Pub Date : 2023-11-23DOI: 10.1365/s43439-023-00103-z
Karl-Heinz Sydow, A. Schmitz
{"title":"Das E-Rezept-Konzept als neuer Sicherheitsstandard für elektronische Verordnungen?!","authors":"Karl-Heinz Sydow, A. Schmitz","doi":"10.1365/s43439-023-00103-z","DOIUrl":"https://doi.org/10.1365/s43439-023-00103-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"87 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139243053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-22DOI: 10.1365/s43439-023-00104-y
Fabian Teichmann, Sonia R. Boticiu
{"title":"How do cybercriminals launder the proceeds of their crimes?","authors":"Fabian Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-023-00104-y","DOIUrl":"https://doi.org/10.1365/s43439-023-00104-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"59 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139247774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-17DOI: 10.1365/s43439-023-00102-0
Masaki Iwasaki
{"title":"Stärkung des schwächsten Glieds: Koordinierung der Cybersicherheit in Lieferketten und Wettbewerbsregeln","authors":"Masaki Iwasaki","doi":"10.1365/s43439-023-00102-0","DOIUrl":"https://doi.org/10.1365/s43439-023-00102-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-20DOI: 10.1365/s43439-023-00101-1
Ryan Buhrig
{"title":"Capacity, capability, and collaboration: a qualitative analysis of international cybercrime investigations from the perspective of Canadian investigators","authors":"Ryan Buhrig","doi":"10.1365/s43439-023-00101-1","DOIUrl":"https://doi.org/10.1365/s43439-023-00101-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-06DOI: 10.1365/s43439-023-00099-6
Emmanouil Metaxakis
{"title":"Ratifying an international treaty: Is it enough? (Shortcomings of the ratification of the Budapest Convention by Greece)","authors":"Emmanouil Metaxakis","doi":"10.1365/s43439-023-00099-6","DOIUrl":"https://doi.org/10.1365/s43439-023-00099-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89055554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-04DOI: 10.1365/s43439-023-00100-2
Fabian M. Teichmann, Sonia R. Boticiu
{"title":"An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming","authors":"Fabian M. Teichmann, Sonia R. Boticiu","doi":"10.1365/s43439-023-00100-2","DOIUrl":"https://doi.org/10.1365/s43439-023-00100-2","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84234136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-30DOI: 10.1365/s43439-023-00098-7
Diego Fernández, José L. Barbero
{"title":"Road to homogenization? Argentina publishes a new bill to replace the Personal Data Protection Law","authors":"Diego Fernández, José L. Barbero","doi":"10.1365/s43439-023-00098-7","DOIUrl":"https://doi.org/10.1365/s43439-023-00098-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88108839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-17DOI: 10.1365/s43439-023-00097-8
Donald David Stewart Ferguson
{"title":"The outcome efficacy of the entity risk management requirements of the NIS 2 Directive","authors":"Donald David Stewart Ferguson","doi":"10.1365/s43439-023-00097-8","DOIUrl":"https://doi.org/10.1365/s43439-023-00097-8","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82285770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-07DOI: 10.1365/s43439-023-00094-x
Fabian Teichmann
{"title":"Ransomware-Angriffe im Kontext der generativen künstlichen Intelligenz − eine experimentelle Studie","authors":"Fabian Teichmann","doi":"10.1365/s43439-023-00094-x","DOIUrl":"https://doi.org/10.1365/s43439-023-00094-x","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74399377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-27DOI: 10.1365/s43439-023-00093-y
Leon Poshai, A. Chilunjika, Kudakwashe Intauno
{"title":"Examining the institutional and legislative frameworks for enforcing cybersecurity in Zimbabwe","authors":"Leon Poshai, A. Chilunjika, Kudakwashe Intauno","doi":"10.1365/s43439-023-00093-y","DOIUrl":"https://doi.org/10.1365/s43439-023-00093-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79409166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}