Journal of Digital Law and Policy最新文献

筛选
英文 中文
Harmonizing Pancasila with Noble Technological Values amidst Digitalization 在数字化进程中使潘查希拉与崇高的技术价值观相协调
Journal of Digital Law and Policy Pub Date : 2024-01-31 DOI: 10.58982/jdlp.v3i2.571
Ananda Rizky Daffana
{"title":"Harmonizing Pancasila with Noble Technological Values amidst Digitalization","authors":"Ananda Rizky Daffana","doi":"10.58982/jdlp.v3i2.571","DOIUrl":"https://doi.org/10.58982/jdlp.v3i2.571","url":null,"abstract":"In the current epoch marked by the swift progression of digitalization, the convergence of enduring principles and state-of-the-art technology assumes a heightened significance. This paper delves into the confluence of Pancasila, the fundamental philosophy of Indonesia, with the dynamic landscape of digitalization. Employing a literature review approach, the research undertakes an exploration of existing scholarly works to shed light on the ways in which Pancasila, anchored in its core tenets of justice, unity, democracy, and humanity, can synchronize with and provide guidance for technological progress. The examination focuses on elucidating how the incorporation of Pancasila can cultivate ethical and conscientious conduct within the digital domain, fostering a societal ethos that champions noble values while embracing the advancements of technology. Through a meticulous analysis of pertinent literature, this article aspires to offer nuanced perspectives on the potential synergy between Pancasila and digitalization. Its ultimate goal is to contribute to the development of a harmonious coexistence between technology and moral values within the Indonesian context. By navigating through the intersections of tradition and innovation, the study seeks to provide valuable insights that pave the way for a balanced integration of Pancasila principles into the rapidly evolving technological landscape, fostering a society where ethical considerations remain at the forefront of progress.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"503 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140471257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis Of The 2nd Principle Of Pancasila On The Instagram Privacy Disclaimer 关于 Instagram 隐私免责声明的潘查希拉第二原则分析
Journal of Digital Law and Policy Pub Date : 2024-01-31 DOI: 10.58982/jdlp.v3i2.533
Berlian Dwipasari, Nicolas Ananta Saputra, Emmy Febriani Thalib
{"title":"Analysis Of The 2nd Principle Of Pancasila On The Instagram Privacy Disclaimer","authors":"Berlian Dwipasari, Nicolas Ananta Saputra, Emmy Febriani Thalib","doi":"10.58982/jdlp.v3i2.533","DOIUrl":"https://doi.org/10.58982/jdlp.v3i2.533","url":null,"abstract":"The article discusses the importance of user privacy on Instagram, a popular social media platform. In the digital era, millions of users share aspects of their personal lives, creating risks of data misuse and security threats. The right to privacy is recognized as a human right, including in the Indonesian Privacy Rights Law. Privacy Controls: Instagram gives users full control, allowing personal account settings. Data Policy: Instagram has a policy that explains the collection, use, and sharing of data, reflecting civilized principles. Data Security: Instagram claims to implement security measures and collaborate with third parties. Privacy Tools and Features: Instagram is constantly developing new privacy tools and features. In the context of Instagram user privacy, the principle of the 2nd Principle, \"Just and Civilized Humanity,\" reflects fair treatment and respect for human rights. The rights to privacy, freedom of expression, data security, and control over personal information are the emphasis in implementing the 2nd Principle. Assessing the use of Instagram's privacy policy by the 2nd Principle and encouraging users to be wise in sharing information. A mixed method approach with descriptive qualitative methods and literature studies is used to understand the impact of Instagram user privacy. Privacy is a human right, and Instagram is expected to implement the principles of the 2nd Principle with policies that support the control, security, and fair treatment of users' data.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"487 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140480103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Religious Conflicts On Social Media Based On The First Principle Of Pancasila 基于潘查希拉第一原则分析社交媒体上的宗教冲突
Journal of Digital Law and Policy Pub Date : 2024-01-31 DOI: 10.58982/jdlp.v3i2.545
Kadek Yoga Artha Yudha, Nikita Maharani, M. Muhammadong
{"title":"Analyzing Religious Conflicts On Social Media Based On The First Principle Of Pancasila","authors":"Kadek Yoga Artha Yudha, Nikita Maharani, M. Muhammadong","doi":"10.58982/jdlp.v3i2.545","DOIUrl":"https://doi.org/10.58982/jdlp.v3i2.545","url":null,"abstract":"The development of communication technology is accelerating. Whatever happens in Indonesia can easily be sent through the Internet network. Social media is a communication and marketing tool where people can share their thoughts, ideas and experiences with others. It is a form of electronic media that allows people to create content and share it with the public. Social media has many positive and negative effects on society. If people do not use social media wisely and it goes viral, it can lead to unwanted conflicts. One of them is the religious conflict that is currently widespread, thus becoming a real threat to the Indonesian nation. The threat is not only in the real world, but also in cyberspace. Many people are indirectly uploading what is on their minds to social media, which can cause others to be offended. This is the beginning of religious conflict on social media. This is where the role of the government as well as the community is to understand that we live together in differences of ethnicity, religion and language. The role of the government can also be to firmly control the application of press laws and journalistic ethics. In addition, the role of the community is also important, namely by not being easily provoked by media coverage that is not balanced and seems to favor one particular group.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"66 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140477401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Cyberbullying from a Pancasila Perspective 从潘查希拉的视角分析网络欺凌问题
Journal of Digital Law and Policy Pub Date : 2024-01-31 DOI: 10.58982/jdlp.v3i2.537
Mario. B. Bagus Wahyu Pujianto, Ni Made Windi Astiti Putri, Evelyn Angelita Pinondang Manurung
{"title":"Analysis of Cyberbullying from a Pancasila Perspective","authors":"Mario. B. Bagus Wahyu Pujianto, Ni Made Windi Astiti Putri, Evelyn Angelita Pinondang Manurung","doi":"10.58982/jdlp.v3i2.537","DOIUrl":"https://doi.org/10.58982/jdlp.v3i2.537","url":null,"abstract":"The rapid development in the field of technology has brought various positive and negative impacts. There are many typical crimes that occur, one of which is cyberbullying. These crimes take the form of oppression, insults, psychological violence or intimidation in cyberspace which is carried out repeatedly which is intended to embarrass, spread ugliness and hatred, intimidation which is directed directly or openly through digital devices and platforms such as social media, email, messaging applications, and gaming sites exist. Apart from that, there are several fundamental factors that form the background to the perpetrator's behavior and the impacts it causes. Cyberbullying cases are considered a violation of the 2nd and 5th principles of Pancasila. In responding to the problem of cyberbullying, Indonesia has sufficient laws and regulations to crack down on this criminal act of cyberbullying, one of which is Law Number 11 of 2008 concerning Information and Electronic Transactions (ITE). By applying Pancasila values ??and understanding applicable laws, efforts to prevent and handle cyberbullying can be improved, creating a safer and more positive social media environment, especially for the nation's next generation. This research aims to determine the meaning, impact and ways to overcome it that are useful for provide knowledge to everyone. This research is research that uses a descriptive method in the type of literature study by describing, illustrating, explaining and analyzing the situation and conditions of the problem object from the researcher's perspective based on the results of the literature review.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"41 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140478909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phenomenom Cyber Crime in Indonesia in the Digitalization Era 数字化时代印度尼西亚的网络犯罪现象
Journal of Digital Law and Policy Pub Date : 2024-01-31 DOI: 10.58982/jdlp.v3i2.549
Kadek Devina Ellyona Putri, Mariano Wawan Latbin, Gerald Aldytia Bunga
{"title":"Phenomenom Cyber Crime in Indonesia in the Digitalization Era","authors":"Kadek Devina Ellyona Putri, Mariano Wawan Latbin, Gerald Aldytia Bunga","doi":"10.58982/jdlp.v3i2.549","DOIUrl":"https://doi.org/10.58982/jdlp.v3i2.549","url":null,"abstract":"Science and technology are increasingly developing rapidly and advancing, offering various interactions in human life. Information and communication technology continues to develop in the digital era, especially the internet, which has a big influence on people's life patterns. The development of the internet has triggered the emergence of a type of cyber crime which is usually known as Cyber Crime. Various cases of cyber crime (Cyber Crime) have emerged in Indonesia, especially in the banking sector. In the following years until now, in Indonesia there have been many incidents of Cyber Crime, for example computer program piracy, cracking, bank burglary (banking fraud), unauthorized use of other parties' credit cards (carding), pornography, including crimes against domain names (domain names). Cyber Crime could happen because unlimited internet access. Apart from that, computer user negligence is also often the cause of this Cyber Crime. This is something that is often overlooked, namely a weak network security system. In fact, a weak network security system creates a big loophole for people who intend to commit crimes. Currently, what is used as the legal basis for Cyber ??Crime cases in Indonesia isLaw Number 11 of 2008 concerning Information and Electronic Transactions (ITE). The ITE Law consists of 13 chapters and 54 articles which explain in detail the rules for living in cyberspace and the transactions that occur therein. Prohibited acts (cybercrime) are explained in Chapter VII (Articles 27-37)","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"667 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140479384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercrime and Threats to the Electoral System 网络犯罪和对选举制度的威胁
Journal of Digital Law and Policy Pub Date : 2023-09-30 DOI: 10.58982/jdlp.v3i1.508
Ni Komang Triana Andini, Ni Made Ayu Nadia Putri Damayanti, Ni Kadek Wintan Purnama Sari, Egidius Fkun, Moh. Erkamim
{"title":"Cybercrime and Threats to the Electoral System","authors":"Ni Komang Triana Andini, Ni Made Ayu Nadia Putri Damayanti, Ni Kadek Wintan Purnama Sari, Egidius Fkun, Moh. Erkamim","doi":"10.58982/jdlp.v3i1.508","DOIUrl":"https://doi.org/10.58982/jdlp.v3i1.508","url":null,"abstract":"Cyberattacks have emerged as a growing threat in the context of elections worldwide, posing significant risks to the integrity, security, and trustworthiness of electoral systems in today's digital age where information technology plays a pivotal role. Drawing from documented cyberattack cases and security reports from government agencies and related organizations during elections, common attack types such as Denial-of-Service (DoS), Phishing, and Malware have been identified. Cybersecurity systems and data sovereignty form the bedrock of personal data protection. As technology advances, data has become a highly valuable commodity, and a nation's data sovereignty intersects with the private sector on a global scale in political and economic terms. The state's primary responsibility lies in crafting regulations for data protection and cybersecurity, ensuring citizens' rights to personal data protection, which necessitates enhancing their capacity and capabilities. Therefore, this qualitative research delves into the imperative of developing citizens' capacity and capabilities in building cybersecurity and data sovereignty, with a particular focus on safeguarding personal data in the Indonesian context, as books and journal articles serve as valuable sources for data collection. Bolstering citizens' capacity and capabilities is essential for preserving their personal data in the digital realm.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136342899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Examination of Cybercrimes Leading to Vulnerabilities in Energy, Transportation, and Financial Systems 对导致能源、交通和金融系统脆弱性的网络犯罪的研究
Journal of Digital Law and Policy Pub Date : 2023-09-30 DOI: 10.58982/jdlp.v3i1.509
Ni Ketut Tri Srilaksmi, Moh. Erkamim, Naylah Dzakiah, Ngakan Kompiang Adi Suardana, Ni Kadek Sri Devi Putri Swambini
{"title":"An Examination of Cybercrimes Leading to Vulnerabilities in Energy, Transportation, and Financial Systems","authors":"Ni Ketut Tri Srilaksmi, Moh. Erkamim, Naylah Dzakiah, Ngakan Kompiang Adi Suardana, Ni Kadek Sri Devi Putri Swambini","doi":"10.58982/jdlp.v3i1.509","DOIUrl":"https://doi.org/10.58982/jdlp.v3i1.509","url":null,"abstract":"The commencement of the current decade is the primary milestone in the progression from Industry 4.0 to Society 5.0. The contemporary period necessitates the ability of individuals from all strata of society to effectively acclimate to the rapid advancements in technology. In the context of Society 5.0, which emphasizes the central role of human beings in generating novel value through technical advancements, there exists the potential to mitigate future disparities among individuals and address economic challenges. The potential risks that may emerge are diverse, intangible in tangible terms, and characterized by uncertainty. The aforementioned threat is a cyber threat that possesses the capacity to inflict significant losses upon a nation. One potential future development of significant consequence involves the occurrence of cyberattacks against essential national assets or critical infrastructure, including but not limited to renewable energy facilities, transportation networks, and financial institutions. Hence, it is imperative for all nations to possess the capability to effectively organize training programs, establish fresh military units, and enhance their individual national defense capabilities. In brief, the text elucidates the prevailing societal transition towards Society 5.0, which underscores the vital role of humans in technology progress. This highlights the potential advantages of this transition, such as the mitigation of inequalities and economic difficulties, while also stressing the importance of implementing strong cybersecurity protocols to prevent possible cyber risks in this dynamic technological environment.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Discussion of Malware Attacks Targeting Smart Homes and Connected Devices: Investigating Cybersecurity Risks in Everyday Living 讨论针对智能家居和连接设备的恶意软件攻击:调查日常生活中的网络安全风险
Journal of Digital Law and Policy Pub Date : 2023-09-30 DOI: 10.58982/jdlp.v3i1.507
I Gede Adnyana, Emmy Febriani Thalib, Mariano Alan Harum, Martha Apriliani Chionia Nagas, Martinus Wilfrid Jawa
{"title":"A Discussion of Malware Attacks Targeting Smart Homes and Connected Devices: Investigating Cybersecurity Risks in Everyday Living","authors":"I Gede Adnyana, Emmy Febriani Thalib, Mariano Alan Harum, Martha Apriliani Chionia Nagas, Martinus Wilfrid Jawa","doi":"10.58982/jdlp.v3i1.507","DOIUrl":"https://doi.org/10.58982/jdlp.v3i1.507","url":null,"abstract":"Computer technology has advanced with the digital age. Software for several platforms is crucial to streamlining human work with computers. This software is essential for many user tasks, including IoT ones. Through data exploitation and communication technologies, the Internet of entities (IoT) connects physical and virtual entities to the global web. This technology aims to make it easier for humans to interact with objects and let them communicate. In daily life, numerous specialized gadgets use the Internet of Things (IoT), especially Smart Homes. Smart Homes integrate networked communication networks with home devices for remote control, monitoring, and access. The name \"Smart\" in Smart Homes suggests intelligence, however IoT devices have limitations. Malware is purposely designed to disrupt or gain unauthorized access to computer systems without the system owner's knowledge or agreement. Malware threatens smart home security widely. Malware can also quickly regenerate and adapt as technology advances. It's often integrated into popular online apps. This study examines how malware assaults affect IoT and Smart Home devices. The study's conclusions include an analytical report on IoT and Smart Home malware mitigation in legal perspectives.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citizenship in the Digital Age: Implications and Challenges 数字时代的公民身份:影响与挑战
Journal of Digital Law and Policy Pub Date : 2023-09-30 DOI: 10.58982/jdlp.v3i1.510
I Kadek Adi Permana, I Kadek Agus Suardika Yasa, I Kadek Ari Dwi Saputra, I Putu Raditya Sudwika
{"title":"Citizenship in the Digital Age: Implications and Challenges","authors":"I Kadek Adi Permana, I Kadek Agus Suardika Yasa, I Kadek Ari Dwi Saputra, I Putu Raditya Sudwika","doi":"10.58982/jdlp.v3i1.510","DOIUrl":"https://doi.org/10.58982/jdlp.v3i1.510","url":null,"abstract":"The significance of digital citizenship necessitates consideration in the context of an ever-evolving digital age. Digital citizenship is crucial in the digital age. This essay explores the importance of ethical digital citizenship in technology use. This study examines the implications and challenges of positive digital citizenship. This essay emphasizes digital citizenship and responsible technology use. Individuals and society must consider privacy, security, and ethics when using technology responsibly. Irresponsible technology use can lead to data misuse, propagating misinformation, and online violence. Additionally, this paper emphasizes digital citizenship ethics. Digital citizenship ethics include fairness, respecting others' rights, and fostering technology goodness. We must consider the social, political, and cultural effects of our digital activity. In tackling rising difficulties, this article suggests numerous ways to promote responsible and ethical digital citizenship. These measures include responsible technology usage education, ethical digital policies, and empowerment of individuals and communities to practice digital citizenship. Responsible and ethical digital citizenship can promote a more inclusive, safe, and beneficial digital environment for individuals and society. In an age where technology dominates our lives, digital citizenship must be part of active involvement in digital society.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136342787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Existence Of The International Anarcho-Syndicalism Movement Based On Indonesian Law Perspective 从印尼法的视角看国际无政府工团主义运动的存在
Journal of Digital Law and Policy Pub Date : 2023-09-30 DOI: 10.58982/jdlp.v3i1.322
Ledy Nelsih Rumala, Jeffry A. Ch. Likadja, Viktor Eben Sabuna
{"title":"Existence Of The International Anarcho-Syndicalism Movement Based On Indonesian Law Perspective","authors":"Ledy Nelsih Rumala, Jeffry A. Ch. Likadja, Viktor Eben Sabuna","doi":"10.58982/jdlp.v3i1.322","DOIUrl":"https://doi.org/10.58982/jdlp.v3i1.322","url":null,"abstract":"Anarcho-syndicalism is an ideology in which workers want to work freely, not bound by rules. Anarcho-syndicalism is an ideology that wants the dissolution of all political power institutions that are narrated to oppress and exploit workers to be replaced by free communities bound by socio-economic interests. This research aims to find out the existence of the anarcho-syndicalist movement based on international law and the readiness of national law in facing the threat of anarcho-syndicalist ideology in Indonesia. The research method used in this research is normative legal research (library research) which has relevance to the research issues studied. Sources and legal materials used are primary, secondary, and tertiary legal materials. Based on the results of the research that has been carried out, it is known that the existence of the anarcho-syndicalism movement in terms of International Law has an impact on the application of the Right to freedom of association for workers/laborers as regulated in ILO (International Labour Organization) Convention No. 87 of 1948 concerning freedom of association and protection of the right to organize. Furthermore, the State has regulated people who join organizations to commit criminal offenses or prohibited organizations will be subject to imprisonment or fines, namely by what is written in the Criminal Code/KUHP (Kitab Undang-Undang Hukum Pidana) Article 261 concerning Participation in Organisations to commit Criminal Offences.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信