International cybersecurity law review最新文献

筛选
英文 中文
Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act 人工智能的网络安全认证:错失协调《人工智能法案》和《网络安全法》的机会
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-021-00043-6
Federica Casarosa
{"title":"Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-021-00043-6","DOIUrl":"https://doi.org/10.1365/s43439-021-00043-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"62 ","pages":"115-130"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72431079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act 更正:人工智能的网络安全认证:错失了协调《人工智能法案》和《网络安全法》的机会
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00053-y
Federica Casarosa
{"title":"Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-022-00053-y","DOIUrl":"https://doi.org/10.1365/s43439-022-00053-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"71 1","pages":"245"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88612352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USA: Department of Justice’s new civil cyber-fraud initiative and its implications 美国:司法部新的民事网络欺诈倡议及其影响
International cybersecurity law review Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00050-1
A. Spies
{"title":"USA: Department of Justice’s new civil cyber-fraud initiative and its implications","authors":"A. Spies","doi":"10.1365/s43439-022-00050-1","DOIUrl":"https://doi.org/10.1365/s43439-022-00050-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"5 1","pages":"139-145"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72501981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity regulation in Brazil and Latin America: an overview 巴西和拉丁美洲的网络安全监管:概述
International cybersecurity law review Pub Date : 2022-05-24 DOI: 10.1365/s43439-022-00055-w
R. Carapeto, Ana Luíza Calil
{"title":"Cybersecurity regulation in Brazil and Latin America: an overview","authors":"R. Carapeto, Ana Luíza Calil","doi":"10.1365/s43439-022-00055-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00055-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"35 1","pages":"385-410"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm” 人工智能对法律的挑战:以“医生算法”为例
International cybersecurity law review Pub Date : 2022-03-11 DOI: 10.1365/s43439-022-00047-w
Benedikt Buchner
{"title":"Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm”","authors":"Benedikt Buchner","doi":"10.1365/s43439-022-00047-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00047-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"20 1","pages":"181 - 190"},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74341482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Cybersecurity in hospitals-Part 1: IT compliance as a management task]. [医院的网络安全第1部分:作为管理任务的信息技术合规性]。
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-04-13 DOI: 10.1365/s43439-022-00049-8
Diana Nadeborn, Tilmann Dittrich
{"title":"[Cybersecurity in hospitals-Part 1: IT compliance as a management task].","authors":"Diana Nadeborn,&nbsp;Tilmann Dittrich","doi":"10.1365/s43439-022-00049-8","DOIUrl":"10.1365/s43439-022-00049-8","url":null,"abstract":"<p><p>The threat of cyber attacks is a burning issue in all industries. In the case of hospitals, a cyber incident can not only lead to the loss of patient data but can also put patients' lives in danger. Hospitals are therefore obliged by a large number of laws to maintain sufficient protective measures. Monitoring compliance with these regulations is the responsibility of hospital managers. This is an important compliance task. Cyber insurance can be part of the solution. Particular caution is required when paying ransoms in the event of ransomware attacks.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"147-161"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9005917/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9913128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Potential security and privacy issues in zero UI touchless technology. 零用户界面无接触技术中潜在的安全和隐私问题。
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-04-19 DOI: 10.1365/s43439-022-00052-z
Muhammad Zahid Iqbal, Abraham G Campbell
{"title":"Potential security and privacy issues in zero UI touchless technology.","authors":"Muhammad Zahid Iqbal, Abraham G Campbell","doi":"10.1365/s43439-022-00052-z","DOIUrl":"10.1365/s43439-022-00052-z","url":null,"abstract":"<p><p>Touchless technology often called Zero User Interface (UI) has begun to permeate every aspect of our lives as its use became necessary for hygiene measures in public places. The evolution of touchless technology replacing touchscreen interaction started as a luxury concept to give a fancier look to digital interactions, but now it has gained real value as a health-oriented interaction method. Switching to a touchless interface reduces common touchpoints, which help to safeguard against the spread of pathogens. Although the evolution of touchless technology is not new, its use massively increased due to its inherent hygienic nature during the COVID-19 pandemic. However, this investment in a new form of digital interaction has several privacy and security issues that need attention, in order to allow for safe human-machine interaction to cope with security breaches and cyber-attacks to protect our credentials. This paper outlines the potential security and privacy issues concerning Zero UI adoption in various technologies that need to be considered if one wishes to adopt responsible technology practices with this technology.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"131-137"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9017080/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial. 社论
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-10-10 DOI: 10.1365/s43439-022-00066-7
Carsten Dochow
{"title":"Editorial.","authors":"Carsten Dochow","doi":"10.1365/s43439-022-00066-7","DOIUrl":"10.1365/s43439-022-00066-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"247-254"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9549817/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange. 了解西班牙网络安全治理的多元格局:资本交换问题。
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-11-09 DOI: 10.1365/s43439-022-00069-4
Cristina Del-Real, Antonio M Díaz-Fernández
{"title":"Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange.","authors":"Cristina Del-Real,&nbsp;Antonio M Díaz-Fernández","doi":"10.1365/s43439-022-00069-4","DOIUrl":"10.1365/s43439-022-00069-4","url":null,"abstract":"<p><p>This paper empirically explores the contribution and collaborative networks of public and private actors to cybersecurity provision in Spain. The article draws on data from three sources: policy and legal documents, a Delphi study with cybersecurity experts, and 34 interviews. Rooted in the theoretical underpinnings of nodal governance and anchored pluralism, the paper argues that the position of actors and public-private collaboration dynamics involved in cybersecurity governance can be understood through the analysis of capital exchange. Therefore, the study provides a list of the most relevant nodes for cybersecurity in Spain, assesses the capital they possess and how they exchange it through collaborative networks and explores the characteristics and barriers of these collaborative relationships. Analyses reveal that public organisations hold a preeminent position in cybersecurity governance despite large technology corporations' greater economic and cultural capital. Remarkably, the paper identifies the central position of new public bodies in the network of cybersecurity nodes. Moreover, cultural barriers that are hindering public-private collaboration in Spain are identified. These results indicate that, despite the state's difficulties in providing public solutions to cybersecurity challenges, Spain is an example of how governance can be anchored in public bodies through symbolic and social capital.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"313-343"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9645327/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10294640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. 确保网络安全的网络治理研究:网络安全治理概述。
International cybersecurity law review Pub Date : 2022-01-01 Epub Date: 2022-01-11 DOI: 10.1365/s43439-021-00045-4
Serkan Savaş, Süleyman Karataş
{"title":"Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.","authors":"Serkan Savaş,&nbsp;Süleyman Karataş","doi":"10.1365/s43439-021-00045-4","DOIUrl":"10.1365/s43439-021-00045-4","url":null,"abstract":"<p><p>With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"7-34"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8750646/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信