International cybersecurity law review最新文献

筛选
英文 中文
Analysis of the cybersecurity ecosystem in the European Union 欧盟网络安全生态系统分析
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00048-9
Zsolt Bederna, Zóltan Rajnai
{"title":"Analysis of the cybersecurity ecosystem in the European Union","authors":"Zsolt Bederna, Zóltan Rajnai","doi":"10.1365/s43439-022-00048-9","DOIUrl":"https://doi.org/10.1365/s43439-022-00048-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"5 1","pages":"35-49"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82659590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act 人工智能的网络安全认证:错失协调《人工智能法案》和《网络安全法》的机会
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-021-00043-6
Federica Casarosa
{"title":"Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-021-00043-6","DOIUrl":"https://doi.org/10.1365/s43439-021-00043-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"62 ","pages":"115-130"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72431079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act 更正:人工智能的网络安全认证:错失了协调《人工智能法案》和《网络安全法》的机会
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00053-y
Federica Casarosa
{"title":"Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-022-00053-y","DOIUrl":"https://doi.org/10.1365/s43439-022-00053-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"71 1","pages":"245"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88612352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USA: Department of Justice’s new civil cyber-fraud initiative and its implications 美国:司法部新的民事网络欺诈倡议及其影响
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00050-1
A. Spies
{"title":"USA: Department of Justice’s new civil cyber-fraud initiative and its implications","authors":"A. Spies","doi":"10.1365/s43439-022-00050-1","DOIUrl":"https://doi.org/10.1365/s43439-022-00050-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"5 1","pages":"139-145"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72501981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity regulation in Brazil and Latin America: an overview 巴西和拉丁美洲的网络安全监管:概述
International cybersecurity law review Pub Date : 2022-05-24 DOI: 10.1365/s43439-022-00055-w
R. Carapeto, Ana Luíza Calil
{"title":"Cybersecurity regulation in Brazil and Latin America: an overview","authors":"R. Carapeto, Ana Luíza Calil","doi":"10.1365/s43439-022-00055-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00055-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"35 1","pages":"385-410"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm” 人工智能对法律的挑战:以“医生算法”为例
International cybersecurity law review Pub Date : 2022-03-11 DOI: 10.1365/s43439-022-00047-w
Benedikt Buchner
{"title":"Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm”","authors":"Benedikt Buchner","doi":"10.1365/s43439-022-00047-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00047-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"20 1","pages":"181 - 190"},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74341482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Cybersecurity in hospitals-Part 1: IT compliance as a management task]. [医院的网络安全第1部分:作为管理任务的信息技术合规性]。
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-04-13 DOI: 10.1365/s43439-022-00049-8
Diana Nadeborn, Tilmann Dittrich
{"title":"[Cybersecurity in hospitals-Part 1: IT compliance as a management task].","authors":"Diana Nadeborn, Tilmann Dittrich","doi":"10.1365/s43439-022-00049-8","DOIUrl":"10.1365/s43439-022-00049-8","url":null,"abstract":"<p><p>The threat of cyber attacks is a burning issue in all industries. In the case of hospitals, a cyber incident can not only lead to the loss of patient data but can also put patients' lives in danger. Hospitals are therefore obliged by a large number of laws to maintain sufficient protective measures. Monitoring compliance with these regulations is the responsibility of hospital managers. This is an important compliance task. Cyber insurance can be part of the solution. Particular caution is required when paying ransoms in the event of ransomware attacks.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"147-161"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9005917/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9913128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Potential security and privacy issues in zero UI touchless technology. 零用户界面无接触技术中潜在的安全和隐私问题。
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-04-19 DOI: 10.1365/s43439-022-00052-z
Muhammad Zahid Iqbal, Abraham G Campbell
{"title":"Potential security and privacy issues in zero UI touchless technology.","authors":"Muhammad Zahid Iqbal, Abraham G Campbell","doi":"10.1365/s43439-022-00052-z","DOIUrl":"10.1365/s43439-022-00052-z","url":null,"abstract":"<p><p>Touchless technology often called Zero User Interface (UI) has begun to permeate every aspect of our lives as its use became necessary for hygiene measures in public places. The evolution of touchless technology replacing touchscreen interaction started as a luxury concept to give a fancier look to digital interactions, but now it has gained real value as a health-oriented interaction method. Switching to a touchless interface reduces common touchpoints, which help to safeguard against the spread of pathogens. Although the evolution of touchless technology is not new, its use massively increased due to its inherent hygienic nature during the COVID-19 pandemic. However, this investment in a new form of digital interaction has several privacy and security issues that need attention, in order to allow for safe human-machine interaction to cope with security breaches and cyber-attacks to protect our credentials. This paper outlines the potential security and privacy issues concerning Zero UI adoption in various technologies that need to be considered if one wishes to adopt responsible technology practices with this technology.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"131-137"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9017080/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial. 社论
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-10-10 DOI: 10.1365/s43439-022-00066-7
Carsten Dochow
{"title":"Editorial.","authors":"Carsten Dochow","doi":"10.1365/s43439-022-00066-7","DOIUrl":"10.1365/s43439-022-00066-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"247-254"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9549817/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange. 了解西班牙网络安全治理的多元格局:资本交换问题。
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-11-09 DOI: 10.1365/s43439-022-00069-4
Cristina Del-Real, Antonio M Díaz-Fernández
{"title":"Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange.","authors":"Cristina Del-Real, Antonio M Díaz-Fernández","doi":"10.1365/s43439-022-00069-4","DOIUrl":"10.1365/s43439-022-00069-4","url":null,"abstract":"<p><p>This paper empirically explores the contribution and collaborative networks of public and private actors to cybersecurity provision in Spain. The article draws on data from three sources: policy and legal documents, a Delphi study with cybersecurity experts, and 34 interviews. Rooted in the theoretical underpinnings of nodal governance and anchored pluralism, the paper argues that the position of actors and public-private collaboration dynamics involved in cybersecurity governance can be understood through the analysis of capital exchange. Therefore, the study provides a list of the most relevant nodes for cybersecurity in Spain, assesses the capital they possess and how they exchange it through collaborative networks and explores the characteristics and barriers of these collaborative relationships. Analyses reveal that public organisations hold a preeminent position in cybersecurity governance despite large technology corporations' greater economic and cultural capital. Remarkably, the paper identifies the central position of new public bodies in the network of cybersecurity nodes. Moreover, cultural barriers that are hindering public-private collaboration in Spain are identified. These results indicate that, despite the state's difficulties in providing public solutions to cybersecurity challenges, Spain is an example of how governance can be anchored in public bodies through symbolic and social capital.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"313-343"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9645327/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10294640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信