Ido Kilovaty

Ido Kilovaty
University of Tulsa · College of Law

About

12
Publications
2,583
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
64
Citations

Publications

Publications (12)
Article
Full-text available
Recent state-sponsored cyber operations against private-sector entities have increasingly become prejudicial not only to the computer systems and networks of these targets, but also to the national security interests of the nations affected. While international law protects many of the state interests that go hand in hand with the national security...
Article
Full-text available
Cybersecurity incidents affecting the availability of computers, networks, and data are on the rise. Distributed Denial-of-Service and ransomware attacks can bring down critical systems and databases, making them unavailable when most needed, potentially affecting every individual, industry, sector, and branch of government. This Article critically...
Preprint
Full-text available
Recent state-sponsored cyber operations against private-sector entities have increasingly become prejudicial not only to the computer systems and networks of these targets, but also to the national security interests of the nations affected. While international law protects many of the state interests that go hand in hand with the national security...
Article
Full-text available
Dan Efrony and Yuval Shany's article offers some critically important observations on the reception of the Tallinn Manual 2.0 by states, as well as subsequent state practice and opinio juris with regard to the international use of cyber operations. Based on their case studies, Efrony and Shany conclude that states have largely been reluctant to ado...
Article
Full-text available
Article
Full-text available
Alleged Russian digital interference during the 2016 U.S. presidential election presented international law with the challenge of characterizing the phenomenon of politically motivated leaks by foreign actors, carried out in cyberspace. Traditionally, international law's norm of non-intervention applies only to acts that are coercive in nature, lea...
Preprint
Full-text available
Swaths of personal and nonpersonal information collected online about internet users is increasingly being used in sophisticated ways to manipulate them based on that information. This represents a new trend in the exploitation of data, where instead of pursuing direct financial gain based on the face value of the data, actors are seeking to engage...
Article
Full-text available
Article
Full-text available
Article
Full-text available
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflicts. With that premise in mind, the question arises of whether or not a civilian carrying out cyber-attacks during an armed conflict becomes a legitimate target under international humanitarian law. This paper aims to explore this question using three...
Article
Recent UN Human Rights Council mandated commission was established in order to examine grave and systematic human rights violations by the government of North Korea. The report included evidence on violation of fundamental human rights, such as the right to life, right to food, freedom of expression and freedom from torture. Michael Kirby, Chair of...