We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This book offers a transnational perspective of evidentiary problems, drawing on insights from different systems and legal traditions. It avoids the isolated manner of analyzing evidence and proof within each Common Law and Civil Law tradition. Instead, it features contributions from leading authors in the evidentiary field from a variety of jurisdictions and offers an overview of essential topics that are of both theoretical and practical interest. The collection examines evidence not only as a transnational field, but in a cross-disciplinary context. Each chapter engages with the interdisciplinary themes cutting through the issues discussed, benefiting from the expertise and experience of their diverse authors.
There is little value in affirming the existence of the right to victims of armed conflict to reparation if it is not clear how massive numbers of victims could access to reparation. The chapter shows how accessibility is essential for guaranteeing this right, offering concrete proposals. As human rights law is an important tool for determining the existence of this right, experiences implementing massive forms of reparation for victims of human rights violations also serve to determine its operationalization. This requires adapting basic notions about the right to reparation designed for addressing individual claims to situations where individualized methods for determining rights will result on the exclusion of the vast majority of victims. The chapter examines the experiences of the UN Compensation Commission and the Ethiopia-Eritrea Compensation Commission, as well as of reparations programs implemented in Guatemala, Peru, Sierra Leone, Colombia, and Chile. It analyses how these policies determined the violations to cover, reparation measures, registering victims, and guaranteeing accessibility of vulnerable victims, women and those frequently excluded. These experiences offer criteria for interpreting notions of proportionality, restitutio in integrum, compensation, and standards of evidence, as well as the relationship with judicial reparation, reconstruction, and development in post conflict situations.
A growing number of states have started pointing to the customary doctrine of countermeasures as the most feasible unilateral remedy in the case of a malicious cyber operation carried out by an adversarial actor. Thus, the legal requirements of successfully invoking a right to resort to countermeasures are analysed in depth. In particular, the chapter deals with state policies such as 'active cyber defences' and 'hacking back' as reactions to cybersecurity incidents, and their lawfulness as countermeasures. After examining the pervasive problem of attribution in cyberspace, the states' duty to prevent malicious cyber operations emanating from their territory and the standard of due diligence in this regard are investigated. The chapter concludes with considering the invocation of countermeasures for the purpose of guarantees of non-repetition and reparation in the aftermath of a cybersecurity incident.
This chapter analyses the preconditions of invoking self-defence against a malicious cyber operation. After examining the notion of 'armed attack' and under what circumstances a cybersecurity incident may reach the critical threshold, the study focuses on the question of attributing the malicious conduct to a state actor. Depending first on identifying the acting individual whose hacking then needs to be linked to a state via the rules enshrined in the ILC Articles on State Responsibility, the question of the applicable standard of evidence is analysed in detail. Concluding that the technical peculiarities of cyberspace will often prevent states from presenting a sufficient amount of proof of adversarial state involvement in a timely manner, the chapter exposes the inherent difficulties in connection with the doctrine of self-defence in cyberspace.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.