Pub Date : 2022-06-01DOI: 10.1365/s43439-021-00043-6
Federica Casarosa
{"title":"Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-021-00043-6","DOIUrl":"https://doi.org/10.1365/s43439-021-00043-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"62 ","pages":"115-130"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72431079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1365/s43439-022-00053-y
Federica Casarosa
{"title":"Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-022-00053-y","DOIUrl":"https://doi.org/10.1365/s43439-022-00053-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"71 1","pages":"245"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88612352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1365/s43439-022-00050-1
A. Spies
{"title":"USA: Department of Justice’s new civil cyber-fraud initiative and its implications","authors":"A. Spies","doi":"10.1365/s43439-022-00050-1","DOIUrl":"https://doi.org/10.1365/s43439-022-00050-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"5 1","pages":"139-145"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72501981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-24DOI: 10.1365/s43439-022-00055-w
R. Carapeto, Ana Luíza Calil
{"title":"Cybersecurity regulation in Brazil and Latin America: an overview","authors":"R. Carapeto, Ana Luíza Calil","doi":"10.1365/s43439-022-00055-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00055-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"35 1","pages":"385-410"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-11DOI: 10.1365/s43439-022-00047-w
Benedikt Buchner
{"title":"Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm”","authors":"Benedikt Buchner","doi":"10.1365/s43439-022-00047-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00047-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"20 1","pages":"181 - 190"},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74341482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01Epub Date: 2022-04-13DOI: 10.1365/s43439-022-00049-8
Diana Nadeborn, Tilmann Dittrich
The threat of cyber attacks is a burning issue in all industries. In the case of hospitals, a cyber incident can not only lead to the loss of patient data but can also put patients' lives in danger. Hospitals are therefore obliged by a large number of laws to maintain sufficient protective measures. Monitoring compliance with these regulations is the responsibility of hospital managers. This is an important compliance task. Cyber insurance can be part of the solution. Particular caution is required when paying ransoms in the event of ransomware attacks.
{"title":"[Cybersecurity in hospitals-Part 1: IT compliance as a management task].","authors":"Diana Nadeborn, Tilmann Dittrich","doi":"10.1365/s43439-022-00049-8","DOIUrl":"10.1365/s43439-022-00049-8","url":null,"abstract":"<p><p>The threat of cyber attacks is a burning issue in all industries. In the case of hospitals, a cyber incident can not only lead to the loss of patient data but can also put patients' lives in danger. Hospitals are therefore obliged by a large number of laws to maintain sufficient protective measures. Monitoring compliance with these regulations is the responsibility of hospital managers. This is an important compliance task. Cyber insurance can be part of the solution. Particular caution is required when paying ransoms in the event of ransomware attacks.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"147-161"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9005917/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9913128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01Epub Date: 2022-04-19DOI: 10.1365/s43439-022-00052-z
Muhammad Zahid Iqbal, Abraham G Campbell
Touchless technology often called Zero User Interface (UI) has begun to permeate every aspect of our lives as its use became necessary for hygiene measures in public places. The evolution of touchless technology replacing touchscreen interaction started as a luxury concept to give a fancier look to digital interactions, but now it has gained real value as a health-oriented interaction method. Switching to a touchless interface reduces common touchpoints, which help to safeguard against the spread of pathogens. Although the evolution of touchless technology is not new, its use massively increased due to its inherent hygienic nature during the COVID-19 pandemic. However, this investment in a new form of digital interaction has several privacy and security issues that need attention, in order to allow for safe human-machine interaction to cope with security breaches and cyber-attacks to protect our credentials. This paper outlines the potential security and privacy issues concerning Zero UI adoption in various technologies that need to be considered if one wishes to adopt responsible technology practices with this technology.
{"title":"Potential security and privacy issues in zero UI touchless technology.","authors":"Muhammad Zahid Iqbal, Abraham G Campbell","doi":"10.1365/s43439-022-00052-z","DOIUrl":"10.1365/s43439-022-00052-z","url":null,"abstract":"<p><p>Touchless technology often called Zero User Interface (UI) has begun to permeate every aspect of our lives as its use became necessary for hygiene measures in public places. The evolution of touchless technology replacing touchscreen interaction started as a luxury concept to give a fancier look to digital interactions, but now it has gained real value as a health-oriented interaction method. Switching to a touchless interface reduces common touchpoints, which help to safeguard against the spread of pathogens. Although the evolution of touchless technology is not new, its use massively increased due to its inherent hygienic nature during the COVID-19 pandemic. However, this investment in a new form of digital interaction has several privacy and security issues that need attention, in order to allow for safe human-machine interaction to cope with security breaches and cyber-attacks to protect our credentials. This paper outlines the potential security and privacy issues concerning Zero UI adoption in various technologies that need to be considered if one wishes to adopt responsible technology practices with this technology.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"131-137"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9017080/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01Epub Date: 2022-11-09DOI: 10.1365/s43439-022-00069-4
Cristina Del-Real, Antonio M Díaz-Fernández
This paper empirically explores the contribution and collaborative networks of public and private actors to cybersecurity provision in Spain. The article draws on data from three sources: policy and legal documents, a Delphi study with cybersecurity experts, and 34 interviews. Rooted in the theoretical underpinnings of nodal governance and anchored pluralism, the paper argues that the position of actors and public-private collaboration dynamics involved in cybersecurity governance can be understood through the analysis of capital exchange. Therefore, the study provides a list of the most relevant nodes for cybersecurity in Spain, assesses the capital they possess and how they exchange it through collaborative networks and explores the characteristics and barriers of these collaborative relationships. Analyses reveal that public organisations hold a preeminent position in cybersecurity governance despite large technology corporations' greater economic and cultural capital. Remarkably, the paper identifies the central position of new public bodies in the network of cybersecurity nodes. Moreover, cultural barriers that are hindering public-private collaboration in Spain are identified. These results indicate that, despite the state's difficulties in providing public solutions to cybersecurity challenges, Spain is an example of how governance can be anchored in public bodies through symbolic and social capital.
{"title":"Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange.","authors":"Cristina Del-Real, Antonio M Díaz-Fernández","doi":"10.1365/s43439-022-00069-4","DOIUrl":"10.1365/s43439-022-00069-4","url":null,"abstract":"<p><p>This paper empirically explores the contribution and collaborative networks of public and private actors to cybersecurity provision in Spain. The article draws on data from three sources: policy and legal documents, a Delphi study with cybersecurity experts, and 34 interviews. Rooted in the theoretical underpinnings of nodal governance and anchored pluralism, the paper argues that the position of actors and public-private collaboration dynamics involved in cybersecurity governance can be understood through the analysis of capital exchange. Therefore, the study provides a list of the most relevant nodes for cybersecurity in Spain, assesses the capital they possess and how they exchange it through collaborative networks and explores the characteristics and barriers of these collaborative relationships. Analyses reveal that public organisations hold a preeminent position in cybersecurity governance despite large technology corporations' greater economic and cultural capital. Remarkably, the paper identifies the central position of new public bodies in the network of cybersecurity nodes. Moreover, cultural barriers that are hindering public-private collaboration in Spain are identified. These results indicate that, despite the state's difficulties in providing public solutions to cybersecurity challenges, Spain is an example of how governance can be anchored in public bodies through symbolic and social capital.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"313-343"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9645327/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10294640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01Epub Date: 2022-01-11DOI: 10.1365/s43439-021-00045-4
Serkan Savaş, Süleyman Karataş
With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.
{"title":"Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.","authors":"Serkan Savaş, Süleyman Karataş","doi":"10.1365/s43439-021-00045-4","DOIUrl":"10.1365/s43439-021-00045-4","url":null,"abstract":"<p><p>With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"7-34"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8750646/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}