{"id":"https://openalex.org/W4311061848","doi":"https://doi.org/10.1093/ijlit/eaac021","title":"Revisiting due diligence in cyberspace: crafting international law\u2019s arsenal against transboundary Botnets","display_name":"Revisiting due diligence in cyberspace: crafting international law\u2019s arsenal against transboundary Botnets","publication_year":2022,"publication_date":"2022-09-01","ids":{"openalex":"https://openalex.org/W4311061848","doi":"https://doi.org/10.1093/ijlit/eaac021"},"language":"en","primary_location":{"id":"doi:10.1093/ijlit/eaac021","is_oa":false,"landing_page_url":"https://doi.org/10.1093/ijlit/eaac021","pdf_url":null,"source":{"id":"https://openalex.org/S193514341","display_name":"International Journal of Law and Information Technology","issn_l":"0967-0769","issn":["0967-0769","1464-3693"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Law and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104023901","display_name":"Abhijeet Shrivastava","orcid":null},"institutions":[{"id":"https://openalex.org/I4210129200","display_name":"O. P. Jindal Global University","ror":"https://ror.org/03j2ta742","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210129200"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Abhijeet Shrivastava","raw_affiliation_strings":["Fifth-year law students at Jindal Global Law School, O.P. Jindal Global University , Haryana , India"],"affiliations":[{"raw_affiliation_string":"Fifth-year law students at Jindal Global Law School, O.P. Jindal Global University , Haryana , India","institution_ids":["https://openalex.org/I4210129200"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085775803","display_name":"Rudraksh Lakra","orcid":null},"institutions":[{"id":"https://openalex.org/I4210129200","display_name":"O. P. Jindal Global University","ror":"https://ror.org/03j2ta742","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210129200"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rudraksh Lakra","raw_affiliation_strings":["Fifth-year law students at Jindal Global Law School, O.P. Jindal Global University , Haryana , India"],"affiliations":[{"raw_affiliation_string":"Fifth-year law students at Jindal Global Law School, O.P. Jindal Global University , Haryana , India","institution_ids":["https://openalex.org/I4210129200"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5104023901"],"corresponding_institution_ids":["https://openalex.org/I4210129200"],"apc_list":{"value":4151,"currency":"USD","value_usd":4151},"apc_paid":null,"fwci":1.6164,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88054781,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"30","issue":"3","first_page":"321","last_page":"349"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8307861685752869},{"id":"https://openalex.org/keywords/due-diligence","display_name":"Due diligence","score":0.7854958772659302},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.6800943613052368},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6232377886772156},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6176196336746216},{"id":"https://openalex.org/keywords/obligation","display_name":"Obligation","score":0.47364628314971924},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.462261825799942},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.42888781428337097},{"id":"https://openalex.org/keywords/legal-aspects-of-computing","display_name":"Legal aspects of computing","score":0.41316959261894226},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4061335325241089},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.3961176872253418},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.35690969228744507},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.24399462342262268},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.188177227973938},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.15607625246047974},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.14883247017860413}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8307861685752869},{"id":"https://openalex.org/C2781016034","wikidata":"https://www.wikidata.org/wiki/Q794134","display_name":"Due diligence","level":2,"score":0.7854958772659302},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.6800943613052368},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6232377886772156},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6176196336746216},{"id":"https://openalex.org/C2778447849","wikidata":"https://www.wikidata.org/wiki/Q2648051","display_name":"Obligation","level":2,"score":0.47364628314971924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.462261825799942},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.42888781428337097},{"id":"https://openalex.org/C67497173","wikidata":"https://www.wikidata.org/wiki/Q977345","display_name":"Legal aspects of computing","level":3,"score":0.41316959261894226},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4061335325241089},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.3961176872253418},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.35690969228744507},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.24399462342262268},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.188177227973938},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.15607625246047974},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.14883247017860413},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/ijlit/eaac021","is_oa":false,"landing_page_url":"https://doi.org/10.1093/ijlit/eaac021","pdf_url":null,"source":{"id":"https://openalex.org/S193514341","display_name":"International Journal of Law and Information Technology","issn_l":"0967-0769","issn":["0967-0769","1464-3693"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Law and Information Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4205097449","https://openalex.org/W3123240097","https://openalex.org/W1011493659","https://openalex.org/W2786975646","https://openalex.org/W2508100466","https://openalex.org/W4386711426","https://openalex.org/W4360909435","https://openalex.org/W4372015197","https://openalex.org/W2911147432","https://openalex.org/W4371792683"],"abstract_inverted_index":{"Abstract":[0],"The":[1,137],"emergence":[2],"of":[3,28,44,60,64,80,83,86,120,126,146,152,164,182,195],"cyberspace":[4],"has":[5],"been":[6,18],"followed":[7],"by":[8,168,221],"increasingly":[9],"unpredictable":[10],"threats":[11],"to":[12,72,101,141,240],"cybersecurity,":[13],"including":[14],"Botnets,":[15,65],"which":[16],"have":[17,37],"frequently":[19],"exploited":[20],"in":[21,48,88],"cyber-criminal":[22],"activities":[23],"affecting":[24],"dozens":[25],"or":[26],"hundreds":[27],"States":[29,87,169,184],"at":[30],"once.":[31],"In":[32,110,206],"existing":[33],"scholarship,":[34],"many":[35],"reasons":[36],"informed":[38],"growing":[39],"support":[40],"for":[41,130],"the":[42,61,73,81,118,150,192,207,236],"promise":[43],"\u2018due":[45],"diligence\u2019":[46],"obligations":[47,153],"regulating":[49],"transboundary":[50,200,247],"cyber":[51,103],"operations.":[52],"We":[53,75],"affirm":[54],"this":[55,214],"position":[56],"through":[57,161],"a":[58,77,143,178,203,243],"study":[59],"specific":[62],"context":[63],"although":[66],"bringing":[67],"much-needed":[68],"caution":[69],"and":[70,91,115,157,170,185],"complexity":[71],"discourse.":[74],"offer":[76],"comprehensive":[78],"account":[79,181],"standard":[82],"conduct":[84,193],"expected":[85,194],"detecting,":[89],"mitigating":[90],"preventing":[92],"Botnet-linked":[93,135],"harms":[94],"under":[95],"due":[96,121,147,232],"diligence;":[97],"as":[98,100,123,224,242],"well":[99],"pursue":[102],"capacity":[104],"building":[105],"toward":[106],"discharging":[107],"these":[108,159],"obligations.":[109],"so":[111],"doing,":[112],"we":[113,176,229],"problematize":[114],"elaborate":[116],"on":[117,202],"nature":[119],"diligence":[122,233],"an":[124,162],"obligation":[125],"conduct,":[127],"therefore":[128],"accounting":[129],"differential":[131],"State":[132],"capacities":[133],"against":[134,173,246],"harms.":[136],"paper":[138],"involves":[139],"attempts":[140],"unpack":[142],"coherent":[144],"conception":[145],"diligence,":[148],"appreciating":[149],"spectrum":[151],"that":[154,217,231],"it":[155],"demands,":[156],"demonstrating":[158],"nuances":[160],"appraisal":[163],"good":[165],"practices":[166],"adopted":[167],"private":[171],"actors":[172],"Botnets.":[174,248],"Consequently,":[175],"provide":[177],"unique":[179],"holistic":[180],"how":[183],"their":[186],"law":[187],"enforcement":[188],"could":[189],"practically":[190],"understand":[191],"them":[196],"when":[197],"faced":[198,220],"with":[199],"Botnets":[201],"case-to-case":[204],"basis.":[205],"end,":[208],"while":[209],"underscoring":[210],"potential":[211],"dilemmas":[212],"within":[213],"legal":[215,244],"regime":[216],"may":[218],"be":[219],"target":[222],"States,":[223],"also":[225],"its":[226],"unresolved":[227],"questions,":[228],"submit":[230],"is":[234],"indeed":[235],"most":[237],"appropriate":[238],"candidate":[239],"act":[241],"arsenal":[245]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
