Pub Date : 2024-07-04DOI: 10.1365/s43439-024-00127-z
Nicholas Seng
{"title":"Cybersecurity Regulation—Types, Principles, and Country Deep Dives in Asia","authors":"Nicholas Seng","doi":"10.1365/s43439-024-00127-z","DOIUrl":"https://doi.org/10.1365/s43439-024-00127-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":" 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141679869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-02DOI: 10.1365/s43439-024-00124-2
Stephanie Ness
{"title":"VAT/GST harmonisation challenges for digital assets such as bitcoin and NFTs in the EU following Case C-264/14 (Skatteverket v David Hedqist)","authors":"Stephanie Ness","doi":"10.1365/s43439-024-00124-2","DOIUrl":"https://doi.org/10.1365/s43439-024-00124-2","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141686950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.1365/s43439-024-00126-0
I. E. Nwafor
{"title":"Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024","authors":"I. E. Nwafor","doi":"10.1365/s43439-024-00126-0","DOIUrl":"https://doi.org/10.1365/s43439-024-00126-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"39 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-03DOI: 10.1365/s43439-024-00121-5
Gerd Waschbusch, Ben Schlenker
{"title":"Shared intelligence, enhanced resilience: sharing cyber threat information and intelligence under DORA","authors":"Gerd Waschbusch, Ben Schlenker","doi":"10.1365/s43439-024-00121-5","DOIUrl":"https://doi.org/10.1365/s43439-024-00121-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"125 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141017170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-18DOI: 10.1365/s43439-024-00119-z
Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan
{"title":"A multi-layered security model to counter social engineering attacks: a learning-based approach","authors":"Luke Edwards, Muhammad Zahid Iqbal, Mahmudul Hassan","doi":"10.1365/s43439-024-00119-z","DOIUrl":"https://doi.org/10.1365/s43439-024-00119-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140689925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-16DOI: 10.1365/s43439-024-00118-0
Yassin Abdalla Abdelkarim
{"title":"A literature review of the evolution of sovereignty and borders concepts in cyberspace","authors":"Yassin Abdalla Abdelkarim","doi":"10.1365/s43439-024-00118-0","DOIUrl":"https://doi.org/10.1365/s43439-024-00118-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140697509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-10DOI: 10.1365/s43439-024-00115-3
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"The most impactful ransomware attacks in 2023 and their business implications","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-024-00115-3","DOIUrl":"https://doi.org/10.1365/s43439-024-00115-3","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140717958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-05DOI: 10.1365/s43439-024-00117-1
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"Cyber threat intelligence: existing benefits and challenges for law firms and businesses","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-024-00117-1","DOIUrl":"https://doi.org/10.1365/s43439-024-00117-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"49 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140739603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-04DOI: 10.1365/s43439-024-00116-2
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"Adequate responses to cyber-attacks","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-024-00116-2","DOIUrl":"https://doi.org/10.1365/s43439-024-00116-2","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law","authors":"Sozon Leventopoulos, Kosmas Pipyros, Dimitris Gritzalis","doi":"10.1365/s43439-024-00113-5","DOIUrl":"https://doi.org/10.1365/s43439-024-00113-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"26 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140375552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}