Tal Z. Zarsky
Vice Dean and Professor, University of Haifa — Faculty of Law. I thank Michael Birnhack and the TIL conference participants for their comments and feedback, and Mickey Zar for her response to this Article. I also thank Shmuel Becher, Frederik Bogesius, Nico van Eijk, Natali Helberger, Ido Kilovaty and the participants in the RPA Communications Lecture devoted to this Article at the University of Amsterdam.
This Article is based on research supported by ERDF CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence (No. CZ.02.1.01/0.0/0.0/16_019/0000822).The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).
If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.
Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.