首页 > 最新文献

International cybersecurity law review最新文献

英文 中文
The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate? 鉴于最近的网络威胁,勒索软件攻击的演变。地缘政治冲突如何影响网络气候?
Pub Date : 2023-07-13 DOI: 10.1365/s43439-023-00095-w
F. Teichmann, Sonia R. Boticiu, B. Sergi
{"title":"The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?","authors":"F. Teichmann, Sonia R. Boticiu, B. Sergi","doi":"10.1365/s43439-023-00095-w","DOIUrl":"https://doi.org/10.1365/s43439-023-00095-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"46 5 1","pages":"259 - 280"},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91364886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wolfgang A. Rehmann und Christian Tillmanns (Hrsg.): E-Health/Digital Health – Rechtshandbuch. C.H. Beck Verlag München, 2022, 483 Seiten, geb. € 159,–, ISBN 978-3-406-76208-6
Pub Date : 2023-06-22 DOI: 10.1365/s43439-023-00092-z
Carsten Dochow
{"title":"Wolfgang A. Rehmann und Christian Tillmanns (Hrsg.): E-Health/Digital Health – Rechtshandbuch. C.H. Beck Verlag München, 2022, 483 Seiten, geb. € 159,–, ISBN 978-3-406-76208-6","authors":"Carsten Dochow","doi":"10.1365/s43439-023-00092-z","DOIUrl":"https://doi.org/10.1365/s43439-023-00092-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"1 1","pages":"365-369"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72643119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latest technology trends and their cybersecurity implications 最新技术趋势及其对网络安全的影响
Pub Date : 2023-06-15 DOI: 10.1365/s43439-023-00091-0
F. Teichmann, Sonia R. Boticiu, B. Sergi
{"title":"Latest technology trends and their cybersecurity implications","authors":"F. Teichmann, Sonia R. Boticiu, B. Sergi","doi":"10.1365/s43439-023-00091-0","DOIUrl":"https://doi.org/10.1365/s43439-023-00091-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"51 1","pages":"281 - 289"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86169779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An overview of cybercrime law in South Africa. 南非网络犯罪法概览。
Pub Date : 2023-06-02 DOI: 10.1365/s43439-023-00089-8
Sizwe Snail Ka Mtuze, Melody Musoni

The COVID-19 pandemic has accelerated the uptake and use of information communication technologies and led to the digital transformation of different sectors of the economy. For South Africa, the COVID-19 pandemic struck at a time when the South African government had committed itself to leveraging technology for the benefit of its citizens, the private sector, and the public sector. By 2020, South Africa already had in place enabling policy and legal frameworks to assist with the regulation of activities taking place in cyberspace. The increase in broadband access has resulted in the increase of internet users. Due to increase in use of digital technologies and processing of personal data, there has been an increase in cyber-attacks and cybercrimes such as data breaches, identity theft and cyber fraud. Several South African based companies, state owned entities, government departments and citizens have been victims of cyber-attacks. To respond to the growing spectre of cybercrime, the South African government promulgated laws to supplement the existing legal framework. It also operationalised some of the laws which had been passed but had not yet come into operation. This paper gives a summary of the evolution of cybercrime laws in South Africa. It starts off by summarising how common law and the Electronic Communications and Transactions Act addressed cybercrime. The paper then proceeds to discuss the recently promulgated Cybercrimes Act, which is now the primary law criminalising certain online activities. It explores how the various provisions of the Cybercrimes Act address different types of cybercrimes known today. This discussion is aimed at demonstrating that South Africa is no longer a safe haven for cybercriminals.

新冠肺炎疫情加速了信息通信技术的普及和使用,并导致不同经济部门的数字化转型。对南非来说,新冠肺炎疫情爆发之际,南非政府正致力于利用技术造福本国公民、私营部门和公共部门。到2020年,南非已经制定了扶持政策和法律框架,以协助监管网络空间活动。宽带接入的增加导致了互联网用户的增加。由于数字技术的使用和个人数据处理的增加,网络攻击和网络犯罪(如数据泄露、身份盗窃和网络欺诈)也有所增加。几家南非公司、国有实体、政府部门和公民都是网络攻击的受害者。为了应对日益严重的网络犯罪,南非政府颁布了法律,以补充现有的法律框架。它还实施了一些已经通过但尚未实施的法律。本文概述了南非网络犯罪法律的演变。它首先概述了普通法和《电子通信和交易法》如何应对网络犯罪。论文接着讨论了最近颁布的《网络犯罪法》,该法现在是将某些网络活动定为犯罪的主要法律。它探讨了《网络犯罪法》的各项条款如何处理当今已知的不同类型的网络犯罪。这次讨论旨在表明南非不再是网络犯罪分子的避风港。
{"title":"An overview of cybercrime law in South Africa.","authors":"Sizwe Snail Ka Mtuze,&nbsp;Melody Musoni","doi":"10.1365/s43439-023-00089-8","DOIUrl":"10.1365/s43439-023-00089-8","url":null,"abstract":"<p><p>The COVID-19 pandemic has accelerated the uptake and use of information communication technologies and led to the digital transformation of different sectors of the economy. For South Africa, the COVID-19 pandemic struck at a time when the South African government had committed itself to leveraging technology for the benefit of its citizens, the private sector, and the public sector. By 2020, South Africa already had in place enabling policy and legal frameworks to assist with the regulation of activities taking place in cyberspace. The increase in broadband access has resulted in the increase of internet users. Due to increase in use of digital technologies and processing of personal data, there has been an increase in cyber-attacks and cybercrimes such as data breaches, identity theft and cyber fraud. Several South African based companies, state owned entities, government departments and citizens have been victims of cyber-attacks. To respond to the growing spectre of cybercrime, the South African government promulgated laws to supplement the existing legal framework. It also operationalised some of the laws which had been passed but had not yet come into operation. This paper gives a summary of the evolution of cybercrime laws in South Africa. It starts off by summarising how common law and the Electronic Communications and Transactions Act addressed cybercrime. The paper then proceeds to discuss the recently promulgated Cybercrimes Act, which is now the primary law criminalising certain online activities. It explores how the various provisions of the Cybercrimes Act address different types of cybercrimes known today. This discussion is aimed at demonstrating that South Africa is no longer a safe haven for cybercriminals.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":" ","pages":"1-25"},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10235840/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9689355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored 网络攻击的合规性含义:分布式拒绝服务(DDoS)攻击的探讨
Pub Date : 2023-06-02 DOI: 10.1365/s43439-023-00090-1
F. Teichmann, B. Sergi, Chiara Wittmann
{"title":"The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored","authors":"F. Teichmann, B. Sergi, Chiara Wittmann","doi":"10.1365/s43439-023-00090-1","DOIUrl":"https://doi.org/10.1365/s43439-023-00090-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"12 1","pages":"291 - 298"},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82321978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity incident reporting laws in the Asia Pacific 亚太地区的网络安全事件报告法律
Pub Date : 2023-06-02 DOI: 10.1365/s43439-023-00088-9
Nicholas Seng
{"title":"Cybersecurity incident reporting laws in the Asia Pacific","authors":"Nicholas Seng","doi":"10.1365/s43439-023-00088-9","DOIUrl":"https://doi.org/10.1365/s43439-023-00088-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"44 1","pages":"325 - 346"},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77951905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Australia’s cyber security reform—an update 澳大利亚的网络安全改革——一次更新
Pub Date : 2023-05-08 DOI: 10.1365/s43439-023-00087-w
D. Svantesson
{"title":"Australia’s cyber security reform—an update","authors":"D. Svantesson","doi":"10.1365/s43439-023-00087-w","DOIUrl":"https://doi.org/10.1365/s43439-023-00087-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"202 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2023-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77854125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying blockchain to the modern legal system: Kleros as a decentralised dispute resolution system 将区块链应用于现代法律体系:Kleros作为一个分散的争议解决系统
Pub Date : 2023-04-12 DOI: 10.1365/s43439-023-00086-x
A. Zhuk
{"title":"Applying blockchain to the modern legal system: Kleros as a decentralised dispute resolution system","authors":"A. Zhuk","doi":"10.1365/s43439-023-00086-x","DOIUrl":"https://doi.org/10.1365/s43439-023-00086-x","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"18 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73086010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The EU’s cybersecurity framework: the interplay between the Cyber Resilience Act and the NIS 2 Directive 欧盟的网络安全框架:《网络弹性法案》和《NIS 2指令》之间的相互作用
Pub Date : 2023-03-29 DOI: 10.1365/s43439-023-00084-z
P. Eckhardt, Anastasia Kotovskaia
{"title":"The EU’s cybersecurity framework: the interplay between the Cyber Resilience Act and the NIS 2 Directive","authors":"P. Eckhardt, Anastasia Kotovskaia","doi":"10.1365/s43439-023-00084-z","DOIUrl":"https://doi.org/10.1365/s43439-023-00084-z","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"414 1","pages":"147-164"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78096172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drawing lines: geofence warrants and the third-party doctrine 划清界限:地理防卫令和第三方原则
Pub Date : 2023-03-28 DOI: 10.1365/s43439-023-00085-y
Josh A. Roth
{"title":"Drawing lines: geofence warrants and the third-party doctrine","authors":"Josh A. Roth","doi":"10.1365/s43439-023-00085-y","DOIUrl":"https://doi.org/10.1365/s43439-023-00085-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"73 1 1","pages":"213-233"},"PeriodicalIF":0.0,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83366361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International cybersecurity law review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1