||1. Encryption policy
||3. International Organisations
||4. Privacy Enhancing Technologies
|Initial phase (1-6)
||Detailed project plan
||Detailed research design for respective prongs
- Problem analysis; methodological choices in interdisciplinary legal research
- Literature review; initial data collection
|Phase I: (7-18)
||Mapping and description of legal requirements for encryption and technical capabilities
||Mapping of cybercrimechallenges and existing cybercrime law
||Mapping of international organizations and their respective roles and policy initiatives in the field of security
||Mapping of PETsand legal requirements
|Phase II: (19-30)
||Analysis of encryption policy and tech. context
||Analysis of cybercrime laws in light of challenges
||Analysis of Internet security policy advanced by organizations
||Analysis of the role of PETs in ensuring privacy
|Phase III: (31-42)
||Normative analysis:Ought encryption policy be updated?
||Normative analysis:How should cybercrime law address current and future challenges?
||Normative analysis: What roles ought international organizations play in Internet security?
||Normative analysis: What roles ought PETs play in ensuring privacy?
|Final Phase: (43-48)
||Dissemination of results:
- Finalization of PhD theses;
- Proposals for regulatory reform, if any
Published Mar. 14, 2016 11:21 AM
- Last modified Mar. 14, 2016 11:21 AM