Geteiltes Wissen, gestärkte Resilienz: Informationsaustausch über Cyberbedrohungen gemäß Art. 45 DORA Gerd WaschbuschBen Schlenker Original Paper Open access 03 May 2024 Pages: 213 - 236
Cyber-Security awareness and its contribution towards sustainable human development: insights from the Zimbabwean context Colletor Tendeukai ChipfumbuTheo TsokotaTendayi Marovah Original Paper 29 April 2024 Pages: 347 - 364
A multi-layered security model to counter social engineering attacks: a learning-based approach Luke EdwardsMuhammad Zahid IqbalMahmudul Hassan OriginalPaper 18 April 2024 Pages: 313 - 336
A literature review of the evolution of sovereignty and borders concepts in cyberspace Yassin Abdalla Abdelkarim OriginalPaper 16 April 2024 Pages: 365 - 372
The most impactful ransomware attacks in 2023 and their business implications Fabian M. TeichmannSonia R. Boticiu OriginalPaper 10 April 2024 Pages: 301 - 311
Cyber threat intelligence: existing benefits and challenges for law firms and businesses Fabian M. TeichmannSonia R. Boticiu OriginalPaper 05 April 2024
Adequate responses to cyber-attacks Fabian M. TeichmannSonia R. Boticiu OriginalPaper 04 April 2024 Pages: 337 - 345
Retaliating against cyber-attacks: a decision-taking framework for policy-makers and enforcers of international and cybersecurity law Sozon LeventopoulosKosmas PipyrosDimitris Gritzalis Original Paper Open access 27 March 2024 Pages: 237 - 262
Behind the Huawei sanction: national security, ideological prejudices or something else? Qingxiu Bu Original Paper Open access 04 March 2024 Pages: 263 - 300
Phishing attacks: risks and challenges for law firms Fabian M. TeichmannSonia R. Boticiu Best Practice Reports 07 February 2024
More than malware: unmasking the hidden risk of cybersecurity regulations Mazaher KianpourShahid Raza Original Paper Open access 02 February 2024 Pages: 169 - 212
Harmonizing open banking in the European Union: an analysis of PSD2 compliance and interrelation with cybersecurity frameworks and standards Marianna GounariGeorge StergiopoulosDimitris Gritzalis Original Paper Open access 25 January 2024 Pages: 79 - 120
Blockchain for Artificial Intelligence (AI): enhancing compliance with the EU AI Act through distributed ledger technology. A cybersecurity perspective Simona RamosJoshua Ellul Original Paper Open access 25 January 2024 Pages: 1 - 20
Looking towards Europe? Assessing the prospects of the ECOWAS Cybersecurity Strategy in promoting responsible state behavior Uchenna Jerome Orji Original Paper 18 January 2024 Pages: 143 - 168
The trans-national cybercrime court: towards a new harmonisation of cyber law regime in ASEAN Kwan Yuen IuVanessa Man-Yi Wong OriginalPaper 06 December 2023 Pages: 121 - 141
How does one negotiate with ransomware attackers? Sonia BoticiuFabian Teichmann OriginalPaper 06 December 2023 Pages: 55 - 65
Das E-Rezept-Konzept als neuer Sicherheitsstandard für elektronische Verordnungen?! Karl SydowAndrea Schmitz OriginalPaper 23 November 2023 Pages: 31 - 54
How do cybercriminals launder the proceeds of their crimes? Fabian TeichmannSonia Boticiu Short Reports 22 November 2023 Pages: 67 - 77
Fortifying the weakest link: cybersecurity coordination in supply chains and competition rules Masaki Iwasaki OriginalPaper 17 November 2023 Pages: 21 - 29
Capacity, capability, and collaboration: a qualitative analysis of international cybercrime investigations from the perspective of Canadian investigators Ryan Buhrig Best Practice Reports 20 October 2023 Pages: 415 - 429
Ratifying an international treaty: Is it enough? (Shortcomings of the ratification of the Budapest Convention by Greece) Emmanouil Metaxakis OriginalPaper 06 September 2023 Pages: 451 - 470
An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming Fabian M. TeichmannSonia R. Boticiu OriginalPaper 04 September 2023 Pages: 387 - 397
Road to homogenization? Argentina publishes a new bill to replace the Personal Data Protection Law Diego FernandezJosefina Barbero OriginalPaper 30 August 2023 Pages: 471 - 487
The outcome efficacy of the entity risk management requirements of the NIS 2 Directive Donald David Stewart Ferguson OriginalPaper Open access 17 August 2023 Pages: 371 - 386
Ransomware attacks in the context of generative artificial intelligence—an experimental study Fabian Teichmann OriginalPaper Open access 07 August 2023 Pages: 399 - 414
Examining the institutional and legislative frameworks for enforcing cybersecurity in Zimbabwe Leon PoshaiAlouis ChilunjikaKudakwashe Intauno OriginalPaper 27 July 2023 Pages: 431 - 449
The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate? Fabian TeichmannSonia R. BoticiuBruno S. Sergi OriginalPaper 13 July 2023 Pages: 259 - 280
Wolfgang A. Rehmann und Christian Tillmanns (Hrsg.): E-Health/Digital Health – Rechtshandbuch. C.H. Beck Verlag München, 2022, 483 Seiten, geb. € 159,–, ISBN 978-3-406-76208-6 Carsten Dochow Book Reviews 22 June 2023 Pages: 365 - 369
Latest technology trends and their cybersecurity implications Fabian TeichmannSonia R. BoticiuBruno S. Sergi OriginalPaper 15 June 2023 Pages: 281 - 289
Cybersecurity incident reporting laws in the Asia Pacific Nicholas Seng OriginalPaper 02 June 2023 Pages: 325 - 346
An overview of cybercrime law in South Africa Sizwe Snail ka MtuzeMelody Musoni OriginalPaper Open access 02 June 2023 Pages: 299 - 323
The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored Fabian Maximilian Johannes TeichmannBruno S. SergiChiara Wittmann OriginalPaper 02 June 2023 Pages: 291 - 298
Australia’s cyber security reform—an update Dan Jerker B. Svantesson Short Reports 08 May 2023 Pages: 347 - 350
Applying blockchain to the modern legal system: Kleros as a decentralised dispute resolution system Alesia Zhuk OriginalPaper Open access 12 April 2023 Pages: 351 - 364
The EU’s cybersecurity framework: the interplay between the Cyber Resilience Act and the NIS 2 Directive Philipp EckhardtAnastasia Kotovskaia OriginalPaper 29 March 2023 Pages: 147 - 164
Drawing lines: geofence warrants and the third-party doctrine Josh A. Roth OriginalPaper 28 March 2023 Pages: 213 - 233
European information regulation in the Ukraine War Sebastian Louven Short Reports 09 March 2023 Pages: 249 - 251
Comparing Canada’s proposed Critical Cyber Systems Protection Act with cybersecurity legal requirements in the EU Matt MaloneRussell Walton OriginalPaper 01 March 2023 Pages: 165 - 196
Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance Gabrielle Bezerra Sales SarletDaniel Piñeiro Rodriguez OriginalPaper 13 February 2023 Pages: 197 - 211
Dr. Ifeoma Nwafor: Cybercrime and the law: issues and developments in Nigeria. (2022) CLDS Publishing. pp. 1–285 Sizwe Snail ka Mtuze Book Reviews 30 January 2023 Pages: 253 - 254
The curious case of automated decision-making in India Pratiksha Ashok OriginalPaper 27 January 2023 Pages: 235 - 248
Kritikalität: Von der BSI-KritisV zur NIS2-Richtlinie Valentin VogelNicolas Ziegler OriginalPaper Open access 16 January 2023 Pages: 1 - 19
Regulation of the European Parliament and the Council on digital operational resilience for the financial sector (DORA) Dirk Clausmeier OriginalPaper 16 December 2022 Pages: 79 - 90
Anforderungen an die Cybersicherheit bei der Erbringung von IT-Dienstleistungen für Arztpraxen sowie Krankenhäuser und Möglichkeiten der Vertragsgestaltung Ole Ziegler OriginalPaper 09 December 2022 Pages: 61 - 77
When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach Veljko Turanjanin OriginalPaper 02 December 2022 Pages: 115 - 136
The European framework for cybersecurity: strong assets, intricate history Salvino A. SalvaggioNahuel González Short Reports Open access 28 November 2022 Pages: 137 - 146
Incidental data: observation of privacy compromising data on social media platforms Stefan Kutschera OriginalPaper Open access 10 November 2022 Pages: 91 - 114
Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange Cristina Del-RealAntonio M. Díaz-Fernández OriginalPaper Open access 09 November 2022 Pages: 313 - 343
Computer security incident response teams: are they legally regulated? The Swiss example Pauline MeyerSylvain Métille OriginalPaper Open access 08 November 2022 Pages: 39 - 60