nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis of the cybersecurity ecosystem in the European Union
|
Bederna, Zsolt |
|
|
|
1 |
p. 35-49 |
artikel |
2 |
Anforderungen an die Cybersicherheit bei der Erbringung von IT-Dienstleistungen für Arztpraxen sowie Krankenhäuser und Möglichkeiten der Vertragsgestaltung
|
Ziegler, Ole |
|
|
|
1 |
p. 61-77 |
artikel |
3 |
Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm”
|
Buchner, Benedikt |
|
|
|
1 |
p. 181-190 |
artikel |
4 |
Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective
|
Ramos, Simona |
|
|
|
1 |
p. 1-20 |
artikel |
5 |
Computer security incident response teams: are they legally regulated? The Swiss example
|
Meyer, Pauline |
|
|
|
1 |
p. 39-60 |
artikel |
6 |
Correction to: Contesting sovereignty in cyberspace
|
Assaf, Alaa |
|
|
|
1 |
p. 201 |
artikel |
7 |
Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act
|
Casarosa, Federica |
|
|
|
1 |
p. 245 |
artikel |
8 |
Covid-19: a catalyst for cybercrime?
|
Bou Sleiman, Mohamed |
|
|
|
1 |
p. 37-45 |
artikel |
9 |
Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance
|
Savaş, Serkan |
|
|
|
1 |
p. 7-34 |
artikel |
10 |
Cybersecurity and the risk governance triangle
|
Grotto, Andrew J. |
|
|
|
1 |
p. 77-92 |
artikel |
11 |
Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act
|
Casarosa, Federica |
|
|
|
1 |
p. 115-130 |
artikel |
12 |
Cybersecurity in outsourcing and cloud computing: a growing challenge for contract drafting
|
Bomhard, David |
|
|
|
1 |
p. 161-171 |
artikel |
13 |
Cybersecurity of medical devices: new challenges arising from the AI Act and NIS 2 Directive proposals
|
Biasin, Elisabetta |
|
|
|
1 |
p. 163-180 |
artikel |
14 |
Cybersicherheit in Krankenhäusern – Teil 1: IT-Compliance als Leitungsaufgabe
|
Nadeborn, Diana |
|
|
|
1 |
p. 147-161 |
artikel |
15 |
Cybersicherheit von Gehirn-Computer-Schnittstellen
|
Martini, Mario |
|
|
|
1 |
p. 191-243 |
artikel |
16 |
Das E-Rezept-Konzept als neuer Sicherheitsstandard für elektronische Verordnungen?!
|
Sydow, Karl |
|
|
|
1 |
p. 31-54 |
artikel |
17 |
Desolates IT-Sicherheitsgesetz 2.0 im Anmarsch
|
Atug, Manuel |
|
|
|
1 |
p. 7-17 |
artikel |
18 |
Die vertragliche Ausgestaltung von Pen-Tests – eine praxisgeleitete Analyse auftragstypischer Konstellationen
|
Morgenstern, Jan |
|
|
|
1 |
p. 173-181 |
artikel |
19 |
Editorial
|
Utzerath, Julia |
|
|
|
1 |
p. 1-5 |
artikel |
20 |
Editorial
|
Kipker, Dennis-Kenji |
|
|
|
1 |
p. 1-5 |
artikel |
21 |
European Cybersecurity Certification Schemes and cybersecurity in the EU internal market
|
Stewart Ferguson, Donald David |
|
|
|
1 |
p. 51-114 |
artikel |
22 |
Fortifying the weakest link: cybersecurity coordination in supply chains and competition rules
|
Iwasaki, Masaki |
|
|
|
1 |
p. 21-29 |
artikel |
23 |
Global network security governance trend and China’s practice
|
Wang, Lei |
|
|
|
1 |
p. 93-112 |
artikel |
24 |
Going it alone? UK cybersecurity regulation post-Brexit
|
Walden, Ian |
|
|
|
1 |
p. 19-26 |
artikel |
25 |
Harmonizing open banking in the European Union: an analysis of PSD2 compliance and interrelation with cybersecurity frameworks and standards
|
Gounari, Marianna |
|
|
|
1 |
p. 79-120 |
artikel |
26 |
How do cybercriminals launder the proceeds of their crimes?
|
Teichmann, Fabian |
|
|
|
1 |
p. 67-77 |
artikel |
27 |
How does one negotiate with ransomware attackers?
|
Boticiu, Sonia |
|
|
|
1 |
p. 55-65 |
artikel |
28 |
Incidental data: observation of privacy compromising data on social media platforms
|
Kutschera, Stefan |
|
|
|
1 |
p. 91-114 |
artikel |
29 |
Invalidation of the EU–US Privacy Shield: impact on data protection and data security regarding the transfer of personal data to the United States
|
Neiazy, Victoria |
|
|
|
1 |
p. 27-35 |
artikel |
30 |
Korea’s cybersecurity regulations and enforcement related to security incidents
|
Park, Kwang Bae |
|
|
|
1 |
p. 47-55 |
artikel |
31 |
Kritikalität: Von der BSI-KritisV zur NIS2-Richtlinie
|
Vogel, Valentin |
|
|
|
1 |
p. 1-19 |
artikel |
32 |
Legal challenges of an open web index
|
Erenli, Kai |
|
|
|
1 |
p. 183-194 |
artikel |
33 |
Looking towards Europe? Assessing the prospects of the ECOWAS Cybersecurity Strategy in promoting responsible state behavior
|
Orji, Uchenna Jerome |
|
|
|
1 |
p. 143-168 |
artikel |
34 |
More than malware: unmasking the hidden risk of cybersecurity regulations
|
Kianpour, Mazaher |
|
|
|
1 |
p. 169-212 |
artikel |
35 |
Neue verbrauchervertragsrechtliche Vorgaben für die IT-Sicherheit digitaler Produkte
|
Beucher, Klaus |
|
|
|
1 |
p. 147-159 |
artikel |
36 |
Potential security and privacy issues in zero UI touchless technology
|
Iqbal, Muhammad Zahid |
|
|
|
1 |
p. 131-137 |
artikel |
37 |
Regulation of the European Parliament and the Council on digital operational resilience for the financial sector (DORA)
|
Clausmeier, Dirk |
|
|
|
1 |
p. 79-90 |
artikel |
38 |
Square pegs, round holes, and Indian cybersecurity laws
|
Misra, Aadya |
|
|
|
1 |
p. 57-64 |
artikel |
39 |
State-sponsored cyber operations and international law: book review of Henning Lahmann, Unilateral Remedies to Cyber Operations (Cambridge University Press, 2020) and François Delerue, Cyber Operations and International Law (Cambridge University Press, 2020)
|
Hayashi, Mika |
|
|
|
1 |
p. 195-200 |
artikel |
40 |
The European framework for cybersecurity: strong assets, intricate history
|
Salvaggio, Salvino A. |
|
|
|
1 |
p. 137-146 |
artikel |
41 |
The global governance on automated facial recognition (AFR): ethical and legal opportunities and privacy challenges
|
Bu, Qingxiu |
|
|
|
1 |
p. 113-145 |
artikel |
42 |
The Japanese Basic Act on Cybersecurity and the historical development of the Japanese legal framework for cybersecurity
|
Carapeto, Roberto |
|
|
|
1 |
p. 65-76 |
artikel |
43 |
The trans-national cybercrime court: towards a new harmonisation of cyber law regime in ASEAN
|
Iu, Kwan Yuen |
|
|
|
1 |
p. 121-141 |
artikel |
44 |
USA: Department of Justice’s new civil cyber-fraud initiative and its implications
|
Spies, Axel |
|
|
|
1 |
p. 139-145 |
artikel |
45 |
Vulnerability management as compliance requirement in product security regulation—a game changer for producers’ liability and consequential improvement of the level of security in the Internet of Things?
|
Dickmann, Roman |
|
|
|
1 |
p. 21-37 |
artikel |
46 |
When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach
|
Turanjanin, Veljko |
|
|
|
1 |
p. 115-136 |
artikel |