This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (5/5 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/5 playlist item notes are private)
|1||Show/Hide More||Lawrence B. Solum, Models of Internet Governance, Illinois Public Law Research Paper No. 07-25, U Illinois Law & Economics Research Paper No. LE08-027, September 3, 2008|
|2||Show/Hide More||Robert Knake, Internet Governance in an Age of Cyber Insecurity, Council on Foreign Relations, September 2010|
|3||Show/Hide More||Jeremy Ferwerda, Nazli Choucri, and Stuart Madnick, Institutional Foundations for Cyber Security: Current Responses and New Challenges, Working Paper CISL# 2011-05, May 2011|
|4||Show/Hide More||Jack Goldsmith, Cybersecurity Treaties: A Skeptical View, Future Challenges in National Security and Law, February 2011|
|5||Show/Hide More||Abraham D. Sofaer, David Clark, and Whitfield Diffie, Cyber Security and International Agreements, Proceedings of a Workshop on Deterring Cyberattacks, pp. 179-206, 2010|
May 21, 2013
Jack Goldsmith and a Berkman Center Cybersecurity Team
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at firstname.lastname@example.org. Thank you.