International cybersecurity law review最新文献

筛选
英文 中文
Das E-Rezept-Konzept als neuer Sicherheitsstandard für elektronische Verordnungen?! 电子处方概念是电子处方的新安全标准?
International cybersecurity law review Pub Date : 2023-11-23 DOI: 10.1365/s43439-023-00103-z
Karl-Heinz Sydow, A. Schmitz
{"title":"Das E-Rezept-Konzept als neuer Sicherheitsstandard für elektronische Verordnungen?!","authors":"Karl-Heinz Sydow, A. Schmitz","doi":"10.1365/s43439-023-00103-z","DOIUrl":"https://doi.org/10.1365/s43439-023-00103-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"87 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139243053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How do cybercriminals launder the proceeds of their crimes? 网络犯罪分子如何清洗犯罪所得?
International cybersecurity law review Pub Date : 2023-11-22 DOI: 10.1365/s43439-023-00104-y
Fabian Teichmann, Sonia R. Boticiu
{"title":"How do cybercriminals launder the proceeds of their crimes?","authors":"Fabian Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-023-00104-y","DOIUrl":"https://doi.org/10.1365/s43439-023-00104-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"59 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139247774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stärkung des schwächsten Glieds: Koordinierung der Cybersicherheit in Lieferketten und Wettbewerbsregeln 加强最薄弱环节:协调供应链中的网络安全和竞争规则
International cybersecurity law review Pub Date : 2023-11-17 DOI: 10.1365/s43439-023-00102-0
Masaki Iwasaki
{"title":"Stärkung des schwächsten Glieds: Koordinierung der Cybersicherheit in Lieferketten und Wettbewerbsregeln","authors":"Masaki Iwasaki","doi":"10.1365/s43439-023-00102-0","DOIUrl":"https://doi.org/10.1365/s43439-023-00102-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity, capability, and collaboration: a qualitative analysis of international cybercrime investigations from the perspective of Canadian investigators 能力、能力和协作:从加拿大调查人员的角度对国际网络犯罪调查进行定性分析
International cybersecurity law review Pub Date : 2023-10-20 DOI: 10.1365/s43439-023-00101-1
Ryan Buhrig
{"title":"Capacity, capability, and collaboration: a qualitative analysis of international cybercrime investigations from the perspective of Canadian investigators","authors":"Ryan Buhrig","doi":"10.1365/s43439-023-00101-1","DOIUrl":"https://doi.org/10.1365/s43439-023-00101-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ratifying an international treaty: Is it enough? (Shortcomings of the ratification of the Budapest Convention by Greece) 批准国际条约:这就够了吗?(希腊批准《布达佩斯公约》的缺点)
International cybersecurity law review Pub Date : 2023-09-06 DOI: 10.1365/s43439-023-00099-6
Emmanouil Metaxakis
{"title":"Ratifying an international treaty: Is it enough? (Shortcomings of the ratification of the Budapest Convention by Greece)","authors":"Emmanouil Metaxakis","doi":"10.1365/s43439-023-00099-6","DOIUrl":"https://doi.org/10.1365/s43439-023-00099-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89055554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming 对渗透测试和红队的好处、挑战和法律方面的概述
International cybersecurity law review Pub Date : 2023-09-04 DOI: 10.1365/s43439-023-00100-2
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-023-00100-2","DOIUrl":"https://doi.org/10.1365/s43439-023-00100-2","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84234136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Road to homogenization? Argentina publishes a new bill to replace the Personal Data Protection Law 同质化之路?阿根廷公布了一项新法案,以取代《个人数据保护法》
International cybersecurity law review Pub Date : 2023-08-30 DOI: 10.1365/s43439-023-00098-7
Diego Fernández, José L. Barbero
{"title":"Road to homogenization? Argentina publishes a new bill to replace the Personal Data Protection Law","authors":"Diego Fernández, José L. Barbero","doi":"10.1365/s43439-023-00098-7","DOIUrl":"https://doi.org/10.1365/s43439-023-00098-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88108839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The outcome efficacy of the entity risk management requirements of the NIS 2 Directive NIS 2指令中实体风险管理要求的结果有效性
International cybersecurity law review Pub Date : 2023-08-17 DOI: 10.1365/s43439-023-00097-8
Donald David Stewart Ferguson
{"title":"The outcome efficacy of the entity risk management requirements of the NIS 2 Directive","authors":"Donald David Stewart Ferguson","doi":"10.1365/s43439-023-00097-8","DOIUrl":"https://doi.org/10.1365/s43439-023-00097-8","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82285770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware-Angriffe im Kontext der generativen künstlichen Intelligenz − eine experimentelle Studie Ransomware-Angriffe−人工智能领域的范围内创造一个实验研究
International cybersecurity law review Pub Date : 2023-08-07 DOI: 10.1365/s43439-023-00094-x
Fabian Teichmann
{"title":"Ransomware-Angriffe im Kontext der generativen künstlichen Intelligenz − eine experimentelle Studie","authors":"Fabian Teichmann","doi":"10.1365/s43439-023-00094-x","DOIUrl":"https://doi.org/10.1365/s43439-023-00094-x","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74399377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Examining the institutional and legislative frameworks for enforcing cybersecurity in Zimbabwe 审查在津巴布韦实施网络安全的制度和立法框架
International cybersecurity law review Pub Date : 2023-07-27 DOI: 10.1365/s43439-023-00093-y
Leon Poshai, A. Chilunjika, Kudakwashe Intauno
{"title":"Examining the institutional and legislative frameworks for enforcing cybersecurity in Zimbabwe","authors":"Leon Poshai, A. Chilunjika, Kudakwashe Intauno","doi":"10.1365/s43439-023-00093-y","DOIUrl":"https://doi.org/10.1365/s43439-023-00093-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79409166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信