首页 > 最新文献

International cybersecurity law review最新文献

英文 中文
[Cybersecurity of brain-computer interfaces]. [脑机接口的网络安全]。
Pub Date : 2022-01-01 Epub Date: 2022-03-17 DOI: 10.1365/s43439-022-00046-x
Mario Martini, Carolin Kemper

Brain-computer interfaces inspire visions of superhuman powers, enabling users to control protheses and other devices solely with their thoughts. But the rapid development and commercialization of this technology also brings security risks. Attacks on brain-computer interfaces may cause harrowing consequences for users, from eavesdropping on neurological data to manipulating brain activity. At present, data protection law, the regulation of medical devices, and the new rules on the sale of goods with digital elements all govern aspects of cybersecurity. There are, nevertheless, significant gaps. The article analyzes how the legal system currently addresses the risks of cyberattacks on brain-computer interfaces-and how policymakers could address such risks in the future.

脑机接口激发了超人的力量,使用户能够仅凭自己的想法控制假肢和其他设备。但这项技术的快速发展和商业化也带来了安全风险。对脑机接口的攻击可能会给用户带来痛苦的后果,从窃听神经数据到操纵大脑活动。目前,数据保护法、医疗器械监管以及关于销售带有数字元素的商品的新规则都管理着网络安全的各个方面。然而,仍存在重大差距。这篇文章分析了法律体系目前如何应对脑机接口网络攻击的风险,以及政策制定者未来如何应对这些风险。
{"title":"[Cybersecurity of brain-computer interfaces].","authors":"Mario Martini,&nbsp;Carolin Kemper","doi":"10.1365/s43439-022-00046-x","DOIUrl":"10.1365/s43439-022-00046-x","url":null,"abstract":"<p><p>Brain-computer interfaces inspire visions of superhuman powers, enabling users to control protheses and other devices solely with their thoughts. But the rapid development and commercialization of this technology also brings security risks. Attacks on brain-computer interfaces may cause harrowing consequences for users, from eavesdropping on neurological data to manipulating brain activity. At present, data protection law, the regulation of medical devices, and the new rules on the sale of goods with digital elements all govern aspects of cybersecurity. There are, nevertheless, significant gaps. The article analyzes how the legal system currently addresses the risks of cyberattacks on brain-computer interfaces-and how policymakers could address such risks in the future.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"191-243"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8929247/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9907281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review of product safety regulations in the European Union. 对欧盟产品安全法规的审查。
Pub Date : 2022-01-01 Epub Date: 2022-06-17 DOI: 10.1365/s43439-022-00057-8
Jukka Ruohonen

Product safety has been a concern in Europe ever since the early 1960s. Despite the long and relatively stable historical lineage of product safety regulations, new technologies, changes in the world economy, and other major transformations have in recent years again brought product safety to the forefront of policy debates. As reforms are also underway, there is a motivation to review the complex safety policy framework in the European Union (EU). Thus, building on deliberative policy analysis and an interpretative literature review, this paper reviews the safety policy for nonfood consumer products in the EU. The review covers the historical background and the main laws, administration and enforcement, standardization and harmonization, laws enacted for specific products, notifications delivered by national safety authorities, recalls of dangerous products, and the liability of these. Based on the review and analysis of these themes and the associated literature, some current policy challenges are further discussed.

自20世纪60年代初以来,产品安全一直是欧洲关注的问题。尽管产品安全法规有着悠久而相对稳定的历史渊源,但近年来,新技术、世界经济的变化和其他重大变革再次将产品安全带到了政策辩论的前沿。由于改革也在进行中,有动机审查欧盟(EU)复杂的安全政策框架。因此,本文在审慎政策分析和解释性文献综述的基础上,回顾了欧盟非食品消费品的安全政策。审查涵盖了历史背景和主要法律、行政和执法、标准化和统一、针对特定产品制定的法律、国家安全部门发出的通知、危险产品召回以及这些产品的责任。在对这些主题和相关文献的回顾和分析的基础上,进一步讨论了当前的一些政策挑战。
{"title":"A review of product safety regulations in the European Union.","authors":"Jukka Ruohonen","doi":"10.1365/s43439-022-00057-8","DOIUrl":"10.1365/s43439-022-00057-8","url":null,"abstract":"<p><p>Product safety has been a concern in Europe ever since the early 1960s. Despite the long and relatively stable historical lineage of product safety regulations, new technologies, changes in the world economy, and other major transformations have in recent years again brought product safety to the forefront of policy debates. As reforms are also underway, there is a motivation to review the complex safety policy framework in the European Union (EU). Thus, building on deliberative policy analysis and an interpretative literature review, this paper reviews the safety policy for nonfood consumer products in the EU. The review covers the historical background and the main laws, administration and enforcement, standardization and harmonization, laws enacted for specific products, notifications delivered by national safety authorities, recalls of dangerous products, and the liability of these. Based on the review and analysis of these themes and the associated literature, some current policy challenges are further discussed.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"345-366"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9204684/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9910052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
One step ahead: mapping the Italian and German cybersecurity laws against the proposal for a NIS2 directive. 领先一步:将意大利和德国的网络安全法与NIS2指令的提案进行对比。
Pub Date : 2022-01-01 Epub Date: 2022-07-20 DOI: 10.1365/s43439-022-00058-7
Sandra Schmitz-Berndt, Pier Giorgio Chiara

With the COVID-19 pandemic accelerating digital transformation of the Single Market, the European Commission also speeded up the review of the first piece of European Union (EU)-wide cybersecurity legislation, the NIS Directive. Originally foreseen for May 2021, the Commission presented the review as early as December 2020 together with a Proposal for a NIS2 Directive. Almost in parallel, some Member States strengthened (or adopted) national laws beyond the scope of the NIS Directive to respond adequately to the fast-paced digital threat landscape. Against this backdrop, the article investigates the national interventions in the field of cybersecurity recently adopted by Italy and Germany. In order to identify similarities and divergences of the Italian and German national frameworks with the European Commission's Proposal for a NIS2 Directive, the analysis will focus on selected aspects extrapolated from the Commission Proposal, namely: i) the enlarged scope; ii) detailed cybersecurity risk-management measures; iii) more stringent supervisory measures; and, iv) stricter enforcement requirements, including harmonised sanctions across the EU. The article concludes that the national cybersecurity legal frameworks under scrutiny already match the core of the proposed changes envisaged by the NIS2 Proposal.

随着新冠肺炎疫情加速单一市场的数字化转型,欧盟委员会也加快了对欧盟范围内第一项网络安全立法NIS指令的审查。委员会最初预计于2021年5月进行审查,最早于2020年12月提交了审查报告以及NIS2指令提案。几乎与此同时,一些成员国加强(或通过)了NIS指令范围之外的国家法律,以充分应对快节奏的数字威胁形势。在此背景下,本文调查了意大利和德国最近在网络安全领域采取的国家干预措施。为了确定意大利和德国国家框架与欧盟委员会NIS2指令提案的异同,分析将侧重于从委员会提案中推断出的选定方面,即:i)扩大的范围;ii)详细的网络安全风险管理措施;iii)更严格的监督措施;以及,iv)更严格的执法要求,包括在整个欧盟范围内统一制裁。文章的结论是,正在审查的国家网络安全法律框架已经符合NIS2提案所设想的拟议修改的核心。
{"title":"One step ahead: mapping the Italian and German cybersecurity laws against the proposal for a NIS2 directive.","authors":"Sandra Schmitz-Berndt, Pier Giorgio Chiara","doi":"10.1365/s43439-022-00058-7","DOIUrl":"10.1365/s43439-022-00058-7","url":null,"abstract":"<p><p>With the COVID-19 pandemic accelerating digital transformation of the Single Market, the European Commission also speeded up the review of the first piece of European Union (EU)-wide cybersecurity legislation, the NIS Directive. Originally foreseen for May 2021, the Commission presented the review as early as December 2020 together with a Proposal for a NIS2 Directive. Almost in parallel, some Member States strengthened (or adopted) national laws beyond the scope of the NIS Directive to respond adequately to the fast-paced digital threat landscape. Against this backdrop, the article investigates the national interventions in the field of cybersecurity recently adopted by Italy and Germany. In order to identify similarities and divergences of the Italian and German national frameworks with the European Commission's Proposal for a NIS2 Directive, the analysis will focus on selected aspects extrapolated from the Commission Proposal, namely: i) the enlarged scope; ii) detailed cybersecurity risk-management measures; iii) more stringent supervisory measures; and, iv) stricter enforcement requirements, including harmonised sanctions across the EU. The article concludes that the national cybersecurity legal frameworks under scrutiny already match the core of the proposed changes envisaged by the NIS2 Proposal.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"289-311"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9297281/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity of medical devices: new challenges arising from the AI Act and NIS 2 Directive proposals. 医疗设备的网络安全:人工智能法案和NIS 2指令提案带来的新挑战。
Pub Date : 2022-01-01 Epub Date: 2022-05-16 DOI: 10.1365/s43439-022-00054-x
Elisabetta Biasin, Erik Kamenjašević

Cyberattacks on the IT infrastructure of hospitals, electronic health records or medical devices that have taken place during the COVID-19 pandemic reaffirmed how crucial it is to ensure cybersecurity in the healthcare sector. Medical devices are regulated in the European Union (EU) through vertical product-specific legislation, such as the Medical Device Regulation (MDR), among others. The MDR foresees safety requirements implying cybersecurity obligations for medical device manufacturers. In 2021, the EU legislator put forward the Network and Information Security System Directive reform (NIS 2) and the Artificial Intelligence Act (AIA) proposal, containing additional cybersecurity requirements applicable to medical devices. This article analyses how the new reforms interact with the existing legislation from a cybersecurity perspective. The research finds that parallel provision of analogous cybersecurity requirements (especially on notification requirements) could lead to regulatory overlapping, fragmentation, and uneven levels of protection of individuals in the EU internal market. In the "Recommendations and conclusions", the article provides policy recommendations to the EU legislator to help mitigate these risks.

新冠肺炎大流行期间发生的针对医院IT基础设施、电子健康记录或医疗设备的网络攻击再次证明了确保医疗保健部门网络安全的重要性。医疗器械在欧盟(EU)通过垂直的特定产品立法进行监管,如《医疗器械条例》(MDR)等。MDR预见到安全要求意味着医疗器械制造商的网络安全义务。2021年,欧盟立法者提出了网络和信息安全系统指令改革(NIS 2)和《人工智能法》(AIA)提案,其中包含适用于医疗设备的额外网络安全要求。本文从网络安全的角度分析了新的改革如何与现有立法相互作用。研究发现,平行提供类似的网络安全要求(尤其是通知要求)可能会导致监管重叠、碎片化,以及欧盟内部市场对个人的保护水平不均衡。在“建议和结论”中,文章向欧盟立法者提供了政策建议,以帮助减轻这些风险。
{"title":"Cybersecurity of medical devices: new challenges arising from the AI Act and NIS 2 Directive proposals.","authors":"Elisabetta Biasin,&nbsp;Erik Kamenjašević","doi":"10.1365/s43439-022-00054-x","DOIUrl":"10.1365/s43439-022-00054-x","url":null,"abstract":"<p><p>Cyberattacks on the IT infrastructure of hospitals, electronic health records or medical devices that have taken place during the COVID-19 pandemic reaffirmed how crucial it is to ensure cybersecurity in the healthcare sector. Medical devices are regulated in the European Union (EU) through vertical product-specific legislation, such as the Medical Device Regulation (MDR), among others. The MDR foresees safety requirements implying cybersecurity obligations for medical device manufacturers. In 2021, the EU legislator put forward the Network and Information Security System Directive reform (NIS 2) and the Artificial Intelligence Act (AIA) proposal, containing additional cybersecurity requirements applicable to medical devices. This article analyses how the new reforms interact with the existing legislation from a cybersecurity perspective. The research finds that parallel provision of analogous cybersecurity requirements (especially on notification requirements) could lead to regulatory overlapping, fragmentation, and uneven levels of protection of individuals in the EU internal market. In the \"Recommendations and conclusions\", the article provides policy recommendations to the EU legislator to help mitigate these risks.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"163-180"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9108685/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The legal obligation to provide timely security patching and automatic updates. 及时提供安全补丁和自动更新的法律义务。
Pub Date : 2022-01-01 Epub Date: 2022-09-06 DOI: 10.1365/s43439-022-00059-6
Alana Maurushat, Kathy Nguyen

Do you use Office 365 or Windows 10? How about GoDaddy to support your website? Has it been a while since you connected your iPhone to Wi-Fi instead of merely running off your data? Or is your Samsung phone more than 2 years old? Would it surprise you to learn that some of these products no longer receive security support or automatic updates? If so, you may be surprised to hear that you are being exposed to security risks, as many cyber incidences are the direct result of an absence of security patching and automatic updates. There are many reasons for this. Most companies provide security patches, but they are not always timely and many are not automated, requiring manual effort (often unbeknownst to consumers and businesses). Timely security patching is, upon discovery or notification of a security flaw in a system or product, the release of a security update within a reasonable time that patches and updates the security of a system-sometimes this is automatic, sometimes the security patch is merely a notification that you can and should patch your own system. A contributing factor to this is that there is no legal obligation to provide security support, let alone timely security support. This means that there is no legal requirement to patch known security vulnerabilities and bugs or issue automatic updates. This paper asks whether or not Australia should have a legal obligation to ensure timely security patching and require automatic updates by default in all consumer systems. Our conclusion: yes, it should, since many companies cannot be relied on to self-regulate and put their client's security interests first, and the stakes in cybersecurity have become too high to continue with the status quo. We conclude by presenting our recommended pathway for legal reform.

你使用Office 365还是Windows 10?GoDaddy支持你的网站怎么样?你已经有一段时间没有把iPhone连接到Wi-Fi了吗?或者你的三星手机已经使用2年多了?得知其中一些产品不再获得安全支持或自动更新,你会感到惊讶吗?如果是这样的话,你可能会惊讶地听说你正面临安全风险,因为许多网络事件都是缺乏安全补丁和自动更新的直接结果。原因有很多。大多数公司都提供安全补丁,但它们并不总是及时的,许多公司也不是自动化的,需要手动操作(消费者和企业通常不知道)。及时的安全补丁是指在发现或通知系统或产品中的安全缺陷后,在合理的时间内发布安全更新,以修补和更新系统的安全性——有时这是自动的,有时安全补丁只是通知您可以也应该修补自己的系统。造成这种情况的一个因素是,没有提供安全支持的法律义务,更不用说及时的安全支持了。这意味着没有法律要求修补已知的安全漏洞和错误或发布自动更新。本文询问澳大利亚是否有法律义务确保及时进行安全修补,并要求在所有消费者系统中默认自动更新。我们的结论是:是的,应该这样做,因为不能指望许多公司进行自我监管,把客户的安全利益放在首位,而且网络安全的风险已经太高,无法维持现状。最后,我们介绍了我们建议的法律改革途径。
{"title":"The legal obligation to provide timely security patching and automatic updates.","authors":"Alana Maurushat,&nbsp;Kathy Nguyen","doi":"10.1365/s43439-022-00059-6","DOIUrl":"10.1365/s43439-022-00059-6","url":null,"abstract":"<p><p>Do you use Office 365 or Windows 10? How about GoDaddy to support your website? Has it been a while since you connected your iPhone to Wi-Fi instead of merely running off your data? Or is your Samsung phone more than 2 years old? Would it surprise you to learn that some of these products no longer receive security support or automatic updates? If so, you may be surprised to hear that you are being exposed to security risks, as many cyber incidences are the direct result of an absence of security patching and automatic updates. There are many reasons for this. Most companies provide security patches, but they are not always timely and many are not automated, requiring manual effort (often unbeknownst to consumers and businesses). Timely security patching is, upon discovery or notification of a security flaw in a system or product, the release of a security update within a reasonable time that patches and updates the security of a system-sometimes this is automatic, sometimes the security patch is merely a notification that you can and should patch your own system. A contributing factor to this is that there is no legal obligation to provide security support, let alone timely security support. This means that there is no legal requirement to patch known security vulnerabilities and bugs or issue automatic updates. This paper asks whether or not Australia should have a legal obligation to ensure timely security patching and require automatic updates by default in all consumer systems. Our conclusion: yes, it should, since many companies cannot be relied on to self-regulate and put their client's security interests first, and the stakes in cybersecurity have become too high to continue with the status quo. We conclude by presenting our recommended pathway for legal reform.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"437-465"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9446640/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9900551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Editorial. 社论。
Pub Date : 2022-01-01 DOI: 10.1365/s43439-022-00051-0
Julia Utzerath
{"title":"Editorial.","authors":"Julia Utzerath","doi":"10.1365/s43439-022-00051-0","DOIUrl":"https://doi.org/10.1365/s43439-022-00051-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9040695/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Necessary or premature? The NIS 2 Directive from the perspective of the telecommunications sector 必要还是过早?从电信行业的角度看NIS 2指令
Pub Date : 2021-12-01 DOI: 10.1365/s43439-021-00035-6
Andreas Gruber, Natalie Ségur-Cabanac
{"title":"Necessary or premature? The NIS 2 Directive from the perspective of the telecommunications sector","authors":"Andreas Gruber, Natalie Ségur-Cabanac","doi":"10.1365/s43439-021-00035-6","DOIUrl":"https://doi.org/10.1365/s43439-021-00035-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"13 1","pages":"233-243"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74752885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Numbers and statistics: data and cyber breaches under the General Data Protection Regulation 数字和统计:根据《通用数据保护条例》的数据和网络泄露
Pub Date : 2021-12-01 DOI: 10.1365/s43439-021-00041-8
Julia Utzerath, Rhea Dennis
{"title":"Numbers and statistics: data and cyber breaches under the General Data Protection Regulation","authors":"Julia Utzerath, Rhea Dennis","doi":"10.1365/s43439-021-00041-8","DOIUrl":"https://doi.org/10.1365/s43439-021-00041-8","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"56 1","pages":"339-348"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77862632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accountability, liability and intermediaries: a new set of rules in India 问责制、责任和中介机构:印度的一套新规则
Pub Date : 2021-12-01 DOI: 10.1365/s43439-021-00036-5
Mathew Chacko, A. Misra, Shambhavi Mishra
{"title":"Accountability, liability and intermediaries: a new set of rules in India","authors":"Mathew Chacko, A. Misra, Shambhavi Mishra","doi":"10.1365/s43439-021-00036-5","DOIUrl":"https://doi.org/10.1365/s43439-021-00036-5","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"26 1","pages":"271-278"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77981279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Die Strafbarkeit des Betreibens krimineller Handelsplattformen im Internet – Der neue § 127 StGB Betreibens b2b网络罪犯的犯罪——新§127 StGB
Pub Date : 2021-12-01 DOI: 10.1365/s43439-021-00040-9
M. Zöller
{"title":"Die Strafbarkeit des Betreibens krimineller Handelsplattformen im Internet – Der neue § 127 StGB","authors":"M. Zöller","doi":"10.1365/s43439-021-00040-9","DOIUrl":"https://doi.org/10.1365/s43439-021-00040-9","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"95 1","pages":"279-296"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75762848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International cybersecurity law review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1