Pub Date : 2021-06-01DOI: 10.1365/s43439-021-00028-5
K. Park, Sunghee Chae, Hyein Lee
{"title":"Korea’s cybersecurity regulations and enforcement related to security incidents","authors":"K. Park, Sunghee Chae, Hyein Lee","doi":"10.1365/s43439-021-00028-5","DOIUrl":"https://doi.org/10.1365/s43439-021-00028-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"27 1","pages":"47-55"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75329383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1365/s43439-021-00018-7
Victoria Neiazy
{"title":"Invalidation of the EU–US Privacy Shield: impact on data protection and data security regarding the transfer of personal data to the United States","authors":"Victoria Neiazy","doi":"10.1365/s43439-021-00018-7","DOIUrl":"https://doi.org/10.1365/s43439-021-00018-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"50 1","pages":"27-35"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77680346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1365/s43439-021-00020-z
I. Walden, Johan David Michels
{"title":"Going it alone? UK cybersecurity regulation post-Brexit","authors":"I. Walden, Johan David Michels","doi":"10.1365/s43439-021-00020-z","DOIUrl":"https://doi.org/10.1365/s43439-021-00020-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"154 1","pages":"19-26"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78137002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1365/s43439-021-00019-6
R. Carapeto
{"title":"The Japanese Basic Act on Cybersecurity and the historical development of the Japanese legal framework for cybersecurity","authors":"R. Carapeto","doi":"10.1365/s43439-021-00019-6","DOIUrl":"https://doi.org/10.1365/s43439-021-00019-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"57 1","pages":"65-76"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85773404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1365/s43439-021-00016-9
Andrew J. Grotto, Martin Schallbruch
{"title":"Cybersecurity and the risk governance triangle","authors":"Andrew J. Grotto, Martin Schallbruch","doi":"10.1365/s43439-021-00016-9","DOIUrl":"https://doi.org/10.1365/s43439-021-00016-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"26 1","pages":"77-92"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75115381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1365/s43439-021-00017-8
K. Erenli, Christian L. Geminn, Leon Pfeiffer
{"title":"Legal challenges of an open web index","authors":"K. Erenli, Christian L. Geminn, Leon Pfeiffer","doi":"10.1365/s43439-021-00017-8","DOIUrl":"https://doi.org/10.1365/s43439-021-00017-8","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"57 8","pages":"183-194"},"PeriodicalIF":0.0,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72406886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1365/s43439-020-00003-6
Jihong Chen
{"title":"Regulation and deregulation: understanding the evolution of the Chinese cryptography legal regime from the newly released Cryptography Law of China","authors":"Jihong Chen","doi":"10.1365/s43439-020-00003-6","DOIUrl":"https://doi.org/10.1365/s43439-020-00003-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"15 1","pages":"73 - 86"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78178899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.1365/s43439-020-00005-4
Justus Gaden
{"title":"Security Updates im IoT nach den Richtlinien über digitale Inhalte (DI-RL) und über den Warenkauf (WK-RL)","authors":"Justus Gaden","doi":"10.1365/s43439-020-00005-4","DOIUrl":"https://doi.org/10.1365/s43439-020-00005-4","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 1","pages":"19-26"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73329445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}