2018
DOI: 10.18356/07c9f3f7-en
|View full text |Cite
|
Sign up to set email alerts
|

Introduction. Eneken Tikk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 0 publications
0
11
0
2
Order By: Relevance
“…These attacks impacted on the availability of services provided by various sub-systems, from banking to government emails, limiting human access to information and services, and preventing various computers and networks from functioning properly. 146 As such, these attacks resulted in more significant increases in entropy than the 'emotional phase' of the attacks. They disrupted the availability of government and commercial services integral to the functioning of Estonian civil society.…”
Section: Entropy Caused By the Cyber Attacksmentioning
confidence: 99%
“…These attacks impacted on the availability of services provided by various sub-systems, from banking to government emails, limiting human access to information and services, and preventing various computers and networks from functioning properly. 146 As such, these attacks resulted in more significant increases in entropy than the 'emotional phase' of the attacks. They disrupted the availability of government and commercial services integral to the functioning of Estonian civil society.…”
Section: Entropy Caused By the Cyber Attacksmentioning
confidence: 99%
“…In 2013, the third UNGGE agreed that international law, and in particular the UN Charter, applied to the use of ICTs by states. The fourth UNGGE of 2015 articulated voluntary and non-binding norms of responsible state behaviour (Tikk and Kerttunen 2017: 11). However, during the fifth UNGGE in 2017, the working group could not reach a consensus on how norms of international law apply to cyber operations (UNGA 2017a) and did not adopt its final report.…”
Section: Divisions Over Security At Ungge 2016/2017mentioning
confidence: 99%
“…Regarding institutions, adherents of the liberal sphere wanted to apply existing international law to cybersecurity without creating a new regime. However, adherents of the sovereigntist sphere preferred a new binding intergovernmental regime (Tikk and Kerttunen 2017: 16) but proponents of the liberal sphere were unwilling to initiate such a negotiation process in the UN (Rodríguez 2017).…”
Section: Divisions Over Security At Ungge 2016/2017mentioning
confidence: 99%
“…For the needs of the construction as such analogs used artificially created territory -earth mounds and alluvial areas. Generally the representation of land reclamation is "the process of applying hydromechanical method of soil on the bottom areas of the water body, which resulted in creating an artificial land plot" [5].…”
Section: Spbwosce-2016mentioning
confidence: 99%
“…The nature of real estate objects was considered in the works of R.S.Bevzenko [1], A.E.Zakharova [2], D.Bazarkina [3], A.Ya.Rizhenkova [4], O.K.Tikk [5], D.E.Potyarkina [6], D.S.Nekrestyanova [7], S.P.Grishaeva [8] and other authors [10][11][12][13][14][15][16][17][18][19]21,23].…”
Section: Introductionmentioning
confidence: 99%