nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accountability, liability and intermediaries: a new set of rules in India
|
Chacko, Mathew |
|
|
|
2 |
p. 271-278 |
artikel |
2 |
Adequate responses to cyber-attacks
|
Teichmann, Fabian M. |
|
|
|
2 |
p. 337-345 |
artikel |
3 |
A literature review of the evolution of sovereignty and borders concepts in cyberspace
|
Abdelkarim, Yassin Abdalla |
|
|
|
2 |
p. 365-372 |
artikel |
4 |
Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance
|
Bezerra Sales Sarlet, Gabrielle |
|
|
|
2 |
p. 197-211 |
artikel |
5 |
A multi-layered security model to counter social engineering attacks: a learning-based approach
|
Edwards, Luke |
|
|
|
2 |
p. 313-336 |
artikel |
6 |
A review of product safety regulations in the European Union
|
Ruohonen, Jukka |
|
|
|
2 |
p. 345-366 |
artikel |
7 |
Avatars in the metaverse: potential legal issues and remedies
|
Cheong, Ben Chester |
|
|
|
2 |
p. 467-494 |
artikel |
8 |
Behind the Huawei sanction: national security, ideological prejudices or something else?
|
Bu, Qingxiu |
|
|
|
2 |
p. 263-300 |
artikel |
9 |
Comparing Canada’s proposed Critical Cyber Systems Protection Act with cybersecurity legal requirements in the EU
|
Malone, Matt |
|
|
|
2 |
p. 165-196 |
artikel |
10 |
Correction to: The legal obligation to provide timely security patching and automatic updates
|
Maurushat, Alana |
|
|
|
2 |
p. 495 |
artikel |
11 |
Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study
|
Sebastian, Glorin |
|
|
|
2 |
p. 367-383 |
artikel |
12 |
Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context
|
Chipfumbu, Colletor Tendeukai |
|
|
|
2 |
p. 347-364 |
artikel |
13 |
Cybersecurity in Russia
|
Chislova, Olga |
|
|
|
2 |
p. 245-251 |
artikel |
14 |
Cybersecurity regulation in Brazil and Latin America: an overview
|
Carapeto, Roberto |
|
|
|
2 |
p. 385-410 |
artikel |
15 |
Cybersicherheit in Krankenhäusern – Teil 2: vom Normalfall zum Notfall
|
Nadeborn, Diana |
|
|
|
2 |
p. 273-287 |
artikel |
16 |
Die Strafbarkeit des Betreibens krimineller Handelsplattformen im Internet – Der neue § 127 StGB
|
Zöller, Mark A. |
|
|
|
2 |
p. 279-296 |
artikel |
17 |
Drawing lines: geofence warrants and the third-party doctrine
|
Roth, Josh A. |
|
|
|
2 |
p. 213-233 |
artikel |
18 |
Dr. Ifeoma Nwafor: Cybercrime and the law: issues and developments in Nigeria. (2022) CLDS Publishing. pp. 1–285
|
Snail ka Mtuze, Sizwe |
|
|
|
2 |
p. 253-254 |
artikel |
19 |
Editorial
|
Dochow, Carsten |
|
|
|
2 |
p. 247-254 |
artikel |
20 |
Editorial
|
Kipker, Dennis-Kenji |
|
|
|
2 |
p. 203-208 |
artikel |
21 |
European information regulation in the Ukraine War
|
Louven, Sebastian |
|
|
|
2 |
p. 249-251 |
artikel |
22 |
Exploring the trust mechanism of digital intellectual property transactions based on smart contracts
|
Nkoua Nkuika, Guilisse La Fortune |
|
|
|
2 |
p. 411-436 |
artikel |
23 |
Geteiltes Wissen, gestärkte Resilienz: Informationsaustausch über Cyberbedrohungen gemäß Art. 45 DORA
|
Waschbusch, Gerd |
|
|
|
2 |
p. 213-236 |
artikel |
24 |
Necessary or premature? The NIS 2 Directive from the perspective of the telecommunications sector
|
Gruber, Andreas |
|
|
|
2 |
p. 233-243 |
artikel |
25 |
Numbers and statistics: data and cyber breaches under the General Data Protection Regulation
|
Utzerath, Julia |
|
|
|
2 |
p. 339-348 |
artikel |
26 |
One step ahead: mapping the Italian and German cybersecurity laws against the proposal for a NIS2 directive
|
Schmitz-Berndt, Sandra |
|
|
|
2 |
p. 289-311 |
artikel |
27 |
Open source intelligence
|
Böhm, Isabelle |
|
|
|
2 |
p. 317-337 |
artikel |
28 |
Portscans im Lichte des Rechts: eine straf- und zivilrechtliche Analyse
|
Grieger, Ferdinand |
|
|
|
2 |
p. 297-316 |
artikel |
29 |
Proposal for a NIS directive 2.0: companies covered by the extended scope of application and their obligations
|
Sievers, Thomas |
|
|
|
2 |
p. 223-231 |
artikel |
30 |
Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law
|
Leventopoulos, Sozon |
|
|
|
2 |
p. 237-262 |
artikel |
31 |
The curious case of automated decision-making in India
|
Ashok, Pratiksha |
|
|
|
2 |
p. 235-248 |
artikel |
32 |
The Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements
|
Chiara, Pier Giorgio |
|
|
|
2 |
p. 255-272 |
artikel |
33 |
The EU’s cybersecurity framework: the interplay between the Cyber Resilience Act and the NIS 2 Directive
|
Eckhardt, Philipp |
|
|
|
2 |
p. 147-164 |
artikel |
34 |
The fundamental right of confidentiality and integrity of IT systems in Germany: a call for “IT Privacy” right in Brazil?
|
Alberton Coutinho Silva, Cecília |
|
|
|
2 |
p. 253-269 |
artikel |
35 |
The legal obligation to provide timely security patching and automatic updates
|
Maurushat, Alana |
|
|
|
2 |
p. 437-465 |
artikel |
36 |
The most impactful ransomware attacks in 2023 and their business implications
|
Teichmann, Fabian M. |
|
|
|
2 |
p. 301-311 |
artikel |
37 |
Understanding the Chinese Data Security Law
|
Chen, Jihong |
|
|
|
2 |
p. 209-221 |
artikel |
38 |
Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange
|
Del-Real, Cristina |
|
|
|
2 |
p. 313-343 |
artikel |