn Manual on Cyber Operations & Laws of War – Yuval Shany, Dan Efrony and Michael Schmitt
  • The Future of Law, Business and Finance: Cryptocurrencies – Hadar Jabotinsky
  • Current Research
  • Individual Research
  • Research Fellows Program
  • The Internet of Things – Chevruta Study Group
  • Regulation of Cyber Security Standards for Private Market – Research Group
  • Research Group on Cyber-Conflicts in the Middle-East
  • Past Research
  • Law and Cyberspace
Admin Login
OpenScholar