International cybersecurity law review最新文献

筛选
英文 中文
European information regulation in the Ukraine War 乌克兰战争中的欧洲信息管制
International cybersecurity law review Pub Date : 2023-03-09 DOI: 10.1365/s43439-023-00083-0
Sebastian Louven
{"title":"European information regulation in the Ukraine War","authors":"Sebastian Louven","doi":"10.1365/s43439-023-00083-0","DOIUrl":"https://doi.org/10.1365/s43439-023-00083-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"14 1","pages":"249-251"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74839667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dr. Ifeoma Nwafor: Cybercrime and the law: issues and developments in Nigeria. (2022) CLDS Publishing. pp. 1–285 Ifeoma Nwafor博士:尼日利亚的网络犯罪和法律问题与发展。(2022) CLDS出版社。1 - 285页
International cybersecurity law review Pub Date : 2023-01-30 DOI: 10.1365/s43439-023-00080-3
Sizwe Snail ka Mtuze
{"title":"Dr. Ifeoma Nwafor: Cybercrime and the law: issues and developments in Nigeria. (2022) CLDS Publishing. pp. 1–285","authors":"Sizwe Snail ka Mtuze","doi":"10.1365/s43439-023-00080-3","DOIUrl":"https://doi.org/10.1365/s43439-023-00080-3","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"8 1","pages":"253-254"},"PeriodicalIF":0.0,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82723757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The curious case of automated decision-making in India 印度自动化决策的奇特案例
International cybersecurity law review Pub Date : 2023-01-27 DOI: 10.1365/s43439-022-00078-3
P. Ashok
{"title":"The curious case of automated decision-making in India","authors":"P. Ashok","doi":"10.1365/s43439-022-00078-3","DOIUrl":"https://doi.org/10.1365/s43439-022-00078-3","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"28 13","pages":"235-248"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72589586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kritikalität: Von der BSI-KritisV zur NIS2-Richtlinie 被确定者感染了mz
International cybersecurity law review Pub Date : 2023-01-16 DOI: 10.1365/s43439-022-00077-4
Valentin Vogel, Nicolas Ziegler
{"title":"Kritikalität: Von der BSI-KritisV zur NIS2-Richtlinie","authors":"Valentin Vogel, Nicolas Ziegler","doi":"10.1365/s43439-022-00077-4","DOIUrl":"https://doi.org/10.1365/s43439-022-00077-4","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 1","pages":"1-19"},"PeriodicalIF":0.0,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83541302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability management as compliance requirement in product security regulation-a game changer for producers' liability and consequential improvement of the level of security in the Internet of Things? 漏洞管理作为产品安全法规的合规要求——改变物联网中生产者责任和安全水平的游戏规则?
International cybersecurity law review Pub Date : 2023-01-01 DOI: 10.1365/s43439-022-00064-9
Roman Dickmann
{"title":"Vulnerability management as compliance requirement in product security regulation-a game changer for producers' liability and consequential improvement of the level of security in the Internet of Things?","authors":"Roman Dickmann","doi":"10.1365/s43439-022-00064-9","DOIUrl":"https://doi.org/10.1365/s43439-022-00064-9","url":null,"abstract":"<p><p>The article outlines the European Union (EU) regulation of information technology (IT) security in Internet of Things products from a consumer and end user perspective. It starts with civil law and the necessity to address security requirements and specifications in individual contractual terms. Data and consumer protection laws have not helped much, mainly because of missing definitions and levels of applicable security. Two new EU directives reforming the law of obligations may improve the situation for consumers since security is now a named quality requirement, especially for the sale of (digital) goods. Also introduced is the provision of security updates as a contractual duty. But both rule sets address only the traders, not the producers. This is different with the activation of clauses in the radio equipment directive, which sets IT security measures as requirements to be compliant for CE labeling. An important element is the introduction of a vulnerability management system. Details can be found in the draft of technical standard ETSI/EN 303645. The work concludes with a look at the EU's efforts regarding certification schemes and the interaction of all regulation elements, with more liability for insecure products plus the hope for effectiveness.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 1","pages":"21-37"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9483465/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10826774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance. 国家数据保护局(ANPD)在其独立形象中的适当结构的替代方案:克服数字治理时代技术挑战的建议。
International cybersecurity law review Pub Date : 2023-01-01 DOI: 10.1365/s43439-023-00081-2
Gabrielle Bezerra Sales Sarlet, Daniel Piñeiro Rodriguez
{"title":"Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance.","authors":"Gabrielle Bezerra Sales Sarlet,&nbsp;Daniel Piñeiro Rodriguez","doi":"10.1365/s43439-023-00081-2","DOIUrl":"https://doi.org/10.1365/s43439-023-00081-2","url":null,"abstract":"<p><p>This article aims to identify the necessary elements for the independent and democratic structuring of the National Data Protection Authority (ANPD) in its definitive legal profile, as an autarchy under a special regime, so that it can achieve the technical and decision-making autonomy that it was granted by the Brazilian Data Protection Law (LGPD). Drawing on documentary research and findings on similar foreign authorities, it is possible to point out, as a partial result of this analysis, the insufficiency of entrusting such a mission to its recent formal separation from the Direct Administration, being also possible to conclude that the success of the state modernization in the Digital Age will depend, to a large extent, on intertemporal choices able to direct the ANPD towards a structure attentive to technological innovations. To this end, the training and continuing education of the institution's staff, as well as possible agreements to be signed by the entity, such as the alternatives sought by the Courts of Accounts in the field of information and communications technology (ICT), emerge as a determining factor.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 2","pages":"197-211"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9924887/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9428864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Canada's proposed Critical Cyber Systems Protection Act with cybersecurity legal requirements in the EU. 比较加拿大提出的关键网络系统保护法与欧盟的网络安全法律要求。
International cybersecurity law review Pub Date : 2023-01-01 DOI: 10.1365/s43439-023-00082-1
Matt Malone, Russell Walton
{"title":"Comparing Canada's proposed <i>Critical Cyber Systems Protection Act</i> with cybersecurity legal requirements in the EU.","authors":"Matt Malone,&nbsp;Russell Walton","doi":"10.1365/s43439-023-00082-1","DOIUrl":"https://doi.org/10.1365/s43439-023-00082-1","url":null,"abstract":"<p><p>This article examines the Canadian federal government's proposed <i>Critical Cyber Systems Protection Act</i> (CCSPA), compares it with existing and proposed cybersecurity legal requirements in the European Union (EU), and sets out recommendations to address shortcomings of the proposed Canadian legislation. One of the cornerstone components of Bill C‑26, the CCSPA seeks to regulate critical cyber systems in federally regulated private sectors. It represents a significant overhaul of Canadian cybersecurity regulation. However, the current proposed legislation exhibits many flaws, including a commitment to, and entrenchment of, a patchwork approach to regulation that focuses on formal registration; a lack of oversight of its confidentiality provisions; a weak penalty scheme that focuses solely on compliance, not deterrence; and diluted conduct, reporting, and mitigation obligations. To repair these flaws, this article reviews the provisions of the proposed law and compares them with the EU's <i>Directive Concerning Measures for a High Common Level of Security of Network and Information Systems Across the Union</i>, the first EU-wide cybersecurity legislation, as well as its proposed successor, the NIS2 Directive. Where relevant, various other cybersecurity regulations in peer states are discussed. Specific recommendations are put forward.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 2","pages":"165-196"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9975875/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9433082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer security incident response teams: are they legally regulated? The Swiss example. 电脑安全事故应变小组:是否受到法律管制?瑞士的例子。
International cybersecurity law review Pub Date : 2023-01-01 DOI: 10.1365/s43439-022-00070-x
Pauline Meyer, Sylvain Métille
{"title":"Computer security incident response teams: are they legally regulated? The Swiss example.","authors":"Pauline Meyer,&nbsp;Sylvain Métille","doi":"10.1365/s43439-022-00070-x","DOIUrl":"https://doi.org/10.1365/s43439-022-00070-x","url":null,"abstract":"<p><p>Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are an integral part of incident handling capabilities and are increasingly demanded by organizations such as critical infrastructures. They can hold many different skills and are of great interest to organizations in terms of cyber security and, more concretely, cyber incident management. This contribution seeks to analyze the extent to which their activity is regulated under Swiss law, considering that private CSIRTs are not regulated in the same way as governmental and national CSIRTs such as the Computer Emergency Response Team of the Swiss government and official national CERT of Switzerland (GovCERT).</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 1","pages":"39-60"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9923885/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10795862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anforderungen an die Cybersicherheit bei der Erbringung von IT-Dienstleistungen für Arztpraxen sowie Krankenhäuser und Möglichkeiten der Vertragsgestaltung 服务提供医疗办公室、医院和合同起草信息技术服务时的网络安全需求
International cybersecurity law review Pub Date : 2022-12-09 DOI: 10.1365/s43439-022-00075-6
Ole Ziegler
{"title":"Anforderungen an die Cybersicherheit bei der Erbringung von IT-Dienstleistungen für Arztpraxen sowie Krankenhäuser und Möglichkeiten der Vertragsgestaltung","authors":"Ole Ziegler","doi":"10.1365/s43439-022-00075-6","DOIUrl":"https://doi.org/10.1365/s43439-022-00075-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"60 1","pages":"61-77"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90713237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach 当大量拦截通信侵犯隐私权?国家权力的有限性与欧洲人权法院的做法
International cybersecurity law review Pub Date : 2022-12-02 DOI: 10.1365/s43439-022-00074-7
Veljko Turanjanin
{"title":"When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach","authors":"Veljko Turanjanin","doi":"10.1365/s43439-022-00074-7","DOIUrl":"https://doi.org/10.1365/s43439-022-00074-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"52 1","pages":"115-136"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88518048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信