International cybersecurity law review最新文献

筛选
英文 中文
Cybersecurity Regulation—Types, Principles, and Country Deep Dives in Asia 网络安全法规--类型、原则和亚洲国家深度剖析
International cybersecurity law review Pub Date : 2024-07-04 DOI: 10.1365/s43439-024-00127-z
Nicholas Seng
{"title":"Cybersecurity Regulation—Types, Principles, and Country Deep Dives in Asia","authors":"Nicholas Seng","doi":"10.1365/s43439-024-00127-z","DOIUrl":"https://doi.org/10.1365/s43439-024-00127-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":" 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141679869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VAT/GST harmonisation challenges for digital assets such as bitcoin and NFTs in the EU following Case C-264/14 (Skatteverket v David Hedqist) 继 C-264/14 号案件(Skatteverket 诉 David Hedqist)之后,比特币和 NFT 等数字资产在欧盟面临的增值税/消费税协调挑战
International cybersecurity law review Pub Date : 2024-07-02 DOI: 10.1365/s43439-024-00124-2
Stephanie Ness
{"title":"VAT/GST harmonisation challenges for digital assets such as bitcoin and NFTs in the EU following Case C-264/14 (Skatteverket v David Hedqist)","authors":"Stephanie Ness","doi":"10.1365/s43439-024-00124-2","DOIUrl":"https://doi.org/10.1365/s43439-024-00124-2","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024 尼日利亚的网络跟踪:尼日利亚网络犯罪(禁止、预防等)(修订)法》(2024 年)第 24 条的探索性研究
International cybersecurity law review Pub Date : 2024-07-01 DOI: 10.1365/s43439-024-00126-0
I. E. Nwafor
{"title":"Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024","authors":"I. E. Nwafor","doi":"10.1365/s43439-024-00126-0","DOIUrl":"https://doi.org/10.1365/s43439-024-00126-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"39 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shared intelligence, enhanced resilience: sharing cyber threat information and intelligence under DORA 共享情报,增强复原力:根据《网络威胁评估和报告法》共享网络威胁信息和情报
International cybersecurity law review Pub Date : 2024-05-03 DOI: 10.1365/s43439-024-00121-5
Gerd Waschbusch, Ben Schlenker
{"title":"Shared intelligence, enhanced resilience: sharing cyber threat information and intelligence under DORA","authors":"Gerd Waschbusch, Ben Schlenker","doi":"10.1365/s43439-024-00121-5","DOIUrl":"https://doi.org/10.1365/s43439-024-00121-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"125 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141017170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-layered security model to counter social engineering attacks: a learning-based approach 应对社会工程学攻击的多层次安全模型:基于学习的方法
International cybersecurity law review Pub Date : 2024-04-18 DOI: 10.1365/s43439-024-00119-z
Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan
{"title":"A multi-layered security model to counter social engineering attacks: a learning-based approach","authors":"Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan","doi":"10.1365/s43439-024-00119-z","DOIUrl":"https://doi.org/10.1365/s43439-024-00119-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140689925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A literature review of the evolution of sovereignty and borders concepts in cyberspace 关于网络空间主权和边界概念演变的文献综述
International cybersecurity law review Pub Date : 2024-04-16 DOI: 10.1365/s43439-024-00118-0
Yassin Abdalla Abdelkarim
{"title":"A literature review of the evolution of sovereignty and borders concepts in cyberspace","authors":"Yassin Abdalla Abdelkarim","doi":"10.1365/s43439-024-00118-0","DOIUrl":"https://doi.org/10.1365/s43439-024-00118-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140697509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The most impactful ransomware attacks in 2023 and their business implications 2023 年最具影响力的勒索软件攻击及其对企业的影响
International cybersecurity law review Pub Date : 2024-04-10 DOI: 10.1365/s43439-024-00115-3
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"The most impactful ransomware attacks in 2023 and their business implications","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-024-00115-3","DOIUrl":"https://doi.org/10.1365/s43439-024-00115-3","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140717958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber threat intelligence: existing benefits and challenges for law firms and businesses 网络威胁情报:对律师事务所和企业的现有益处和挑战
International cybersecurity law review Pub Date : 2024-04-05 DOI: 10.1365/s43439-024-00117-1
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"Cyber threat intelligence: existing benefits and challenges for law firms and businesses","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-024-00117-1","DOIUrl":"https://doi.org/10.1365/s43439-024-00117-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"49 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140739603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adequate responses to cyber-attacks 充分应对网络攻击
International cybersecurity law review Pub Date : 2024-04-04 DOI: 10.1365/s43439-024-00116-2
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"Adequate responses to cyber-attacks","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-024-00116-2","DOIUrl":"https://doi.org/10.1365/s43439-024-00116-2","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law 报复网络攻击:国际法和网络安全法决策者和执行者的决策框架
International cybersecurity law review Pub Date : 2024-03-27 DOI: 10.1365/s43439-024-00113-5
Sozon Leventopoulos, Kosmas Pipyros, Dimitris Gritzalis
{"title":"Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law","authors":"Sozon Leventopoulos, Kosmas Pipyros, Dimitris Gritzalis","doi":"10.1365/s43439-024-00113-5","DOIUrl":"https://doi.org/10.1365/s43439-024-00113-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"26 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140375552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信