Araştırma Makalesi
BibTex RIS Kaynak Göster

SİBER GÜVENLİKTE TAM KORUMA VE GÜVENLİK (FPS) STANDARDINI UYGULAMA GEREKLİLİĞİ: DİJİTAL VARLIKLAR

Yıl 2023, Cilt: I Sayı: 1, 15 - 68, 24.10.2023

Öz

Bu makale siber güvenlik ve siber tehditlere genel bir bakışı tartışacaktır ancak diğer siber güvenlik koruma alanlarından daha çok internet sitesi ve bilgisayar formunda siber saldırıların dijital boyutlarına odaklanacaktır. Fakat siber güvenliğin BIT’lere dahil edilmesi ihtimalinin detaylarına inmeden önce, bu bağlamda devlet egemenliği, yargı yetkisi ve siber altyapı üzerinde kontrol ve siber faaliyetlerden devletin tipik uluslararası hukuk sorumluluğu ile ilgili bu meselelere ek olarak ilk olarak yabancı ülkelerden gelen siber tehditleri ele almak uygun olacaktır. Bazı siber saldırılar yurt dışı kaynaklı olmaları ile bilindiğinden bu husus önemlidir. Bu makale, çok merkezli yönetim merceğinden küresel siber güvenliği arttırmak için BIT’lerin ve ticaret anlaşmalarının kullanılabilirliğinin analizleri ile oluşturulacaktır.

Kaynakça

  • 20th Global Information Security Survey 2017–18, Cybersecurity regained: preparing to face cyber attacks, <https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/digital/ey-cybersecurity-regained-preparing-to-face-cyber-attacks.pdf> accessed 20 June 2023
  • Accordance with International Law of the Unilateral Declaration of Independence in Respect of Kosovo [2010] I.C.J. Rep. 403
  • ADF Group Inc v US ICSID Case No. ARB(AF)/00/1 (NAFTA), Award, 9 January 2003
  • Agreement between Japan and the Republic of Colombia for the Liberalisation, Promotion and Protection of Investment (12 September 2011), <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/797/download> accessed on 5 May 2023
  • Agreement between Japan and the Republic of Peru for the Promotion, Protection and Liberalisation of Investment article10 (21 Nov. 2008), <https://www.iisd.org/toolkits/sustainability-toolkit-for-trade-negotiators/wp-content/uploads/2016/06/1733.pdf> accessed on 5 May 2023
  • Agreement on Trade-Related Aspects of Intellectual Property Rights, Annex 1C of the Marrakesh Agreement Establishing the World Trade Organisation, (Marrakesh, Morocco 15 April 1994), available at: <https://www.wto.org/english/docs_e/legal_e/27-trips_01_e.htm>
  • Agreements II 24. <http://unctad.org/en/Docs/diaeia20102_en.pdf> accessed on 17 April 2023
  • Alperovitch D., ‘Reveal: Operation Shady Rat’ (McAfee, 6 Sep. 2011), <http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf> accessed 2 May 2023
  • American Law Institute Third Restatement of Foreign Relations Law Section 402(1) (C) (1987)
  • AMT v Democratic Republic of Congo, ICSID Case No. ARB/93/1, Award, 21 February 1997
  • Asian Agricultural Products v Republic of Sri Lanka, (1990) ICSID case No. ARB/87/3. Final Award
  • August R., ‘International Cyber-Jurisdiction: A Comparative Analysis’ (2002), America Business Law Journal 531
  • Azurix and Argentina (2006), ICSID Case No. ARB/01/12, Award, 14 July 2006
  • Baker S., Waterman S. and Ivanov G., ‘In the Crossfire: Critical Infrastructure in the Age of Cyber War’ < https://www.govexec.com/pdfs/012810j1.pdf > accessed 13 July 2023
  • Ball J., Borger J. and Greenwald G., ‘Revealed: how US and UK spy agencies defeat internet privacy and security’, The Guardian (6 September 2013) <https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security> accessed 25 June 2023
  • BBC, ‘China Hit by “Biggest Ever” Cyber-Attack’ BBC News (27 Aug. 2013), <http://www.bbc.co.uk/news/technology-2385041> accessed 2 May 2023
  • BBC, ‘Cybercrime Threat on the Rise, Says PwC Report’, BBC News (26 March 2012) <http://www.bbc.co.uk/news/business-17511322> accessed 12 April 2023
  • BBC, ‘NHS cyber-attack: GPs and hospitals hit by ransomware’ BBC News (13 May 2017) <https://www.bbc.com/news/health-39899646>
  • Bello J.H, Editorial Comment, ‘The WTO Dispute Settlement Understanding: Less Is More’, (1996) 90 Am. J. INT’L L. 416
  • Berger A., ‘Investment Rules in Chinese Preferential Trade and Investment Agreements: Is China Following the Global Trend Towards Comprehensive Agreement?’ (2013) 7 German Dev. Inst, 1. <http://www.die-gdi/uplots/media/DP_7.2013.pdf> accessed on 5 May 2023
  • Bernhard von Pezold and others v Republic of Zimbabwe [2015] ICSID Case No. ARB/10/15, para. 597
  • Bilateral Investment Treaty between Argentina and United States of America 1991 (Investment Policy Hub,20 October 1994) <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/127/download> accessed 20 June 2023
  • Bilateral Investment Treaty between Canada and Peru, (Investment Policy Hub, 20 June 2006), Article 1. <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/626/download> accessed 21 May 2023
  • Bilateral Investment Treaty between Germany and Bosnia and Herzegovina 2001. (Investment Policy Hub,11 November 2007) < https://investmentpolicy.unctad.org/international-investment-agreements/treaties/bit/606/bosnia-and-herzegovina---germany-bit-2001-> accessed on 14 April 2023
  • Bilateral Investment Treaty between Poland and United States of America 1990 (Investment Policy Hub, 6 August 1994) <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/5339/download> accessed 20 July 2023
  • Bilateral Investment Treaty between Ukraine and Denmark, (Investment Policy Hub,29 April 1994) <https://investmentpolicy.unctad.org/international-investment-agreements/treaties/bit/1291/Denmark---ukraine-bit-1992-> accessed 21 May 2023
  • Bryant C., NSA Claims Put German Business on Guard’, FIN. TIMES (1 Nov. 2013) at 4
  • Calia K., Veraneau J. and Fagan D. et al., ‘Economic Espionage and Trade Secret Theft: An Overview of the Legal Landscape and Policy Responses’, (2013), Covington & Burling LLP, 3. <https://bpb-us-e2.wpmucdn.com/wordpress.auburn.edu/dist/8/7/files/2021/01/economic-espionage-and-trade-secret-theft.pdf> accessed on 12 April 2023
  • Carr I. (ed), Computer Crime (Ashgate 2009)
  • Case Concerning United States Diplomatic and Consular Staff in Tehran (US v Iran) [1980], I.C.J Rep. 3, paras 67-68
  • Case of the S.S. ‘Lotus’ (France v Turkey) [1927], P.C.I.J Judgement Series A, No 10
  • Cashell B., Jackson WD., Jickling M., and Webel B., ‘The Economic Impact of Cyber-Attacks Congressional Research Service, the Library of Congress’ (2004), CRS Report for Congress. https://sgp.fas.org/crs/misc/RL32331.pdf accessed 18 May 2023
  • Cha A. E. and Nakashima E., ‘‘Google China Attack Part of Vast Espionage Campaign’ NBC News (14 January 2010) <https://www.nbcnews.com/id/wbna34855470> accessed 20 June 2023
  • Cole D. H., ‘From Global to Polycentric Climate Governance’ (2011) 2 CLIMATE L. 395
  • Collier K., ‘Sen. Ron Wyden on the Problems with the Trans-Pacific Partnership’, DAILY DOT (19 September 2012) <http://www.dailydot.com/politics/ron-wyden-trans-pacific-partnership/> accessed on 5 May 2023
  • Collins D., ‘Applying the Full Protection and Security Standard of International investment Law to Digital Assets’ (2011) 12 Journal of World Investment and Trade 225
  • Congyan C., ‘China-US BIT Negotiations and the Future of Investment Treaty Regime: A Grand Bilateral Bargain with Multilateral Implications’ (2009) 12 J. INT’L L. 457
  • Corfu Channel (United Kingdom of Great Britain and Northern Ireland v. Albania) [1949] I.C.J. Rep, 4
  • Cotula L., ‘Is the Tiding Turning for The Africa’s Investment Treaties?’ (IEDD, 8 March 2013) <http://www.iied.org/tide-turning-for-africa-s-investment-treaties> accessed on 5 May 2023
  • Council of Europe Convention on Cybercrime, Budapest 23. XI.2001, European Treaty – No. 185
  • Council of Europe, Convention on Cybercrime, 23 November 2001, Eur. T.S. No. 185. <https://rm.coe.int/1680081561> accessed 20 May 2023
  • Crelinsten R. D., ‘Terrorism and Counter-Terrorism in a Multi-Centric World: Challenges and Opportunities’ in M. Taylor and J. Hogan (eds), the Future of Terrorism (Routledge 2006)
  • Deighton B. and Breidthardt A., ‘EU confronts U.S. over reports it spies on European allies’, Reuters (30 June 2013) <https://www.reuters.com/article/uk-usa-eu-spying-idUKBRE95S0B720130630> accessed 25 June 2023
  • Dolzer R. and Schreuer C., Principles of International Investment Law (OUP 2008)
  • Draetta U., ‘The Internet and Terrorist Activities’ in A Bianchi (ed), Enforcing International Law Norms against Terrorism (Hart 2004)
  • Draft articles on responsibility of States for internationally wrongful acts, Text adopted by the International Law Commission at its fifty-third session [2001] YILC Vol II Part 2, Articles 1-2. [ARSIWA]
  • Eckert P. and Yukhananov A., ‘U.S., China Agree to Restart Investment Treaty Talks’, Reuters (12 July 2013) <https://www.reuters.com/article/uk-usa-china-dialogue-trade-idUKBRE96B04F20130712> accessed 4 May 2023
  • European Convention on Cybercrime (Budapest Convention 2001) <https://rm.coe.int/1680081561> accessed 5 May 2023
  • Factory at Chorzow (Germany v Poland) (1928) P.C.I.J, Merits, (ser. A) No. 17, 13 September 1928, para. 47 Feldman S. E. and Rollo S. L., ‘Extraterritorial Protection of Trade Secret Rights in China: Do Section 337 Actions at the ITC Really Prevent Trade Secret Theft Abroad?’ (2012) 11 J. Marshall REV.INTELL. PROP. L. 523
  • Khan J. F., ‘Brussels Opposes German Data Protection Push’ FIN. TIMES (5 November 2013)
  • Freeman A.V., ‘Responsibility of States for Unlawful Acts of their Armed Forces’ (1956) 88 Recueil des Courts 261
  • Friedman A.A., ‘Cybersecurity and Trade: National Policies, Global and Local Consequences’ (2013) Brooking Inst. <https://www.brookings.edu/wp-content/uploads/2016/06/BrookingsCybersecurityNEW.pdf> accessed 5 May 2023
  • Garnet R. and Clarke P., ‘Cyber terrorism: A New Challenge in International Law’ in A Bianchi (ed), Enforcing International Law Norms against Terrorism (Hart 2004)
  • Genocide Judgement (Bosnia and Herzegovina v Serbia and Montenegro) [2007] I.C. J. Rep 43
  • Gordon K. and Pohl J., Environment Concerns in International Investment Agreements: A Survey 5 (2011) (OECD Working Papers on International Investment No. 2011/1) <https://www.oecd.org/daf/inv/internationalinvestmentagreements/WP-2011_1.pdf> accessed 5 May 2023
  • Gorman S., ‘Broad New Hacking Attack Detected’ Wall St. Journal (18 Feb. 2010) <https://www.wsj.com/articles/SB10001424052748704398804575071103834150536> accessed 2 May 2023
  • Gross M. J., ‘Enter the Cyber-Dragon’ (Vanity Fair, Sept. 2011) <https://www.vanityfair.com/news/2011/09/chinese-hacking-201109> accessed on 16 April 2023
  • Grow B. and Horsenball M., ‘Special Report: In Cyberspy v Cyberspy, China Has the Edge’, Reuters (Apr 14 2011), <http://www.reuters.com/article/2011/04/14/us-china-usa-cyberespionage-idUSTR73D24220110414> accessed 18 April 2023
  • Gunawardana A. Z., ‘The Inception and Growth of Bilateral Investment Promotion and Protection Treaties’ (1992)86 AM. Soc’v INT’L L. PROC. 544.
  • Guzman A.T., ‘Why LDCs Sign Treaties That Hurt Them: Explaining the Popularity of Bilateral Investment Treaties’ (1998) 38 VA. J. INTL L. 639.
  • Habyyev R. and Kaya S., A Critical Role of Diplomatic Protection in Investor-State Disputes (On İki Levha 2021)
  • Hailing S., The Protection of Trade Secrets in China, (2nd edn, Kluwer Law International 2012)
  • Hardin G., ‘Lifeboat Ethics: The Case Against Helping the Poor’ (1974) PSYCHOL. TODAY SEPT. ICSID Convention, Rules and Regulation 2006, <https://icsid.worldbank.org/sites/default/files/ICSID%20Convention%20English.pdf> accessed 20 June 2023 Interview with Elinor Ostrom, Distinguished Professor, Indiana University-Bloomington, in Bloomington, Ind. (13 October 2010) Island of Palmas (Netherlands v US) [1928] RIAA Vol. II, 829, 838
  • Jacobs A., ‘After Reports on N.S.A, China Urges End to Spying’ New York Times (24 March 2014) <https://www.nytimes.com/2014/03/25/world/asia/after-reports-on-nsa-china-urges-halt-to-cyberspying.html> accessed 2 May 2023
  • Jones A. and Helft M, ‘Google, Citing Attack, Threatens to Exit China’ New York Times (12 January 2010) <https://www.nytimes.com/2010/01/13/world/asia/13beijing.html> accessed 2 May 2023
  • Jones S., Nevile S., Pickard J. and Chaffin J., ‘NHS Hackers Used Stolen Cyber Weapons from US Spy Agency’, Financial Times, FT Weekend (13 May, 2017) <https://www.ft.com/content/e96924f0-3722-11e7-99bd-13beb0903fa3> accessed 20 June 2023
  • Jones S., ‘Cyber security Exports to Face Same Controls as Weapon Sale’, FIN. TIMES (5 December 2013)
  • Kariyawasam R., International Economic Law and Digital Divide: A New Silk Road (Edward Elgar 2007)
  • Kayal N. K., ‘The Dark Side of Private Ordering: The Network/Community Harm of Crime’ in Grady M. F. and Francesco P. (eds), The Law and Economics of Cybersecurity (Cambridge University Press 2006)
  • Keohane R. O. and Victor D. G., ‘The Regime Complex for Climate Change’ (2011) 9(1) Perspective on Politics 19
  • Kishoiyian B., ‘The Utility of Bilateral Investment Treaties in the Formulation of Customary International Law’ (1994)14 Nw. J. INT’L L. & BUS 327
  • Lee D. ‘New York Times and Twitter Struggle After Syrian Hack’, BBC News (28 Aug. 2013) <http://www.bbc.co.uk/news/technology-23862105> accessed 2 May 2023.
  • Lewis J. A., ‘Conflict and Negotiation in Cyberspace’ (2013) CTR. STRATEGIC & INT’L STUD 49
  • LFH Neer and Pauline Neer v United Mexican States, [1926] US-Mexican General Claims Commission, Decision, 4 UNRIAA 60
  • Littman D. and Posner E., ‘Holding Internet Service Providers Accountable’ in Grady M. F. and Francesco P. (eds), The Law and Economics of Cyber Security (Cambridge University Press 2006)
  • Lowrey A., ‘U.S. and China to Discuss Investment Treaty, but Cyber security is a Concern’, New York Times (12 July 2013), <https://www.nytimes.com/2013/07/12/world/asia/us-and-china-to-discuss-investment-treaty-but-cybersecurity-is-a-concern.html > accessed 15 April 2023
  • MacAskill E., ‘Countries Are Risking Cyber Terrorism: Security Expert Tells World Summit’, The Guardian (5 May 2010) <https://www.theguardian.com/technology/2010/may/05/terrorism-uksecurity> accessed 2 May 2023
  • Marble I., The Calculation of Compensation and Damages in International Investment Law (OUP 2009)
  • Mass P. and Rajagopalan M., ‘Does Cybercrime Really Cost $1 Trillion?’, (Propublica, 1 August 2012) <http://www.propublica.org/article/does-cybercrime-really-cost-1-trillion> accessed 12 July 2023
  • McAfee, ‘Protecting Your Critical Assets: Lessons Learned from: Operation Aura’ [2010], McAfee Labs and
  • McAfee Foundstone Professional Services, 3. <http://www.wired.com/images_blogs/threatlevel/2010/03/operationaura_wp_0310_fnl.pdf>accessed 25 April 2023
  • McGauran W., ‘Intended Consequences: Regulating Cyber Attacks’ (2009) 12 Tulane Journal of Technical and Intellectual Property 259
  • McGinnis M. D., ‘Costs and Challenged of Polycentric Governance: An Equilibrium Concepts and Examples from U.S. Health Care’ 1, <http://ssrn.com/abstract=2206980> accessed 6 May 2023
  • McVeigh K., ‘NSA Surveillance Program Violates the Constitution, ACLU Says’ Guardian (27 August 2013) <http://www.theguardian.com/world/2013/aug/27/nsa-surveillance-program-illegal-aclu-lawsuit> accessed 2 May 2023
  • Military and Paramilitary activities against Nicaragua, (Nicaragua v United States of America) [1986] I. C. J. Rep. 14
  • MNSS B.V. and Recupero Credito Acciaio N.V. v Montenegro [2016] ICSID Case No. ARB (AF) 12/8, para 356
  • Moss G. C., ‘Full Protection and Security’ in August Reinisch (ed), Standards of Investment Protection (OUP 2008) 134
  • Mossman M. L., ‘Essay, Enforcement of WTO Rulings: An Interest Group Analysis’ (2013), 32 HOFSTRA L. REV. 1
  • Multilateral Investment Guarantee Agency, ‘Investment Guarantee Guide’ <http://www.miga.org/documents/IGGenglish.pdf.> accessed 5 May 2023
  • Noble Ventures Inc. v Romania (2005) ICSID Case No. ARB, Award, 12 October 2005
  • North Sea Continental Shelf (Federal Republic of Germany v Denmark; F.R.G. V Netherlands) (1969) I.C.J. Rep. 3
  • O’Hara G., ‘Cyber-Espionage: A Growing Threat to the American Economy’ (2010) 19 CommLaw CONSPECTUS 24
  • Opinion of Mr Advocate General Darmon, Joined Cases 89, 104, 114, 116, 117, and 125-9
  • Organisation for Economic Co-operation and Development (OECD), 2002, Art. III.3 <https://www.oecd.org/sti/ieconomy/oecdguidelinesforthesecurityofinformationsystemsandnetworkstowardsacultureofsecurity.htm> accessed 20 June 2023
  • Osakeyhtio and Others v Commission [in re Wood Pulp Cartel] paras 20-1. 1994 E.C.R. 1-100
  • Ostrom E. and Nagendra H., ‘Insights on Linking Forests, Trees, and People from the Air, on the Ground, and in the Laboratory’ (2006) 103 PROC. NAT’L. ACAD. SCL 19224.
  • Ostrom E., ‘Beyond Markets and States: Polycentric Governance of Complex Economic System’ (2010) 100 AM. ECON. REV. 641.
  • Ostrom E., ‘Polycentric Systems for Coping with Collective Action and Global Environmental Change’ (2010) 20 GLOBAL ENVIL. CHANGE 550.
  • Ostrom E., Public Entrepreneurship: A case Study in Ground Water Basin Management (1965) (unpublished Ph.D. dissertation, Univ. Of Calif., Los Angeles)
  • Palmer D. ‘US, EU start free-trade talks despite spying concerns’ Reuters (9 July 2013), <https://www.reuters.com/article/us-usa-eu-trade/us-eu-start-free-trade-talks-despite-spying-concerns-idUSBRE96704F20130708> accessed 20 June 2023.
  • Pantechniki Contactor & Engineers v Albania (2009) ICSID Case No. ARB/07/21, Award, 30 July 2009 Paris Convention for the protection of Industrial Property (1979), available at: <http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.htmlp213_35515>
  • Passeri P., ‘What is a Cyber Weapon?’ (Hackmsgedon, 22 April 2012), <http://www.theguardian.com/world/2013/aug/27/nsa-surveilance-program-illegal-aclu-lawsuit> accessed 12 April 2023
  • Pauwelyn J., ‘Different Means, Same End: The Contribution of Trade and Investment Treaties to Anti-Corruption Policy’ in Susan Rose-Ackerman and Paul D. Carrington (eds), Anti-Corruption Policy: Can International Actors Play a Constructive Role? (Carolina Academic Press 2013)
  • Poeter D., ‘Microsoft Joins Ranks of the Tragically Hacked’, (PCMAG, 22 February 2013,) <www.pcmag.com/articl2/0,2817,2415787,00.asp> accessed 29 April 2023
  • Powers D, ‘Cyber law: The Major Areas, Development and Information Security Aspects’ in H. Bidgoli (ed), Global Perspectives in Information Security (John Wiley and Sons Inc. 2009)
  • Proce D. M. and Smart M. J., ‘BIT by BIT: A Path to Strengthening US-China Economic Relations’ [2013] 1 <http://www.paulsoninstitute.org/wp-content/uploads/2016/07/BIT-by-BIT-English.pdf> accessed 4 May 2023
  • Prosecutor v Dusko Tadic a.k.a. ‘Dule’ [1997] International Criminal Tribunal for Former Yugoslavia, IT-94-1-T Qui T., ‘How Exactly Does China Consent to Investor-State Arbitration: On the First ICSID Case Against China’ (2012) 5 CONTEMPARARY ASIA ARB. J. 265
  • R v Graham Waddon, 2000 WL 41456 (2 April 2000)
  • Rantala R. R., Bureau of Justice Statistics, U.S. Dep’t of Justice NO. NCJ 221943, Cybercrime against Business, 2005 1, 3 (2008), available at: <http://bjs.ojp.usdoj.gov/content/pub/pdf/cb05.pdf>
  • Raustiala K. and Victor D. G., ‘The Regime Complex for Plant Genetic Resources’ (2004) 58 INT’L ORG. 277
  • Report of the International Law Commission on the Work of its Fifty-third Session, Commentary to the Articles on the Responsibility of States for Internationally Wrongful Acts, [2001] YILC Vol. II Part 2. [ARSIWA Commentary]
  • Reuters, ‘US Charges Chinese Wind Company with Stealing Trade Secrets’, (CNBC, 27 June 2012), < http://www.cnbc.com/id/100851053>
  • Rid T., Cyber War Will Not Take Place (OUP 2013)
  • Salacuse, J., The Law of Investment Treaties (OUP 2010)
  • Schachter, O., Editorial Comment, ‘Compensation for Expropriation’ (1984) 78 AM. J. INT’L L. 121
  • Schmitt M. N, Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press 2013)
  • Sergei v Government of Mongolia (2011) Award on Jurisdiction and Liability, 28 April 2011. <https://jusmundi.com/fr/document/decision/en-sergei-paushok-cjsc-golden-east-company-and-cjscvostokneftegaz-company-v-the-government-of-mongolia-award-on-jurisdiction-and-liability-thursday-28th-april-2011> accessed 5 May 2023
  • SGS Societe Generale de Surveillance SA v Islamic Republic of Pakistan [2003] ICSID Case No. ARB/01/13, 13, under the Swiss-Pakistan BIT (entered into force 6 May 1996)
  • Shackelford S. J., Managing Cyber Attacks in International Law, Business and Relations: In Search of Cyber Peace (Cambridge University Press 2014)
  • Shackelford S. J., ‘In Search of Cyber Peace: A Response to the Cyber security Act of 2012’, (2012), 64 STAN. L. REV. ONLINE 106 <http://www.standfordlawreview.org/online/cyber-peace> accessed 6 May 2023
  • Shackelford S. J., ‘From Nuclear War to Net War: Analogizing Cyber Attacks in International Law’, (2009), BERKELEY J. INT’L L. 192
  • Shackelford S. J., ‘Towards Cyber Peace: Managing Cyber Attacks through Polycentric Governance’ (2013) 63 AM. U.L. REV. 1273
  • Shackelford S. J. and et al, ‘Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties’ (2015) 52 (1) American Business Law Review 1
  • Shackkelton S., ‘Estonia Three Years Later: A Progress Report on Combating Cyber Attacks’ [2010] Journal of Internet Law 22
  • Shalhoub Z. K. and AI Qasimi S.L., Cyber Law and Security in Developing and Emerging Economies (Edward Elgar Publishing 2010)
  • Siemens v Argentina [2007] ICSID Case No. ARB/02/6
  • Sornarajah M., The International Law on Foreign Investment (OUP 2010)
  • Sullivan R.. ‘Company: Chinese cyberattack targets Australia’ SMH (15 April 2010 <https://www.smh.com.au/technology/company-chinese-cyberattack-targets-australia-20100415-sh1d.html> accessed 2 May 2023
  • Susan M., ‘The Critical Challenge from International High-Tech and Computer Related Crime at the Millennium’ (2009) Duke Journal of International and Comparative Law 451
  • Swire P. and Ahmad K., ‘Encryption and Globalisation’, (2012), 13 COLUM. SCI. & TECH. L. REV. 416
  • Talley I. and Mauldin W., ‘U.S., China to Pursue Investment Treaty’ WALL ST. J (July 11, 2013) <http://online.wsj.com/news/articles/SB10001424127887324425204578599913527965812> accessed 4 May 2023
  • The Cable, ‘Nigeria ranks third in global internet crimes’ The Cable (23 August 2017) <https://www.thecable.ng/ncc-nigeria-ranks-third-global-internet-crimes> accessed 20 July 2023
  • The Herald Times ‘Indictment: Ex-Lily Workers Sold Company Secrete to China’, BLOOMINGTON HERALD-TIMES (10 October 2013) <https://www.heraldtimesonline.com/story/news/2013/10/10/indictment-ex-lilly-workers-sold-company-secrets-to-china/47390995/> accessed 20 July 2023
  • Tom G., ‘Seeing the Internet as an “Information Weapon”’ (NPR, 23 September 2010) <http://www.npr.org/templates/story/story.php?storyId=130052701> accessed 6 May 2023
  • Trachtman J., ‘Global Cyber terrorism, Jurisdiction and International Organisation’ in M. Grady and Paris (eds), The Law and Economics of Cyber Security (Cambridge 2006)
  • Trail Smelter Case (US v Canada), [1941], RIAA Vol. III, 1905, 2963
  • Tripathy T., ‘India Restricts Telecom Suppliers, carriers’ The National Post (Canada) (29 July 2010) U.S.-China Economic and Security Review Commission (2012) <https://www.uscc.gov/sites/default/files/annual_reports/2012-Report-to-Congress.pdf> accessed 20 June 2023
  • U.S.-China Joint Fact Sheet on Strategic and Economic Dialogue, U.S. DEP’T OF TREASURY (12 July 2013). <https://home.treasury.gov/system/files/136/SEDjointeconfactsheet072910.pdf> accessed 20 June 2023
  • U.S.-Poland BIT 1990, Annex 3, <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/5339/download> accessed 20 July 2023
  • UN General Assembly Resolution (1997) 51/210 (16 January 1997)
  • UN Security Council Resolution 1373 (2001) S/RES/1373 (28 September 2001)
  • UNCTAD, ‘Taking of Property’, (2002) available at: <http://unctad.org/en/Docs/psiteiitd15.en.pdf. accessed> on 5 May 2023
  • UNCTAD, ‘World Investment Report 2011: Non-Equity Modes of International Production and Development’ (2011) <https://unctad.org/system/files/official-document/wir2011_en.pdf>accessed 5 May 2023
  • UNCTAD, ‘World Investment Report’, (2010)
  • UNCTAD, World Investment Report 2013: Global Value Chains: Investment and Trade for Development 108 (2013), available at: <http://unctad.org/en/publicationsLibrary/wir2013_en.pdf>
  • United Nations General Assembly, Report of the United Nations Commission on International Trade Law, Rep.
  • UN. Doc., A/68/17, On its 46th Sess, 8-26 July, (2013) <http://unctad.org/meetings/en/SessionalDocuments/a68d17_en.pdf.> accessed 5 May 2023
  • United Nations, ‘Scope and Definition’, [2011] UNCTAD Series on Issues in International Investment
  • United Nations, UN World Investment Report 2010 <https://unctad.org/system/files/official-document/wir2010_en.pdf.> accessed 5 May 2023
  • Vandevelde K. J., U.S. International Investment Agreement (OUP 2009)
  • Verhoosel G., ‘The Use of Investor-State Arbitration Under Bilateral Investment Treaties to Seek Relief for Breaches of WTO Law’ (2003) 6, J. INT’L ECON. L. 493
  • VERIZON, 2023 Data Breach Investigations Report, <https://www.verizon.com/business/resources/reports/dbir/> accessed 20 June 2023
  • Vicente and Elinor O. Workshop in Political Theory and Policy Analysis (2011) Working Paper No. W11-3, , available at: <http://ssrn.com/abstract=2206980> At 1, 3
  • Watts J., ‘Brazilian president postpones Washington visit over NSA spying’, The Guardian (17 September 2013) <https://www.theguardian.com/world/2013/sep/17/brazil-president-snub-us-nsa> accessed 25 June 2023
  • Weismann M. M., ‘The Convention on Cybercrime: A Harmonised Implementation of International Penal Law: What Prospect for Procedural Due Process’ in Indiana Carr (ed) Computer Crime (Ashgate 2009)
  • Wena Hotels v Egypt (2002) ICSID Case No. ARB/98/4, Award, 8 December 2002, 41 I.L.M. 896
  • Whitehouse S., ‘U.S. Sen., Sheldon Speaks in Senate on Cyber Threats’, (White House.senate, 27 July 2010), <http://www.whitehouse.senate.gov/news/speeches/sheldon-speaks-in-senate-on-cyber-threats> accessed 12 April 2023
  • Wilson C., ‘Cyber Crime’ in Franklin D. Kramer et al (eds), Cyberpower and National Security (NDU 2009)
  • Wolf R.C, Trade, Aid, and Arbitrate: The Globalisation of Western Law (Ashgate 2004)
  • Wolf J. B., ‘War games Meets the Internet: Chasing 21 Century Cybercriminals with Old Laws and Little Money’ [2000] AM. J. CRIM. L. 95
  • World Bank Guidelines on the Treatment of Foreign Direct Investment s. IV (1999), available at: <http://italaw.com/documents/WorldBank.pdf>
  • Yang D.W and Hoffstadt B. M., ‘Countering the Cyber-Crime Threat’ (2006) AM. CRIM. L. REV, 201
  • Zetter K., ‘Google Hack Attack Was Ultra Sophisticated, New Details Show’ (Wired, 14 Jaunuary 2010) <http://www.wired.com/threatlevel/2010/01/operation-aurora/> accessed 15 April 2023

THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS

Yıl 2023, Cilt: I Sayı: 1, 15 - 68, 24.10.2023

Öz

This article will discuss a general overview of cyber security and cyber threats but will focus more on the digital aspect of cyber-attacks in the form of websites and computers than other areas of cyber security protection. But before going into detail about the possibility of including cyber security to BITs, it would be appropriate at this juncture to firstly elucidate on the issues relating to cyber threats that may be initiated from foreign countries to other States, by addressing the issues relating to State sovereignty, jurisdiction, and control over cyber infrastructure, and in addition to those issues that deals with the application of typical public international laws of State Responsibility to cyber operations. This may be relevant as some cyber-attacks are known to have their links from abroad. This article will be rounded up by analysing the employability of BITs and trade agreements to promote global cyber security via the lens of polycentrism of governance.

Kaynakça

  • 20th Global Information Security Survey 2017–18, Cybersecurity regained: preparing to face cyber attacks, <https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/digital/ey-cybersecurity-regained-preparing-to-face-cyber-attacks.pdf> accessed 20 June 2023
  • Accordance with International Law of the Unilateral Declaration of Independence in Respect of Kosovo [2010] I.C.J. Rep. 403
  • ADF Group Inc v US ICSID Case No. ARB(AF)/00/1 (NAFTA), Award, 9 January 2003
  • Agreement between Japan and the Republic of Colombia for the Liberalisation, Promotion and Protection of Investment (12 September 2011), <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/797/download> accessed on 5 May 2023
  • Agreement between Japan and the Republic of Peru for the Promotion, Protection and Liberalisation of Investment article10 (21 Nov. 2008), <https://www.iisd.org/toolkits/sustainability-toolkit-for-trade-negotiators/wp-content/uploads/2016/06/1733.pdf> accessed on 5 May 2023
  • Agreement on Trade-Related Aspects of Intellectual Property Rights, Annex 1C of the Marrakesh Agreement Establishing the World Trade Organisation, (Marrakesh, Morocco 15 April 1994), available at: <https://www.wto.org/english/docs_e/legal_e/27-trips_01_e.htm>
  • Agreements II 24. <http://unctad.org/en/Docs/diaeia20102_en.pdf> accessed on 17 April 2023
  • Alperovitch D., ‘Reveal: Operation Shady Rat’ (McAfee, 6 Sep. 2011), <http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf> accessed 2 May 2023
  • American Law Institute Third Restatement of Foreign Relations Law Section 402(1) (C) (1987)
  • AMT v Democratic Republic of Congo, ICSID Case No. ARB/93/1, Award, 21 February 1997
  • Asian Agricultural Products v Republic of Sri Lanka, (1990) ICSID case No. ARB/87/3. Final Award
  • August R., ‘International Cyber-Jurisdiction: A Comparative Analysis’ (2002), America Business Law Journal 531
  • Azurix and Argentina (2006), ICSID Case No. ARB/01/12, Award, 14 July 2006
  • Baker S., Waterman S. and Ivanov G., ‘In the Crossfire: Critical Infrastructure in the Age of Cyber War’ < https://www.govexec.com/pdfs/012810j1.pdf > accessed 13 July 2023
  • Ball J., Borger J. and Greenwald G., ‘Revealed: how US and UK spy agencies defeat internet privacy and security’, The Guardian (6 September 2013) <https://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security> accessed 25 June 2023
  • BBC, ‘China Hit by “Biggest Ever” Cyber-Attack’ BBC News (27 Aug. 2013), <http://www.bbc.co.uk/news/technology-2385041> accessed 2 May 2023
  • BBC, ‘Cybercrime Threat on the Rise, Says PwC Report’, BBC News (26 March 2012) <http://www.bbc.co.uk/news/business-17511322> accessed 12 April 2023
  • BBC, ‘NHS cyber-attack: GPs and hospitals hit by ransomware’ BBC News (13 May 2017) <https://www.bbc.com/news/health-39899646>
  • Bello J.H, Editorial Comment, ‘The WTO Dispute Settlement Understanding: Less Is More’, (1996) 90 Am. J. INT’L L. 416
  • Berger A., ‘Investment Rules in Chinese Preferential Trade and Investment Agreements: Is China Following the Global Trend Towards Comprehensive Agreement?’ (2013) 7 German Dev. Inst, 1. <http://www.die-gdi/uplots/media/DP_7.2013.pdf> accessed on 5 May 2023
  • Bernhard von Pezold and others v Republic of Zimbabwe [2015] ICSID Case No. ARB/10/15, para. 597
  • Bilateral Investment Treaty between Argentina and United States of America 1991 (Investment Policy Hub,20 October 1994) <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/127/download> accessed 20 June 2023
  • Bilateral Investment Treaty between Canada and Peru, (Investment Policy Hub, 20 June 2006), Article 1. <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/626/download> accessed 21 May 2023
  • Bilateral Investment Treaty between Germany and Bosnia and Herzegovina 2001. (Investment Policy Hub,11 November 2007) < https://investmentpolicy.unctad.org/international-investment-agreements/treaties/bit/606/bosnia-and-herzegovina---germany-bit-2001-> accessed on 14 April 2023
  • Bilateral Investment Treaty between Poland and United States of America 1990 (Investment Policy Hub, 6 August 1994) <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/5339/download> accessed 20 July 2023
  • Bilateral Investment Treaty between Ukraine and Denmark, (Investment Policy Hub,29 April 1994) <https://investmentpolicy.unctad.org/international-investment-agreements/treaties/bit/1291/Denmark---ukraine-bit-1992-> accessed 21 May 2023
  • Bryant C., NSA Claims Put German Business on Guard’, FIN. TIMES (1 Nov. 2013) at 4
  • Calia K., Veraneau J. and Fagan D. et al., ‘Economic Espionage and Trade Secret Theft: An Overview of the Legal Landscape and Policy Responses’, (2013), Covington & Burling LLP, 3. <https://bpb-us-e2.wpmucdn.com/wordpress.auburn.edu/dist/8/7/files/2021/01/economic-espionage-and-trade-secret-theft.pdf> accessed on 12 April 2023
  • Carr I. (ed), Computer Crime (Ashgate 2009)
  • Case Concerning United States Diplomatic and Consular Staff in Tehran (US v Iran) [1980], I.C.J Rep. 3, paras 67-68
  • Case of the S.S. ‘Lotus’ (France v Turkey) [1927], P.C.I.J Judgement Series A, No 10
  • Cashell B., Jackson WD., Jickling M., and Webel B., ‘The Economic Impact of Cyber-Attacks Congressional Research Service, the Library of Congress’ (2004), CRS Report for Congress. https://sgp.fas.org/crs/misc/RL32331.pdf accessed 18 May 2023
  • Cha A. E. and Nakashima E., ‘‘Google China Attack Part of Vast Espionage Campaign’ NBC News (14 January 2010) <https://www.nbcnews.com/id/wbna34855470> accessed 20 June 2023
  • Cole D. H., ‘From Global to Polycentric Climate Governance’ (2011) 2 CLIMATE L. 395
  • Collier K., ‘Sen. Ron Wyden on the Problems with the Trans-Pacific Partnership’, DAILY DOT (19 September 2012) <http://www.dailydot.com/politics/ron-wyden-trans-pacific-partnership/> accessed on 5 May 2023
  • Collins D., ‘Applying the Full Protection and Security Standard of International investment Law to Digital Assets’ (2011) 12 Journal of World Investment and Trade 225
  • Congyan C., ‘China-US BIT Negotiations and the Future of Investment Treaty Regime: A Grand Bilateral Bargain with Multilateral Implications’ (2009) 12 J. INT’L L. 457
  • Corfu Channel (United Kingdom of Great Britain and Northern Ireland v. Albania) [1949] I.C.J. Rep, 4
  • Cotula L., ‘Is the Tiding Turning for The Africa’s Investment Treaties?’ (IEDD, 8 March 2013) <http://www.iied.org/tide-turning-for-africa-s-investment-treaties> accessed on 5 May 2023
  • Council of Europe Convention on Cybercrime, Budapest 23. XI.2001, European Treaty – No. 185
  • Council of Europe, Convention on Cybercrime, 23 November 2001, Eur. T.S. No. 185. <https://rm.coe.int/1680081561> accessed 20 May 2023
  • Crelinsten R. D., ‘Terrorism and Counter-Terrorism in a Multi-Centric World: Challenges and Opportunities’ in M. Taylor and J. Hogan (eds), the Future of Terrorism (Routledge 2006)
  • Deighton B. and Breidthardt A., ‘EU confronts U.S. over reports it spies on European allies’, Reuters (30 June 2013) <https://www.reuters.com/article/uk-usa-eu-spying-idUKBRE95S0B720130630> accessed 25 June 2023
  • Dolzer R. and Schreuer C., Principles of International Investment Law (OUP 2008)
  • Draetta U., ‘The Internet and Terrorist Activities’ in A Bianchi (ed), Enforcing International Law Norms against Terrorism (Hart 2004)
  • Draft articles on responsibility of States for internationally wrongful acts, Text adopted by the International Law Commission at its fifty-third session [2001] YILC Vol II Part 2, Articles 1-2. [ARSIWA]
  • Eckert P. and Yukhananov A., ‘U.S., China Agree to Restart Investment Treaty Talks’, Reuters (12 July 2013) <https://www.reuters.com/article/uk-usa-china-dialogue-trade-idUKBRE96B04F20130712> accessed 4 May 2023
  • European Convention on Cybercrime (Budapest Convention 2001) <https://rm.coe.int/1680081561> accessed 5 May 2023
  • Factory at Chorzow (Germany v Poland) (1928) P.C.I.J, Merits, (ser. A) No. 17, 13 September 1928, para. 47 Feldman S. E. and Rollo S. L., ‘Extraterritorial Protection of Trade Secret Rights in China: Do Section 337 Actions at the ITC Really Prevent Trade Secret Theft Abroad?’ (2012) 11 J. Marshall REV.INTELL. PROP. L. 523
  • Khan J. F., ‘Brussels Opposes German Data Protection Push’ FIN. TIMES (5 November 2013)
  • Freeman A.V., ‘Responsibility of States for Unlawful Acts of their Armed Forces’ (1956) 88 Recueil des Courts 261
  • Friedman A.A., ‘Cybersecurity and Trade: National Policies, Global and Local Consequences’ (2013) Brooking Inst. <https://www.brookings.edu/wp-content/uploads/2016/06/BrookingsCybersecurityNEW.pdf> accessed 5 May 2023
  • Garnet R. and Clarke P., ‘Cyber terrorism: A New Challenge in International Law’ in A Bianchi (ed), Enforcing International Law Norms against Terrorism (Hart 2004)
  • Genocide Judgement (Bosnia and Herzegovina v Serbia and Montenegro) [2007] I.C. J. Rep 43
  • Gordon K. and Pohl J., Environment Concerns in International Investment Agreements: A Survey 5 (2011) (OECD Working Papers on International Investment No. 2011/1) <https://www.oecd.org/daf/inv/internationalinvestmentagreements/WP-2011_1.pdf> accessed 5 May 2023
  • Gorman S., ‘Broad New Hacking Attack Detected’ Wall St. Journal (18 Feb. 2010) <https://www.wsj.com/articles/SB10001424052748704398804575071103834150536> accessed 2 May 2023
  • Gross M. J., ‘Enter the Cyber-Dragon’ (Vanity Fair, Sept. 2011) <https://www.vanityfair.com/news/2011/09/chinese-hacking-201109> accessed on 16 April 2023
  • Grow B. and Horsenball M., ‘Special Report: In Cyberspy v Cyberspy, China Has the Edge’, Reuters (Apr 14 2011), <http://www.reuters.com/article/2011/04/14/us-china-usa-cyberespionage-idUSTR73D24220110414> accessed 18 April 2023
  • Gunawardana A. Z., ‘The Inception and Growth of Bilateral Investment Promotion and Protection Treaties’ (1992)86 AM. Soc’v INT’L L. PROC. 544.
  • Guzman A.T., ‘Why LDCs Sign Treaties That Hurt Them: Explaining the Popularity of Bilateral Investment Treaties’ (1998) 38 VA. J. INTL L. 639.
  • Habyyev R. and Kaya S., A Critical Role of Diplomatic Protection in Investor-State Disputes (On İki Levha 2021)
  • Hailing S., The Protection of Trade Secrets in China, (2nd edn, Kluwer Law International 2012)
  • Hardin G., ‘Lifeboat Ethics: The Case Against Helping the Poor’ (1974) PSYCHOL. TODAY SEPT. ICSID Convention, Rules and Regulation 2006, <https://icsid.worldbank.org/sites/default/files/ICSID%20Convention%20English.pdf> accessed 20 June 2023 Interview with Elinor Ostrom, Distinguished Professor, Indiana University-Bloomington, in Bloomington, Ind. (13 October 2010) Island of Palmas (Netherlands v US) [1928] RIAA Vol. II, 829, 838
  • Jacobs A., ‘After Reports on N.S.A, China Urges End to Spying’ New York Times (24 March 2014) <https://www.nytimes.com/2014/03/25/world/asia/after-reports-on-nsa-china-urges-halt-to-cyberspying.html> accessed 2 May 2023
  • Jones A. and Helft M, ‘Google, Citing Attack, Threatens to Exit China’ New York Times (12 January 2010) <https://www.nytimes.com/2010/01/13/world/asia/13beijing.html> accessed 2 May 2023
  • Jones S., Nevile S., Pickard J. and Chaffin J., ‘NHS Hackers Used Stolen Cyber Weapons from US Spy Agency’, Financial Times, FT Weekend (13 May, 2017) <https://www.ft.com/content/e96924f0-3722-11e7-99bd-13beb0903fa3> accessed 20 June 2023
  • Jones S., ‘Cyber security Exports to Face Same Controls as Weapon Sale’, FIN. TIMES (5 December 2013)
  • Kariyawasam R., International Economic Law and Digital Divide: A New Silk Road (Edward Elgar 2007)
  • Kayal N. K., ‘The Dark Side of Private Ordering: The Network/Community Harm of Crime’ in Grady M. F. and Francesco P. (eds), The Law and Economics of Cybersecurity (Cambridge University Press 2006)
  • Keohane R. O. and Victor D. G., ‘The Regime Complex for Climate Change’ (2011) 9(1) Perspective on Politics 19
  • Kishoiyian B., ‘The Utility of Bilateral Investment Treaties in the Formulation of Customary International Law’ (1994)14 Nw. J. INT’L L. & BUS 327
  • Lee D. ‘New York Times and Twitter Struggle After Syrian Hack’, BBC News (28 Aug. 2013) <http://www.bbc.co.uk/news/technology-23862105> accessed 2 May 2023.
  • Lewis J. A., ‘Conflict and Negotiation in Cyberspace’ (2013) CTR. STRATEGIC & INT’L STUD 49
  • LFH Neer and Pauline Neer v United Mexican States, [1926] US-Mexican General Claims Commission, Decision, 4 UNRIAA 60
  • Littman D. and Posner E., ‘Holding Internet Service Providers Accountable’ in Grady M. F. and Francesco P. (eds), The Law and Economics of Cyber Security (Cambridge University Press 2006)
  • Lowrey A., ‘U.S. and China to Discuss Investment Treaty, but Cyber security is a Concern’, New York Times (12 July 2013), <https://www.nytimes.com/2013/07/12/world/asia/us-and-china-to-discuss-investment-treaty-but-cybersecurity-is-a-concern.html > accessed 15 April 2023
  • MacAskill E., ‘Countries Are Risking Cyber Terrorism: Security Expert Tells World Summit’, The Guardian (5 May 2010) <https://www.theguardian.com/technology/2010/may/05/terrorism-uksecurity> accessed 2 May 2023
  • Marble I., The Calculation of Compensation and Damages in International Investment Law (OUP 2009)
  • Mass P. and Rajagopalan M., ‘Does Cybercrime Really Cost $1 Trillion?’, (Propublica, 1 August 2012) <http://www.propublica.org/article/does-cybercrime-really-cost-1-trillion> accessed 12 July 2023
  • McAfee, ‘Protecting Your Critical Assets: Lessons Learned from: Operation Aura’ [2010], McAfee Labs and
  • McAfee Foundstone Professional Services, 3. <http://www.wired.com/images_blogs/threatlevel/2010/03/operationaura_wp_0310_fnl.pdf>accessed 25 April 2023
  • McGauran W., ‘Intended Consequences: Regulating Cyber Attacks’ (2009) 12 Tulane Journal of Technical and Intellectual Property 259
  • McGinnis M. D., ‘Costs and Challenged of Polycentric Governance: An Equilibrium Concepts and Examples from U.S. Health Care’ 1, <http://ssrn.com/abstract=2206980> accessed 6 May 2023
  • McVeigh K., ‘NSA Surveillance Program Violates the Constitution, ACLU Says’ Guardian (27 August 2013) <http://www.theguardian.com/world/2013/aug/27/nsa-surveillance-program-illegal-aclu-lawsuit> accessed 2 May 2023
  • Military and Paramilitary activities against Nicaragua, (Nicaragua v United States of America) [1986] I. C. J. Rep. 14
  • MNSS B.V. and Recupero Credito Acciaio N.V. v Montenegro [2016] ICSID Case No. ARB (AF) 12/8, para 356
  • Moss G. C., ‘Full Protection and Security’ in August Reinisch (ed), Standards of Investment Protection (OUP 2008) 134
  • Mossman M. L., ‘Essay, Enforcement of WTO Rulings: An Interest Group Analysis’ (2013), 32 HOFSTRA L. REV. 1
  • Multilateral Investment Guarantee Agency, ‘Investment Guarantee Guide’ <http://www.miga.org/documents/IGGenglish.pdf.> accessed 5 May 2023
  • Noble Ventures Inc. v Romania (2005) ICSID Case No. ARB, Award, 12 October 2005
  • North Sea Continental Shelf (Federal Republic of Germany v Denmark; F.R.G. V Netherlands) (1969) I.C.J. Rep. 3
  • O’Hara G., ‘Cyber-Espionage: A Growing Threat to the American Economy’ (2010) 19 CommLaw CONSPECTUS 24
  • Opinion of Mr Advocate General Darmon, Joined Cases 89, 104, 114, 116, 117, and 125-9
  • Organisation for Economic Co-operation and Development (OECD), 2002, Art. III.3 <https://www.oecd.org/sti/ieconomy/oecdguidelinesforthesecurityofinformationsystemsandnetworkstowardsacultureofsecurity.htm> accessed 20 June 2023
  • Osakeyhtio and Others v Commission [in re Wood Pulp Cartel] paras 20-1. 1994 E.C.R. 1-100
  • Ostrom E. and Nagendra H., ‘Insights on Linking Forests, Trees, and People from the Air, on the Ground, and in the Laboratory’ (2006) 103 PROC. NAT’L. ACAD. SCL 19224.
  • Ostrom E., ‘Beyond Markets and States: Polycentric Governance of Complex Economic System’ (2010) 100 AM. ECON. REV. 641.
  • Ostrom E., ‘Polycentric Systems for Coping with Collective Action and Global Environmental Change’ (2010) 20 GLOBAL ENVIL. CHANGE 550.
  • Ostrom E., Public Entrepreneurship: A case Study in Ground Water Basin Management (1965) (unpublished Ph.D. dissertation, Univ. Of Calif., Los Angeles)
  • Palmer D. ‘US, EU start free-trade talks despite spying concerns’ Reuters (9 July 2013), <https://www.reuters.com/article/us-usa-eu-trade/us-eu-start-free-trade-talks-despite-spying-concerns-idUSBRE96704F20130708> accessed 20 June 2023.
  • Pantechniki Contactor & Engineers v Albania (2009) ICSID Case No. ARB/07/21, Award, 30 July 2009 Paris Convention for the protection of Industrial Property (1979), available at: <http://www.wipo.int/treaties/en/ip/paris/trtdocs_wo020.htmlp213_35515>
  • Passeri P., ‘What is a Cyber Weapon?’ (Hackmsgedon, 22 April 2012), <http://www.theguardian.com/world/2013/aug/27/nsa-surveilance-program-illegal-aclu-lawsuit> accessed 12 April 2023
  • Pauwelyn J., ‘Different Means, Same End: The Contribution of Trade and Investment Treaties to Anti-Corruption Policy’ in Susan Rose-Ackerman and Paul D. Carrington (eds), Anti-Corruption Policy: Can International Actors Play a Constructive Role? (Carolina Academic Press 2013)
  • Poeter D., ‘Microsoft Joins Ranks of the Tragically Hacked’, (PCMAG, 22 February 2013,) <www.pcmag.com/articl2/0,2817,2415787,00.asp> accessed 29 April 2023
  • Powers D, ‘Cyber law: The Major Areas, Development and Information Security Aspects’ in H. Bidgoli (ed), Global Perspectives in Information Security (John Wiley and Sons Inc. 2009)
  • Proce D. M. and Smart M. J., ‘BIT by BIT: A Path to Strengthening US-China Economic Relations’ [2013] 1 <http://www.paulsoninstitute.org/wp-content/uploads/2016/07/BIT-by-BIT-English.pdf> accessed 4 May 2023
  • Prosecutor v Dusko Tadic a.k.a. ‘Dule’ [1997] International Criminal Tribunal for Former Yugoslavia, IT-94-1-T Qui T., ‘How Exactly Does China Consent to Investor-State Arbitration: On the First ICSID Case Against China’ (2012) 5 CONTEMPARARY ASIA ARB. J. 265
  • R v Graham Waddon, 2000 WL 41456 (2 April 2000)
  • Rantala R. R., Bureau of Justice Statistics, U.S. Dep’t of Justice NO. NCJ 221943, Cybercrime against Business, 2005 1, 3 (2008), available at: <http://bjs.ojp.usdoj.gov/content/pub/pdf/cb05.pdf>
  • Raustiala K. and Victor D. G., ‘The Regime Complex for Plant Genetic Resources’ (2004) 58 INT’L ORG. 277
  • Report of the International Law Commission on the Work of its Fifty-third Session, Commentary to the Articles on the Responsibility of States for Internationally Wrongful Acts, [2001] YILC Vol. II Part 2. [ARSIWA Commentary]
  • Reuters, ‘US Charges Chinese Wind Company with Stealing Trade Secrets’, (CNBC, 27 June 2012), < http://www.cnbc.com/id/100851053>
  • Rid T., Cyber War Will Not Take Place (OUP 2013)
  • Salacuse, J., The Law of Investment Treaties (OUP 2010)
  • Schachter, O., Editorial Comment, ‘Compensation for Expropriation’ (1984) 78 AM. J. INT’L L. 121
  • Schmitt M. N, Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press 2013)
  • Sergei v Government of Mongolia (2011) Award on Jurisdiction and Liability, 28 April 2011. <https://jusmundi.com/fr/document/decision/en-sergei-paushok-cjsc-golden-east-company-and-cjscvostokneftegaz-company-v-the-government-of-mongolia-award-on-jurisdiction-and-liability-thursday-28th-april-2011> accessed 5 May 2023
  • SGS Societe Generale de Surveillance SA v Islamic Republic of Pakistan [2003] ICSID Case No. ARB/01/13, 13, under the Swiss-Pakistan BIT (entered into force 6 May 1996)
  • Shackelford S. J., Managing Cyber Attacks in International Law, Business and Relations: In Search of Cyber Peace (Cambridge University Press 2014)
  • Shackelford S. J., ‘In Search of Cyber Peace: A Response to the Cyber security Act of 2012’, (2012), 64 STAN. L. REV. ONLINE 106 <http://www.standfordlawreview.org/online/cyber-peace> accessed 6 May 2023
  • Shackelford S. J., ‘From Nuclear War to Net War: Analogizing Cyber Attacks in International Law’, (2009), BERKELEY J. INT’L L. 192
  • Shackelford S. J., ‘Towards Cyber Peace: Managing Cyber Attacks through Polycentric Governance’ (2013) 63 AM. U.L. REV. 1273
  • Shackelford S. J. and et al, ‘Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties’ (2015) 52 (1) American Business Law Review 1
  • Shackkelton S., ‘Estonia Three Years Later: A Progress Report on Combating Cyber Attacks’ [2010] Journal of Internet Law 22
  • Shalhoub Z. K. and AI Qasimi S.L., Cyber Law and Security in Developing and Emerging Economies (Edward Elgar Publishing 2010)
  • Siemens v Argentina [2007] ICSID Case No. ARB/02/6
  • Sornarajah M., The International Law on Foreign Investment (OUP 2010)
  • Sullivan R.. ‘Company: Chinese cyberattack targets Australia’ SMH (15 April 2010 <https://www.smh.com.au/technology/company-chinese-cyberattack-targets-australia-20100415-sh1d.html> accessed 2 May 2023
  • Susan M., ‘The Critical Challenge from International High-Tech and Computer Related Crime at the Millennium’ (2009) Duke Journal of International and Comparative Law 451
  • Swire P. and Ahmad K., ‘Encryption and Globalisation’, (2012), 13 COLUM. SCI. & TECH. L. REV. 416
  • Talley I. and Mauldin W., ‘U.S., China to Pursue Investment Treaty’ WALL ST. J (July 11, 2013) <http://online.wsj.com/news/articles/SB10001424127887324425204578599913527965812> accessed 4 May 2023
  • The Cable, ‘Nigeria ranks third in global internet crimes’ The Cable (23 August 2017) <https://www.thecable.ng/ncc-nigeria-ranks-third-global-internet-crimes> accessed 20 July 2023
  • The Herald Times ‘Indictment: Ex-Lily Workers Sold Company Secrete to China’, BLOOMINGTON HERALD-TIMES (10 October 2013) <https://www.heraldtimesonline.com/story/news/2013/10/10/indictment-ex-lilly-workers-sold-company-secrets-to-china/47390995/> accessed 20 July 2023
  • Tom G., ‘Seeing the Internet as an “Information Weapon”’ (NPR, 23 September 2010) <http://www.npr.org/templates/story/story.php?storyId=130052701> accessed 6 May 2023
  • Trachtman J., ‘Global Cyber terrorism, Jurisdiction and International Organisation’ in M. Grady and Paris (eds), The Law and Economics of Cyber Security (Cambridge 2006)
  • Trail Smelter Case (US v Canada), [1941], RIAA Vol. III, 1905, 2963
  • Tripathy T., ‘India Restricts Telecom Suppliers, carriers’ The National Post (Canada) (29 July 2010) U.S.-China Economic and Security Review Commission (2012) <https://www.uscc.gov/sites/default/files/annual_reports/2012-Report-to-Congress.pdf> accessed 20 June 2023
  • U.S.-China Joint Fact Sheet on Strategic and Economic Dialogue, U.S. DEP’T OF TREASURY (12 July 2013). <https://home.treasury.gov/system/files/136/SEDjointeconfactsheet072910.pdf> accessed 20 June 2023
  • U.S.-Poland BIT 1990, Annex 3, <https://investmentpolicy.unctad.org/international-investment-agreements/treaty-files/5339/download> accessed 20 July 2023
  • UN General Assembly Resolution (1997) 51/210 (16 January 1997)
  • UN Security Council Resolution 1373 (2001) S/RES/1373 (28 September 2001)
  • UNCTAD, ‘Taking of Property’, (2002) available at: <http://unctad.org/en/Docs/psiteiitd15.en.pdf. accessed> on 5 May 2023
  • UNCTAD, ‘World Investment Report 2011: Non-Equity Modes of International Production and Development’ (2011) <https://unctad.org/system/files/official-document/wir2011_en.pdf>accessed 5 May 2023
  • UNCTAD, ‘World Investment Report’, (2010)
  • UNCTAD, World Investment Report 2013: Global Value Chains: Investment and Trade for Development 108 (2013), available at: <http://unctad.org/en/publicationsLibrary/wir2013_en.pdf>
  • United Nations General Assembly, Report of the United Nations Commission on International Trade Law, Rep.
  • UN. Doc., A/68/17, On its 46th Sess, 8-26 July, (2013) <http://unctad.org/meetings/en/SessionalDocuments/a68d17_en.pdf.> accessed 5 May 2023
  • United Nations, ‘Scope and Definition’, [2011] UNCTAD Series on Issues in International Investment
  • United Nations, UN World Investment Report 2010 <https://unctad.org/system/files/official-document/wir2010_en.pdf.> accessed 5 May 2023
  • Vandevelde K. J., U.S. International Investment Agreement (OUP 2009)
  • Verhoosel G., ‘The Use of Investor-State Arbitration Under Bilateral Investment Treaties to Seek Relief for Breaches of WTO Law’ (2003) 6, J. INT’L ECON. L. 493
  • VERIZON, 2023 Data Breach Investigations Report, <https://www.verizon.com/business/resources/reports/dbir/> accessed 20 June 2023
  • Vicente and Elinor O. Workshop in Political Theory and Policy Analysis (2011) Working Paper No. W11-3, , available at: <http://ssrn.com/abstract=2206980> At 1, 3
  • Watts J., ‘Brazilian president postpones Washington visit over NSA spying’, The Guardian (17 September 2013) <https://www.theguardian.com/world/2013/sep/17/brazil-president-snub-us-nsa> accessed 25 June 2023
  • Weismann M. M., ‘The Convention on Cybercrime: A Harmonised Implementation of International Penal Law: What Prospect for Procedural Due Process’ in Indiana Carr (ed) Computer Crime (Ashgate 2009)
  • Wena Hotels v Egypt (2002) ICSID Case No. ARB/98/4, Award, 8 December 2002, 41 I.L.M. 896
  • Whitehouse S., ‘U.S. Sen., Sheldon Speaks in Senate on Cyber Threats’, (White House.senate, 27 July 2010), <http://www.whitehouse.senate.gov/news/speeches/sheldon-speaks-in-senate-on-cyber-threats> accessed 12 April 2023
  • Wilson C., ‘Cyber Crime’ in Franklin D. Kramer et al (eds), Cyberpower and National Security (NDU 2009)
  • Wolf R.C, Trade, Aid, and Arbitrate: The Globalisation of Western Law (Ashgate 2004)
  • Wolf J. B., ‘War games Meets the Internet: Chasing 21 Century Cybercriminals with Old Laws and Little Money’ [2000] AM. J. CRIM. L. 95
  • World Bank Guidelines on the Treatment of Foreign Direct Investment s. IV (1999), available at: <http://italaw.com/documents/WorldBank.pdf>
  • Yang D.W and Hoffstadt B. M., ‘Countering the Cyber-Crime Threat’ (2006) AM. CRIM. L. REV, 201
  • Zetter K., ‘Google Hack Attack Was Ultra Sophisticated, New Details Show’ (Wired, 14 Jaunuary 2010) <http://www.wired.com/threatlevel/2010/01/operation-aurora/> accessed 15 April 2023
Toplam 163 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Hukuk
Bölüm Araştırma Makalesi
Yazarlar

Onyema Onyeani

Yayımlanma Tarihi 24 Ekim 2023
Yayımlandığı Sayı Yıl 2023 Cilt: I Sayı: 1

Kaynak Göster

APA Onyeani, O. (2023). THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS. The Boğaziçi Law Review, I(1), 15-68.
AMA Onyeani O. THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS. BLR. Ekim 2023;I(1):15-68.
Chicago Onyeani, Onyema. “THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS”. The Boğaziçi Law Review I, sy. 1 (Ekim 2023): 15-68.
EndNote Onyeani O (01 Ekim 2023) THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS. The Boğaziçi Law Review I 1 15–68.
IEEE O. Onyeani, “THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS”, BLR, c. I, sy. 1, ss. 15–68, 2023.
ISNAD Onyeani, Onyema. “THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS”. The Boğaziçi Law Review I/1 (Ekim 2023), 15-68.
JAMA Onyeani O. THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS. BLR. 2023;I:15–68.
MLA Onyeani, Onyema. “THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS”. The Boğaziçi Law Review, c. I, sy. 1, 2023, ss. 15-68.
Vancouver Onyeani O. THE NEED TO APPLY FULL PROTECTION AND SECURITY (FPS) STANDARD TO CYBER SECURITY: DIGITAL ASSETS. BLR. 2023;I(1):15-68.