

{"id":684,"date":"2018-09-21T14:43:17","date_gmt":"2018-09-21T18:43:17","guid":{"rendered":"https:\/\/sites.temple.edu\/ticlj\/?p=684"},"modified":"2020-02-21T14:53:53","modified_gmt":"2020-02-21T19:53:53","slug":"volume-32-number-2-fall-2018","status":"publish","type":"post","link":"https:\/\/sites.temple.edu\/ticlj\/2018\/09\/21\/volume-32-number-2-fall-2018\/","title":{"rendered":"Volume 32, Number 2 (Fall 2018)"},"content":{"rendered":"<h2>Articles<\/h2>\n<p><a href=\"https:\/\/sites.temple.edu\/ticlj\/files\/2020\/02\/32.2_Claussen_Article-01-header-deleted.pdf\"><strong>Beyond Norms:\u00a0 Using International Economic Tools to Deter Malicious State-Sponsored Cyber Activities<\/strong><\/a><br \/>\n<em>Kathleen Claussen<\/em><\/p>\n<p class=\"Head1-Articles\"><a href=\"https:\/\/sites.temple.edu\/ticlj\/files\/2020\/02\/32.2_Corn_Article02-header-deleted.pdf\"><strong>The Use of Force and Cyber Countermeasures<\/strong><\/a><br \/>\n<em>Gary Corn &amp; Eric Jensen<\/em><\/p>\n<p class=\"Head1-Articles\"><a href=\"https:\/\/sites.temple.edu\/ticlj\/files\/2020\/02\/32.2_Egan_Article03-page-fix-header-deleted.pdf\"><strong>Cybersecurity, International Law, and The First Year of The Trump Administration<\/strong><\/a><br \/>\n<em>Brian J. Egan<\/em><\/p>\n<p><a href=\"https:\/\/sites.temple.edu\/ticlj\/files\/2020\/02\/32.2_Hollis_Article04-header-deleted.pdf\"><strong>Promoting International Cybersecurity Cooperation: Lessons from The Proliferation Security Initiative<\/strong><\/a><br \/>\n<em>Duncan B. Hollis &amp; Matthew C. Waxman<\/em><\/p>\n<p><a href=\"https:\/\/sites.temple.edu\/ticlj\/files\/2020\/02\/32.2_Homburger_Article05-header-deleted.pdf\"><strong>Restricting Access to Services or Information Systems in Light of Trade in Services Commitments<\/strong><\/a><em><br \/>\nZine Homburger<\/em><\/p>\n<p><a href=\"https:\/\/sites.temple.edu\/ticlj\/files\/2020\/02\/32.2_Kerttunen_Article06-header-deleted.pdf\"><strong>Contours:\u00a0 On the Policy of Consequences as Seen through Social Sciences<br \/>\n<\/strong><\/a><em>Mika Kerttunen<\/em><strong><br \/>\n<\/strong><\/p>\n<p><a href=\"https:\/\/sites.temple.edu\/ticlj\/files\/2020\/02\/32.2_Tikk_Article07-header-deleted.pdf\"><strong>Will Cyber Consequences Deepen Disagreement on International Law?<\/strong><\/a><br \/>\n<em>Eneken Tikk<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Articles Beyond Norms:\u00a0 Using International Economic Tools to Deter Malicious State-Sponsored Cyber Activities Kathleen Claussen The Use of Force and Cyber Countermeasures Gary Corn &amp; Eric Jensen Cybersecurity, International Law, and The First Year of The Trump Administration Brian J. Egan Promoting International Cybersecurity Cooperation: Lessons from The Proliferation Security Initiative Duncan B. Hollis &amp; &hellip; <a href=\"https:\/\/sites.temple.edu\/ticlj\/2018\/09\/21\/volume-32-number-2-fall-2018\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Volume 32, Number 2 (Fall 2018)<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1012,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[37],"tags":[],"coauthors":[3],"class_list":["post-684","post","type-post","status-publish","format-standard","hentry","category-volume-32"],"acf":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/posts\/684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/users\/1012"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/comments?post=684"}],"version-history":[{"count":0,"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/posts\/684\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/media?parent=684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/categories?post=684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/tags?post=684"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sites.temple.edu\/ticlj\/wp-json\/wp\/v2\/coauthors?post=684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}