International cybersecurity law review最新文献

筛选
英文 中文
The European framework for cybersecurity: strong assets, intricate history 欧洲网络安全框架:强大的资产、复杂的历史
International cybersecurity law review Pub Date : 2022-11-28 DOI: 10.1365/s43439-022-00072-9
Salvino A. Salvaggio, Nahuel González
{"title":"The European framework for cybersecurity: strong assets, intricate history","authors":"Salvino A. Salvaggio, Nahuel González","doi":"10.1365/s43439-022-00072-9","DOIUrl":"https://doi.org/10.1365/s43439-022-00072-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"1 1","pages":"137-146"},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83630461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements 《网络弹性法案》:欧盟委员会关于对带有数字元素的产品进行网络安全横向监管的提案
International cybersecurity law review Pub Date : 2022-11-02 DOI: 10.1365/s43439-022-00067-6
P. G. Chiara
{"title":"The Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements","authors":"P. G. Chiara","doi":"10.1365/s43439-022-00067-6","DOIUrl":"https://doi.org/10.1365/s43439-022-00067-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"86 1","pages":"255-272"},"PeriodicalIF":0.0,"publicationDate":"2022-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80011305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: The legal obligation to provide timely security patching and automatic updates 更正至:提供及时的安全补丁和自动更新的法律义务
International cybersecurity law review Pub Date : 2022-10-21 DOI: 10.1365/s43439-022-00068-5
A. Maurushat, Kathy Nguyen
{"title":"Correction to: The legal obligation to provide timely security patching and automatic updates","authors":"A. Maurushat, Kathy Nguyen","doi":"10.1365/s43439-022-00068-5","DOIUrl":"https://doi.org/10.1365/s43439-022-00068-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"27 10","pages":"495"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72421166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study 将网络安全报告纳入SOX是否能够防止美国上市公司的大多数数据泄露?探索性研究
International cybersecurity law review Pub Date : 2022-09-07 DOI: 10.1365/s43439-022-00062-x
Glorin Sebastian
{"title":"Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study","authors":"Glorin Sebastian","doi":"10.1365/s43439-022-00062-x","DOIUrl":"https://doi.org/10.1365/s43439-022-00062-x","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"8 1","pages":"367-383"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78608295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring the trust mechanism of digital intellectual property transactions based on smart contracts 探索基于智能合约的数字知识产权交易信任机制
International cybersecurity law review Pub Date : 2022-09-07 DOI: 10.1365/s43439-022-00061-y
Guilisse La Fortune Nkoua Nkuika, Xiang Yiqun
{"title":"Exploring the trust mechanism of digital intellectual property transactions based on smart contracts","authors":"Guilisse La Fortune Nkoua Nkuika, Xiang Yiqun","doi":"10.1365/s43439-022-00061-y","DOIUrl":"https://doi.org/10.1365/s43439-022-00061-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"175 1","pages":"411-436"},"PeriodicalIF":0.0,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85419888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incidental data: observation of privacy compromising data on social media platforms 附带数据:观察到社交媒体平台上泄露隐私的数据
International cybersecurity law review Pub Date : 2022-08-18 DOI: 10.1365/s43439-022-00071-w
S. Kutschera
{"title":"Incidental data: observation of privacy compromising data on social media platforms","authors":"S. Kutschera","doi":"10.1365/s43439-022-00071-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00071-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"54 1","pages":"91-114"},"PeriodicalIF":0.0,"publicationDate":"2022-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84512618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersicherheit in Krankenhäusern – Teil 2: vom Normalfall zum Notfall 第2部分:正常情况到紧急情况
International cybersecurity law review Pub Date : 2022-08-10 DOI: 10.1365/s43439-022-00060-z
Diana Nadeborn, T. Dittrich
{"title":"Cybersicherheit in Krankenhäusern – Teil 2: vom Normalfall zum Notfall","authors":"Diana Nadeborn, T. Dittrich","doi":"10.1365/s43439-022-00060-z","DOIUrl":"https://doi.org/10.1365/s43439-022-00060-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"93 1","pages":"273-287"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86486129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Avatars in the metaverse: potential legal issues and remedies 虚拟世界中的化身:潜在的法律问题和补救措施
International cybersecurity law review Pub Date : 2022-06-07 DOI: 10.1365/s43439-022-00056-9
Ben Chester Cheong
{"title":"Avatars in the metaverse: potential legal issues and remedies","authors":"Ben Chester Cheong","doi":"10.1365/s43439-022-00056-9","DOIUrl":"https://doi.org/10.1365/s43439-022-00056-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"111 1","pages":"467-494"},"PeriodicalIF":0.0,"publicationDate":"2022-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84211414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
European Cybersecurity Certification Schemes and cybersecurity in the EU internal market 欧洲网络安全认证计划与欧盟内部市场的网络安全
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-021-00044-5
Donald David Stewart Ferguson
{"title":"European Cybersecurity Certification Schemes and cybersecurity in the EU internal market","authors":"Donald David Stewart Ferguson","doi":"10.1365/s43439-021-00044-5","DOIUrl":"https://doi.org/10.1365/s43439-021-00044-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"44 1","pages":"51-114"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80785761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of the cybersecurity ecosystem in the European Union 欧盟网络安全生态系统分析
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00048-9
Zsolt Bederna, Zóltan Rajnai
{"title":"Analysis of the cybersecurity ecosystem in the European Union","authors":"Zsolt Bederna, Zóltan Rajnai","doi":"10.1365/s43439-022-00048-9","DOIUrl":"https://doi.org/10.1365/s43439-022-00048-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"5 1","pages":"35-49"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82659590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信