International cybersecurity law review最新文献

筛选
英文 中文
The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate? 鉴于最近的网络威胁,勒索软件攻击的演变。地缘政治冲突如何影响网络气候?
International cybersecurity law review Pub Date : 2023-07-13 DOI: 10.1365/s43439-023-00095-w
F. Teichmann, Sonia R. Boticiu, B. Sergi
{"title":"The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?","authors":"F. Teichmann, Sonia R. Boticiu, B. Sergi","doi":"10.1365/s43439-023-00095-w","DOIUrl":"https://doi.org/10.1365/s43439-023-00095-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"46 5 1","pages":"259 - 280"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91364886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wolfgang A. Rehmann und Christian Tillmanns (Hrsg.): E-Health/Digital Health – Rechtshandbuch. C.H. Beck Verlag München, 2022, 483 Seiten, geb. € 159,–, ISBN 978-3-406-76208-6
International cybersecurity law review Pub Date : 2023-06-22 DOI: 10.1365/s43439-023-00092-z
Carsten Dochow
{"title":"Wolfgang A. Rehmann und Christian Tillmanns (Hrsg.): E-Health/Digital Health – Rechtshandbuch. C.H. Beck Verlag München, 2022, 483 Seiten, geb. € 159,–, ISBN 978-3-406-76208-6","authors":"Carsten Dochow","doi":"10.1365/s43439-023-00092-z","DOIUrl":"https://doi.org/10.1365/s43439-023-00092-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"1 1","pages":"365-369"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72643119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latest technology trends and their cybersecurity implications 最新技术趋势及其对网络安全的影响
International cybersecurity law review Pub Date : 2023-06-15 DOI: 10.1365/s43439-023-00091-0
F. Teichmann, Sonia R. Boticiu, B. Sergi
{"title":"Latest technology trends and their cybersecurity implications","authors":"F. Teichmann, Sonia R. Boticiu, B. Sergi","doi":"10.1365/s43439-023-00091-0","DOIUrl":"https://doi.org/10.1365/s43439-023-00091-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"51 1","pages":"281 - 289"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86169779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An overview of cybercrime law in South Africa. 南非网络犯罪法概览。
International cybersecurity law review Pub Date : 2023-06-02 DOI: 10.1365/s43439-023-00089-8
Sizwe Snail Ka Mtuze, Melody Musoni
{"title":"An overview of cybercrime law in South Africa.","authors":"Sizwe Snail Ka Mtuze,&nbsp;Melody Musoni","doi":"10.1365/s43439-023-00089-8","DOIUrl":"10.1365/s43439-023-00089-8","url":null,"abstract":"<p><p>The COVID-19 pandemic has accelerated the uptake and use of information communication technologies and led to the digital transformation of different sectors of the economy. For South Africa, the COVID-19 pandemic struck at a time when the South African government had committed itself to leveraging technology for the benefit of its citizens, the private sector, and the public sector. By 2020, South Africa already had in place enabling policy and legal frameworks to assist with the regulation of activities taking place in cyberspace. The increase in broadband access has resulted in the increase of internet users. Due to increase in use of digital technologies and processing of personal data, there has been an increase in cyber-attacks and cybercrimes such as data breaches, identity theft and cyber fraud. Several South African based companies, state owned entities, government departments and citizens have been victims of cyber-attacks. To respond to the growing spectre of cybercrime, the South African government promulgated laws to supplement the existing legal framework. It also operationalised some of the laws which had been passed but had not yet come into operation. This paper gives a summary of the evolution of cybercrime laws in South Africa. It starts off by summarising how common law and the Electronic Communications and Transactions Act addressed cybercrime. The paper then proceeds to discuss the recently promulgated Cybercrimes Act, which is now the primary law criminalising certain online activities. It explores how the various provisions of the Cybercrimes Act address different types of cybercrimes known today. This discussion is aimed at demonstrating that South Africa is no longer a safe haven for cybercriminals.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":" ","pages":"1-25"},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10235840/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9689355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored 网络攻击的合规性含义:分布式拒绝服务(DDoS)攻击的探讨
International cybersecurity law review Pub Date : 2023-06-02 DOI: 10.1365/s43439-023-00090-1
F. Teichmann, B. Sergi, Chiara Wittmann
{"title":"The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored","authors":"F. Teichmann, B. Sergi, Chiara Wittmann","doi":"10.1365/s43439-023-00090-1","DOIUrl":"https://doi.org/10.1365/s43439-023-00090-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"12 1","pages":"291 - 298"},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82321978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity incident reporting laws in the Asia Pacific 亚太地区的网络安全事件报告法律
International cybersecurity law review Pub Date : 2023-06-02 DOI: 10.1365/s43439-023-00088-9
Nicholas Seng
{"title":"Cybersecurity incident reporting laws in the Asia Pacific","authors":"Nicholas Seng","doi":"10.1365/s43439-023-00088-9","DOIUrl":"https://doi.org/10.1365/s43439-023-00088-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"44 1","pages":"325 - 346"},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77951905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Australia’s cyber security reform—an update 澳大利亚的网络安全改革——一次更新
International cybersecurity law review Pub Date : 2023-05-08 DOI: 10.1365/s43439-023-00087-w
D. Svantesson
{"title":"Australia’s cyber security reform—an update","authors":"D. Svantesson","doi":"10.1365/s43439-023-00087-w","DOIUrl":"https://doi.org/10.1365/s43439-023-00087-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"202 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77854125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying blockchain to the modern legal system: Kleros as a decentralised dispute resolution system 将区块链应用于现代法律体系:Kleros作为一个分散的争议解决系统
International cybersecurity law review Pub Date : 2023-04-12 DOI: 10.1365/s43439-023-00086-x
A. Zhuk
{"title":"Applying blockchain to the modern legal system: Kleros as a decentralised dispute resolution system","authors":"A. Zhuk","doi":"10.1365/s43439-023-00086-x","DOIUrl":"https://doi.org/10.1365/s43439-023-00086-x","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"18 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73086010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The EU’s cybersecurity framework: the interplay between the Cyber Resilience Act and the NIS 2 Directive 欧盟的网络安全框架:《网络弹性法案》和《NIS 2指令》之间的相互作用
International cybersecurity law review Pub Date : 2023-03-29 DOI: 10.1365/s43439-023-00084-z
P. Eckhardt, Anastasia Kotovskaia
{"title":"The EU’s cybersecurity framework: the interplay between the Cyber Resilience Act and the NIS 2 Directive","authors":"P. Eckhardt, Anastasia Kotovskaia","doi":"10.1365/s43439-023-00084-z","DOIUrl":"https://doi.org/10.1365/s43439-023-00084-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"414 1","pages":"147-164"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78096172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drawing lines: geofence warrants and the third-party doctrine 划清界限:地理防卫令和第三方原则
International cybersecurity law review Pub Date : 2023-03-28 DOI: 10.1365/s43439-023-00085-y
Josh A. Roth
{"title":"Drawing lines: geofence warrants and the third-party doctrine","authors":"Josh A. Roth","doi":"10.1365/s43439-023-00085-y","DOIUrl":"https://doi.org/10.1365/s43439-023-00085-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"73 1 1","pages":"213-233"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83366361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信