Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             38 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accountability, liability and intermediaries: a new set of rules in India Chacko, Mathew

2 p. 271-278
artikel
2 Adequate responses to cyber-attacks Teichmann, Fabian M.

2 p. 337-345
artikel
3 A literature review of the evolution of sovereignty and borders concepts in cyberspace Abdelkarim, Yassin Abdalla

2 p. 365-372
artikel
4 Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance Bezerra Sales Sarlet, Gabrielle

2 p. 197-211
artikel
5 A multi-layered security model to counter social engineering attacks: a learning-based approach Edwards, Luke

2 p. 313-336
artikel
6 A review of product safety regulations in the European Union Ruohonen, Jukka

2 p. 345-366
artikel
7 Avatars in the metaverse: potential legal issues and remedies Cheong, Ben Chester

2 p. 467-494
artikel
8 Behind the Huawei sanction: national security, ideological prejudices or something else? Bu, Qingxiu

2 p. 263-300
artikel
9 Comparing Canada’s proposed Critical Cyber Systems Protection Act with cybersecurity legal requirements in the EU Malone, Matt

2 p. 165-196
artikel
10 Correction to: The legal obligation to provide timely security patching and automatic updates Maurushat, Alana

2 p. 495
artikel
11 Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study Sebastian, Glorin

2 p. 367-383
artikel
12 Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context Chipfumbu, Colletor Tendeukai

2 p. 347-364
artikel
13 Cybersecurity in Russia Chislova, Olga

2 p. 245-251
artikel
14 Cybersecurity regulation in Brazil and Latin America: an overview Carapeto, Roberto

2 p. 385-410
artikel
15 Cybersicherheit in Krankenhäusern – Teil 2: vom Normalfall zum Notfall Nadeborn, Diana

2 p. 273-287
artikel
16 Die Strafbarkeit des Betreibens krimineller Handelsplattformen im Internet – Der neue § 127 StGB Zöller, Mark A.

2 p. 279-296
artikel
17 Drawing lines: geofence warrants and the third-party doctrine Roth, Josh A.

2 p. 213-233
artikel
18 Dr. Ifeoma Nwafor: Cybercrime and the law: issues and developments in Nigeria. (2022) CLDS Publishing. pp. 1–285 Snail ka Mtuze, Sizwe

2 p. 253-254
artikel
19 Editorial Dochow, Carsten

2 p. 247-254
artikel
20 Editorial Kipker, Dennis-Kenji

2 p. 203-208
artikel
21 European information regulation in the Ukraine War Louven, Sebastian

2 p. 249-251
artikel
22 Exploring the trust mechanism of digital intellectual property transactions based on smart contracts Nkoua Nkuika, Guilisse La Fortune

2 p. 411-436
artikel
23 Geteiltes Wissen, gestärkte Resilienz: Informationsaustausch über Cyberbedrohungen gemäß Art. 45 DORA Waschbusch, Gerd

2 p. 213-236
artikel
24 Necessary or premature? The NIS 2 Directive from the perspective of the telecommunications sector Gruber, Andreas

2 p. 233-243
artikel
25 Numbers and statistics: data and cyber breaches under the General Data Protection Regulation Utzerath, Julia

2 p. 339-348
artikel
26 One step ahead: mapping the Italian and German cybersecurity laws against the proposal for a NIS2 directive Schmitz-Berndt, Sandra

2 p. 289-311
artikel
27 Open source intelligence Böhm, Isabelle

2 p. 317-337
artikel
28 Portscans im Lichte des Rechts: eine straf- und zivilrechtliche Analyse Grieger, Ferdinand

2 p. 297-316
artikel
29 Proposal for a NIS directive 2.0: companies covered by the extended scope of application and their obligations Sievers, Thomas

2 p. 223-231
artikel
30 Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law Leventopoulos, Sozon

2 p. 237-262
artikel
31 The curious case of automated decision-making in India Ashok, Pratiksha

2 p. 235-248
artikel
32 The Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements Chiara, Pier Giorgio

2 p. 255-272
artikel
33 The EU’s cybersecurity framework: the interplay between the Cyber Resilience Act and the NIS 2 Directive Eckhardt, Philipp

2 p. 147-164
artikel
34 The fundamental right of confidentiality and integrity of IT systems in Germany: a call for “IT Privacy” right in Brazil? Alberton Coutinho Silva, Cecília

2 p. 253-269
artikel
35 The legal obligation to provide timely security patching and automatic updates Maurushat, Alana

2 p. 437-465
artikel
36 The most impactful ransomware attacks in 2023 and their business implications Teichmann, Fabian M.

2 p. 301-311
artikel
37 Understanding the Chinese Data Security Law Chen, Jihong

2 p. 209-221
artikel
38 Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange Del-Real, Cristina

2 p. 313-343
artikel
                             38 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland