|
|
1 | (36) |
|
1.1 Purpose and Principles of Law |
|
|
1 | (3) |
|
1.1.1 Salmond on the Classifications of Law |
|
|
2 | (1) |
|
|
2 | (2) |
|
|
4 | (6) |
|
1.2.1 Natural Law Jurisprudence: Observation and Realization |
|
|
5 | (1) |
|
1.2.2 Analytical Jurisprudence: Definition and Clarification |
|
|
6 | (3) |
|
1.2.3 Normative Jurisprudence: Evaluation and Reformation |
|
|
9 | (1) |
|
|
10 | (3) |
|
1.3.1 Legislation/Statutory Law |
|
|
10 | (1) |
|
1.3.2 Legal Precedent/Case Law/Common Law |
|
|
11 | (1) |
|
1.3.3 Sources of Legal Influence |
|
|
12 | (1) |
|
|
13 | (4) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
1.4.6 Case Hypothetical: Systems of Law |
|
|
16 | (1) |
|
|
17 | (3) |
|
1.5.1 International Law vs Domestic Law |
|
|
17 | (1) |
|
1.5.2 Recognition of Sovereignty |
|
|
18 | (1) |
|
1.5.3 Public Law versus Private Law |
|
|
19 | (1) |
|
1.5.4 Case Hypothetical: Categories of Law |
|
|
19 | (1) |
|
|
20 | (7) |
|
|
21 | (3) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
1.6.6 Case Hypothetical: Legal Governance |
|
|
27 | (1) |
|
|
27 | (4) |
|
1.7.1 Division of Jurisdictional Powers |
|
|
29 | (1) |
|
1.7.2 Branches of Legal Governance |
|
|
30 | (1) |
|
|
31 | (6) |
|
|
32 | (5) |
|
2 Property and Privacy in Context |
|
|
37 | (22) |
|
2.1 Perceptions of Property |
|
|
37 | (1) |
|
2.2 Ownership, Possession, and Interest |
|
|
38 | (6) |
|
2.2.1 Distinguishing Ownership from Possession |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (2) |
|
|
41 | (2) |
|
2.2.5 Case Hypothetical: Ownership, Possession, and Interest |
|
|
43 | (1) |
|
|
44 | (7) |
|
2.3.1 Classifications of Property |
|
|
45 | (2) |
|
2.3.2 Private Property Versus Public Property |
|
|
47 | (1) |
|
|
47 | (1) |
|
2.3.4 Differentiating Personal from Private |
|
|
47 | (2) |
|
2.3.5 Legislative Example: Canadian Consumer Privacy Protection |
|
|
49 | (1) |
|
2.3.6 Case Hypothetical: Consumer Privacy Protection |
|
|
50 | (1) |
|
2.4 The Intersection of Property, Privacy, and Cybersecurity Law |
|
|
51 | (4) |
|
2.4.1 Criminal Law/Statutory Law |
|
|
52 | (1) |
|
2.4.2 Tort Law/Common Law |
|
|
53 | (1) |
|
2.4.3 Case Hypothetical: Intersection of Criminal and Tort Law |
|
|
53 | (2) |
|
|
55 | (4) |
|
|
56 | (3) |
|
3 Cybersecurity and Cybercrimes |
|
|
59 | (38) |
|
3.1 Categorizing Cybercrimes |
|
|
59 | (32) |
|
3.1.1 Cyber-Enabled Offences (On/Offline) |
|
|
60 | (5) |
|
3.1.2 Cyber-Dependent Offences (Online) |
|
|
65 | (15) |
|
3.1.3 Computer/Cyber-Supported Offences |
|
|
80 | (5) |
|
3.1.4 National (Cyber)Security Offences |
|
|
85 | (6) |
|
3.2 Growing Prevalence of Cybercrime |
|
|
91 | (1) |
|
3.3 Categorizing Cybercrimes in the Law |
|
|
91 | (2) |
|
|
93 | (4) |
|
|
95 | (2) |
|
|
97 | (40) |
|
4.1 Review of Canadian Cybersecurity Laws |
|
|
98 | (4) |
|
4.1.1 Regulating Governmental Relationships |
|
|
98 | (1) |
|
4.1.2 Regulating Businesses, Organizations, and Commercial Enterprises |
|
|
99 | (1) |
|
4.1.3 Regulating Interpersonal Relationships and Criminal Activities |
|
|
100 | (2) |
|
4.2 Review of Australian Cybersecurity Laws |
|
|
102 | (6) |
|
4.2.1 Regulating Governmental, Business, and Organizational Relationships |
|
|
102 | (3) |
|
4.2.2 Regulating Interpersonal Relationships and Criminal Activities |
|
|
105 | (3) |
|
4.3 Review of United Kingdom Cybersecurity Laws |
|
|
108 | (2) |
|
4.3.1 Regulating Government, Businesses, and Organizations |
|
|
108 | (1) |
|
4.3.2 Regulating Interpersonal Relationships and Criminal Activities |
|
|
109 | (1) |
|
4.4 Review of United States Cybersecurity Laws |
|
|
110 | (4) |
|
4.4.1 Regulating the Federal Government and Governmental Agencies |
|
|
111 | (1) |
|
4.4.2 Regulating Sector-Specific Industries: Healthcare |
|
|
111 | (1) |
|
4.4.3 Regulating Sector-Specific Industries: Banks/Financial Institutions |
|
|
112 | (1) |
|
4.4.4 Regulating Interpersonal Relationships and Criminal Activities |
|
|
113 | (1) |
|
4.5 Common Law Countries, in Brief |
|
|
114 | (1) |
|
4.6 National Considerations |
|
|
115 | (6) |
|
4.6.1 Identity and Diversity |
|
|
115 | (3) |
|
4.6.2 Identity in Politics |
|
|
118 | (3) |
|
4.6.3 Constitutional Values |
|
|
121 | (1) |
|
4.7 International Considerations |
|
|
121 | (14) |
|
4.7.1 Treaties and International Agreements |
|
|
123 | (2) |
|
4.7.2 The Tallinn Manual and Cyber Warfare |
|
|
125 | (8) |
|
4.7.3 International Legal Principles in Cyberspace |
|
|
133 | (1) |
|
4.7.4 International Dispute Resolution |
|
|
133 | (2) |
|
|
135 | (2) |
|
|
135 | (2) |
|
|
137 | (42) |
|
5.1 Globalization and Jurisdictionally |
|
|
137 | (5) |
|
5.1.1 Determining Jurisdiction |
|
|
138 | (1) |
|
5.1.2 Online Jurisdiction |
|
|
139 | (1) |
|
5.1.3 Case Hypothetical: Jurisdiction |
|
|
139 | (3) |
|
5.2 Digital Marketplaces and the Consumer |
|
|
142 | (6) |
|
5.2.1 Rights of the Consumer in the Global Marketplace |
|
|
142 | (2) |
|
5.2.2 Commercial Electronic Messages |
|
|
144 | (2) |
|
5.2.3 International Commercial Application |
|
|
146 | (2) |
|
5.3 Anonymized DarkNet Markets and Cryptocurrencies |
|
|
148 | (17) |
|
5.3.1 Illegal Content and Dark Web Marketplaces |
|
|
150 | (3) |
|
5.3.2 Differentiating the Dark from the Deep |
|
|
153 | (6) |
|
|
159 | (1) |
|
5.3.4 Corporate Considerations |
|
|
160 | (5) |
|
5.4 Challenges to Law Enforcement |
|
|
165 | (6) |
|
|
166 | (1) |
|
5.4.2 Detection, Tracing and Localization |
|
|
166 | (2) |
|
5.4.3 Jurisdiction and Enforcement |
|
|
168 | (1) |
|
5.4.4 Digital Evidence Collection |
|
|
168 | (1) |
|
5.4.5 Example in Law: Canada's Evidence Act |
|
|
169 | (1) |
|
5.4.6 Case Hypothetical: Challenges to Law Enforcement |
|
|
170 | (1) |
|
5.5 Digital Sovereignty and Data Governance |
|
|
171 | (4) |
|
5.5.1 Challenges to Digital Sovereignty in International Cyber Law |
|
|
171 | (1) |
|
5.5.2 Online Content Regulation |
|
|
172 | (1) |
|
5.5.3 Digital Content Creation and the Gig Economy |
|
|
172 | (3) |
|
|
175 | (1) |
|
|
175 | (4) |
|
|
176 | (3) |
Conclusion |
|
179 | |