From our blog

Are companies responsible for the security of their digital services and products, and to what extent?

Nadia Tjahja

The IoT will remain insecure unless government steps in and fixes the problem. We’re unlikely to get any regulation forcing backbone companies to clean up either DDoS attacks or spam, just as w...

Generative AI models – a fun game that can easily get out of hand? 

Anja Đajić

All your friends have replaced their social media profile pictures with AI-generated avatars, but you do not know where they got them from? Or are you wondering what exactly people are talking ab...

Diplomatic immunity law and jus cogens: Can the relationship result in invalidating the VCDR or the VCCR?

Alan Franklin

Many commentators suggest that the concepts of diplomatic immunity are outdated because they were developed prior to the emergence of fundamental concepts of international human rights law. It is suggested that immuni...

State immunity: Germany revisits earlier ICJ decision and its potential ramifications for diplomatic immunity

Alan Franklin

On 3 February 2012, the International Court of Justice (ICJ) rendered its judgment on the issue of jurisdictional immunity in the case Jurisdictional Immunities of the State (Germany v. Italy: Greece intervening) rega...

Events

July 2021 online courses

26 Jul 21 - 10 Sep 21

Online

July 2020 online courses

20 Jul 20 -

Online

July 2017 online courses

22 Jul 19 -

Online

AI and diplomacy

19 Feb 19 -

United States

Diplo director at ITAPA 2017

14 Nov 17 - 15 Nov 17

Slovakia

Summer online courses

21 Jul 14 -

Online

WikiLeaks and the Future of Diplomacy

11 Jan 11 - 11 Jan 11

Switzerland

Can the United Nations be Taught?

06 Nov 09 -

Switzerland

Resources

2022

Journal of Moral Theology, Vol. 11, Special Issue no. 1, Spring 2022, “Artificial Intelligence”

Journal of Moral Theology dedicated special issue on 'artificial intelligence'.... Read more...

2021

OK Corral 140 Years Later: Between Frontier Violence and the Emerging Rule of Law

It was a hundred and forty years ago today that Wyatt Earp took his group to fight the outlaws of the Clanton gang. It was a bright, windy and chilly day of October 26, 1881 that – without its actors being exactly aware of – paved the way for the rule of law to b... Read more...

2019

International cyber security diplomatic negotiations: Role of Africa in inter-regional cooperation for a global approach on the security and stability of cyberspace

This research paper examines African countries cybersecurity readiness and how Africa can play a role in shaping international negotiations and discussions on global cybersecurity governance.... Read more...

university of malta logo, University of Malta

2019

Diplomatic Security under a Comparative Lens – Or Not?

“Diplomatic security” is the term now usually preferred to “diplomatic protection” for the steps taken by states to safeguard the fabric of their diplomatic and consular missions, the lives of their diplomatic and consular officers, and the integrity of their c... Read more...

diplomatic security a comparative analysis, Diplomatic Security: A Comparative Analysis

2018

Searching for Meaningful Human Control. The April 2018 Meeting on Lethal Autonomous Weapons Systems (Briefing Paper #10)

In this briefing paper, Ms Barbara Rosen Jacobson analyses the debate of the April 2018 meeting of the Group of Governmental Experts (GGE) of the Convention on Certain Conventional Weapons (CCW). The group was established to discuss emerging technologies in the area of... Read more...

web page, Diplomacy