Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             46 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Analysis of the cybersecurity ecosystem in the European Union Bederna, Zsolt

1 p. 35-49
artikel
2 Anforderungen an die Cybersicherheit bei der Erbringung von IT-Dienstleistungen für Arztpraxen sowie Krankenhäuser und Möglichkeiten der Vertragsgestaltung Ziegler, Ole

1 p. 61-77
artikel
3 Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm” Buchner, Benedikt

1 p. 181-190
artikel
4 Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective Ramos, Simona

1 p. 1-20
artikel
5 Computer security incident response teams: are they legally regulated? The Swiss example Meyer, Pauline

1 p. 39-60
artikel
6 Correction to: Contesting sovereignty in cyberspace Assaf, Alaa

1 p. 201
artikel
7 Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act Casarosa, Federica

1 p. 245
artikel
8 Covid-19: a catalyst for cybercrime? Bou Sleiman, Mohamed

1 p. 37-45
artikel
9 Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance Savaş, Serkan

1 p. 7-34
artikel
10 Cybersecurity and the risk governance triangle Grotto, Andrew J.

1 p. 77-92
artikel
11 Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act Casarosa, Federica

1 p. 115-130
artikel
12 Cybersecurity in outsourcing and cloud computing: a growing challenge for contract drafting Bomhard, David

1 p. 161-171
artikel
13 Cybersecurity of medical devices: new challenges arising from the AI Act and NIS 2 Directive proposals Biasin, Elisabetta

1 p. 163-180
artikel
14 Cybersicherheit in Krankenhäusern – Teil 1: IT-Compliance als Leitungsaufgabe Nadeborn, Diana

1 p. 147-161
artikel
15 Cybersicherheit von Gehirn-Computer-Schnittstellen Martini, Mario

1 p. 191-243
artikel
16 Das E-Rezept-Konzept als neuer Sicherheitsstandard für elektronische Verordnungen?! Sydow, Karl

1 p. 31-54
artikel
17 Desolates IT-Sicherheitsgesetz 2.0 im Anmarsch Atug, Manuel

1 p. 7-17
artikel
18 Die vertragliche Ausgestaltung von Pen-Tests – eine praxisgeleitete Analyse auftragstypischer Konstellationen Morgenstern, Jan

1 p. 173-181
artikel
19 Editorial Utzerath, Julia

1 p. 1-5
artikel
20 Editorial Kipker, Dennis-Kenji

1 p. 1-5
artikel
21 European Cybersecurity Certification Schemes and cybersecurity in the EU internal market Stewart Ferguson, Donald David

1 p. 51-114
artikel
22 Fortifying the weakest link: cybersecurity coordination in supply chains and competition rules Iwasaki, Masaki

1 p. 21-29
artikel
23 Global network security governance trend and China’s practice Wang, Lei

1 p. 93-112
artikel
24 Going it alone? UK cybersecurity regulation post-Brexit Walden, Ian

1 p. 19-26
artikel
25 Harmonizing open banking in the European Union: an analysis of PSD2 compliance and interrelation with cybersecurity frameworks and standards Gounari, Marianna

1 p. 79-120
artikel
26 How do cybercriminals launder the proceeds of their crimes? Teichmann, Fabian

1 p. 67-77
artikel
27 How does one negotiate with ransomware attackers? Boticiu, Sonia

1 p. 55-65
artikel
28 Incidental data: observation of privacy compromising data on social media platforms Kutschera, Stefan

1 p. 91-114
artikel
29 Invalidation of the EU–US Privacy Shield: impact on data protection and data security regarding the transfer of personal data to the United States Neiazy, Victoria

1 p. 27-35
artikel
30 Korea’s cybersecurity regulations and enforcement related to security incidents Park, Kwang Bae

1 p. 47-55
artikel
31 Kritikalität: Von der BSI-KritisV zur NIS2-Richtlinie Vogel, Valentin

1 p. 1-19
artikel
32 Legal challenges of an open web index Erenli, Kai

1 p. 183-194
artikel
33 Looking towards Europe? Assessing the prospects of the ECOWAS Cybersecurity Strategy in promoting responsible state behavior Orji, Uchenna Jerome

1 p. 143-168
artikel
34 More than malware: unmasking the hidden risk of cybersecurity regulations Kianpour, Mazaher

1 p. 169-212
artikel
35 Neue verbrauchervertragsrechtliche Vorgaben für die IT-Sicherheit digitaler Produkte Beucher, Klaus

1 p. 147-159
artikel
36 Potential security and privacy issues in zero UI touchless technology Iqbal, Muhammad Zahid

1 p. 131-137
artikel
37 Regulation of the European Parliament and the Council on digital operational resilience for the financial sector (DORA) Clausmeier, Dirk

1 p. 79-90
artikel
38 Square pegs, round holes, and Indian cybersecurity laws Misra, Aadya

1 p. 57-64
artikel
39 State-sponsored cyber operations and international law: book review of Henning Lahmann, Unilateral Remedies to Cyber Operations (Cambridge University Press, 2020) and François Delerue, Cyber Operations and International Law (Cambridge University Press, 2020) Hayashi, Mika

1 p. 195-200
artikel
40 The European framework for cybersecurity: strong assets, intricate history Salvaggio, Salvino A.

1 p. 137-146
artikel
41 The global governance on automated facial recognition (AFR): ethical and legal opportunities and privacy challenges Bu, Qingxiu

1 p. 113-145
artikel
42 The Japanese Basic Act on Cybersecurity and the historical development of the Japanese legal framework for cybersecurity Carapeto, Roberto

1 p. 65-76
artikel
43 The trans-national cybercrime court: towards a new harmonisation of cyber law regime in ASEAN Iu, Kwan Yuen

1 p. 121-141
artikel
44 USA: Department of Justice’s new civil cyber-fraud initiative and its implications Spies, Axel

1 p. 139-145
artikel
45 Vulnerability management as compliance requirement in product security regulation—a game changer for producers’ liability and consequential improvement of the level of security in the Internet of Things? Dickmann, Roman

1 p. 21-37
artikel
46 When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach Turanjanin, Veljko

1 p. 115-136
artikel
                             46 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland