Este módulo es un recurso para los catedráticos
Lecturas avanzadas
Se recomienda las siguientes lecturas a los interesados en investigar los temas de este módulo con más detalle:
- Council of Europe Project on Cybercrime, Economic Crime Division. (2009). The functioning of 24/7 points of contact for cybercrime.
- ENISA. (2013). Cooperation in the Area of Cybercrime: Toolset, Documents for students.
- Finklea, Kristin M. (2013). The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement. CRS Report for Congress.
- Kleijssen, Jan and Pierluigi Perri. (2016). Cybercrime, Evidence and Territoriality: Issues and Options. In Martin and Wouter Werner. Netherlands Yearbook of International Law 2016. Springer.
- Maillart, Jean-Baptiste. (2018). The limits of subjective territorial jurisdiction in the context of cybercrime. ERA Forum, 1-16, published online 3 de septiembre de 2018.
- Spoenle, Jan. (2010). Cloud Computing and cybercrime investigations: Territoriality vs. the power of disposal? Council of Europe Project on Cybercrime.
- U.S. Department of Justice. (2019). Promoting Public Safety, Privacy, and the Rule of Law Around the World: The Purpose and Impact of the CLOUD Act. White Paper April 2019.
- von Heintschel, Wolff. (2013). Territorial Sovereignty and Neutrality in Cyberspace. International Law Studies, Vol. 89, 123-156.
Siguiente: Evaluación del estudiante
Volver al inicio