Skip to main content
Los recientes ciberataques perpetrados con el programa malicioso Wannacry (Wannacrypt0r 2.0) en contra de las redes digitales de instalaciones de salud, comunicaciones, mando y control de trenes, empresas de paquetería, servicio de gas,... more
    • by 
    •   4  
      CybercrimeCyber SecurityCybersecurity policycybersecurity and international relations
In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international... more
    • by 
    •   11  
      Cyber TerrorismCyber crimeIndiaCybersecurity
With the arrival of cyberspace, a whole host of new security and other challenges have arisen which are not always adequately tackled. In order to deal with them more appropriately, India has repeatedly argued for a greater role of the UN... more
    • by 
    •   8  
      International RelationsInternational LawUnited NationsIndia
Timely sharing of cyber security related information between organizations has long been perceived as an effective measure to address cyber security challenges. Even though information sharing is a cost-effective tool and a crucial step... more
    • by 
    •   3  
      CyberculturesCybersecurityCybersecurity policy
• From a statistical point of view, we normally get to identify only 1 out of 7 serious cases of cyberwarfare attacks.
    • by 
    • Cybersecurity policy
La ciberseguridad es un problema a hacer frente por los despachos de abogados, grandes y pequeños y en esta profesión lo estamos abordando realmente mal. Es difícil luchar contra algo que no se ve y poca gente entiende, sobre todo cuando... more
    • by 
    •   4  
      CybersecurityCybersecurity LawCybersecurity policyCiberseguridad
Information and communication technologies provide immediate means, motivations and opportunities for cybercrime. However, deeper cultural, social and psychological developments triggered by globalisation are the root causes of such... more
    • by 
    •   9  
      CriminologyGlobalizationCyberspaceCybersecurity
The cybersecurity industry has a significant employment gap, with over 301,000 open jobs in the United States, up from 285,000 jobs in 2017 (Cybersecurity Supply and Demand Heat Map, n.d.). The unfilled positions span the country and the... more
    • by 
    •   3  
      Security AwarenessCybersecurity policycybersecurity workforce diversity
In 2013, Indonesia topped China and was acknowledged as the country with the highest rate of cyber attack traffic, in which with its 1,6 percent share of world Internet users, Indonesia contribute 38 percent of the total cyber attack in... more
    • by 
    •   5  
      CyberculturesCyber LawCyber SecurityCyber Defence
The debate on government access to encrypted data, popularly known as the “going dark” debate, has intensified over the years. On the one hand, law enforcement authorities have been pushing for mandatory exceptional access mechanisms on... more
    • by 
    •   3  
      CyberlawPrivacy and data protectionCybersecurity policy
    • by 
    • Cybersecurity policy
Deklaracja Wyszehradzka z 15 lutego 1991 roku zakładała intensywną współpracę sygnatariuszy ukierunkowaną na uzyskanie członkostwa w strukturach Unii Europejskiej i Sojuszu Północnoatlantyckiego. Potwierdzono w niej gotowość do ponoszenia... more
    • by 
    •   5  
      Central and Eastern EuropeCybersecurityV4Vishegrad Four
    • by 
    •   2  
      CybersecurityCybersecurity policy
Does the Internet facilitate democratization or democratic entrenchment? The body of literature on the Internet and democracy points to scholarly divergence on this issue. This article seeks to contribute to this debate by analyzing... more
    • by 
    •   6  
      Internet GovernanceSocial MediaThailandCybersecurity
In an age when cybersecurity vulnerabilities can be used as a pretext for a blockade, as in the case of Qatar prompted by a hack of the Qatar News Agency, it becomes incumbent upon states to consider legislating the capability maturity... more
    • by 
    •   9  
      MathematicsLawQatarCybersecurity
Russia's exercise of cyberpower forms an integral part of the far broader concept known as information warfare. The key principle of the Russian approach to information warfare, including cyber activities, is that information is the most... more
    • by 
    •   11  
      Russian StudiesInformation SecurityIntelligenceInformation Warfare
Difficulties in matching cyber security supply with demand have been reported in Australia, Japan, the United Kingdom and the United States; these countries have also been among the most active in mitigating the shortage through... more
    • by 
    •   9  
      Science EducationEducation PolicyCybersecurityCyber Security
Conferência / aula na "Maratona Direito e Tecnologia Digital e Quântica (Quando o Direito é desafiado pelo Digital)", do Conselho Regional de Lisboa da Ordem dos Advogados. Dia 30 de março de 2021.
    • by 
    •   20  
      Information SecurityPrivacyPERSONAL DATA PROTECTIONEuropean Union Law
The purpose of this paper is to present a set of well-investigated Internet of Things (IoT) security guidelines and best practices that others can use as a basis for future standards, certifications, laws, policies and/or product... more
    • by  and +2
    •   40  
      AlgorithmsInformation TechnologyTechnologyInformation Security
“Italy Cyber Readiness at a Glance” is the sixth of a series of country reports assessing national-level preparedness for cyber risks based on the Cyber Readiness Index (CRI) 2.0 methodology. This report provides an extensive analysis of... more
    • by 
    •   3  
      CybersecurityNational SecurityCybersecurity policy
Nations and their citizens rely on infrastructures. Their incapacitation or destruction could prevent nations from protecting themselves from threats, cause substantial economic harm, and even result in the loss of life. Therefore,... more
    • by 
    •   6  
      Critical infrastructure protectionCyber SecurityCyber Attack AttributionCybersecurity Law
The prevalence of the use of information and communications technologies in the Philippines calls for a reassessment of the policies that protect the security of the people in cyberspace. Studies and reports on cybersecurity focusing on... more
    • by  and +2
    •   3  
      PoliticsCybersecurityCybersecurity policy
À l'occasion cette fin d’année épidémique, ATLANTICO a demandé à ses contributeurs les plus fidèles de s'interroger sur l'année à venir. A quoi pourrait bien ressembler 2022 ? Franck DeCloquement aborde le dossier et se penche sur les... more
    • by 
    •   9  
      Cyber TerrorismCybercultureCyber crimeCybersecurity
Acknowledging the fundamental importance of CI for national security, the Kosciusko Institute decided to devote the present report to the problem of its protection focusing primarily on cyber security of CI due to its growing role and... more
    • by 
    •   4  
      CybersecurityCritical infrastructure protectionCybersecurity LawCybersecurity policy
Angeles (UCLA). Thank you to the dedicated Federal Communications Law Journal staff for bringing this Note to publication. Special thanks to Meredith Rose, Journal Adjunct, and Atena Sheibani-Nejad, Notes Editor, for their patience and... more
    • by 
    •   15  
      Information TechnologyCriminal LawCopyrightPrivacy (Law)
The technological transformation story of Azerbaijan is marked by the popular embrace of digital banking, implementation of centralized e-government services, and the automation of critical energy infrastructure. However, this march... more
    • by 
    •   6  
      AzerbaijanCyberwarfareCybersecurityCyberwar
In the present scenario all software systems are imperfect because they cannot be built with mathematical or physical certainty, Hence in this research paper the comparison of various software development models has been carried out.... more
    • by 
    •   2  
      CybersecurityCybersecurity policy
O acelerado processo de globalização e as suas dinâmicas, causaram nos Estados um aumento da sua vulnerabilidade e dos seus receios relativamente à segurança e defesa do seu território, assim, dadas as caraterísticas dos ciberataques,... more
    • by 
    •   3  
      PortugalCybersecurityCybersecurity policy
Today cyber space is easily accessible and has presence beyond geo-political boundaries; also rapidly becoming a global battlefield for various states and non-states entities. With the advent of the Internet of Things (IoT), every... more
    • by 
    •   34  
      Policy Analysis/Policy StudiesSocial PolicyCyberlawDemocracy and Cyber-Democracy Theory and Practice
Cyber threats are fundamentally different from any other because they usually do not involve any kinetic, or in other words physical, effects or actions. Yet they nonetheless have a huge potential for damage because digital and networked... more
    • by 
    •   7  
      Information SecurityComputer SecurityCybersecurityCyber Security
The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the... more
    • by  and +1
    •   289  
      BusinessInformation SystemsManagementRisk Management and Insurance
The purpose of the following white paper is to present a set of well- investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product... more
    • by  and +3
    •   39  
      Information TechnologyTechnologyInformation SecurityNetwork Security
This article provides insights into the dangers and opportunities that the cyber realm poses to states by conducting the first comprehensive case study on Israeli use of cyberspace. Israel faces a constant barrage of cyberattacks from... more
    • by  and +1
    •   9  
      Israel StudiesCyber TerrorismCyber WarfareCybercultures
El objetivo de este texto es mostrar cómo los Estados han buscado mediante normas nacionales e internacionales, así como alianzas con países y actores estratégicos, aprovechar las ventajas del ciberespacio y reducir las vulnerabilidades.... more
    • by 
    •   14  
      International RelationsInternational SecurityForeign PolicyInternational Politics
In 2017, the WannCry and NotPeya showed that attacks targeting the cyber component of infrastructures (e.g. attacks on power plants), services (e.g. attacks to banks or hospitals servers), and endpoint devices (e.g. attacks on mobiles and... more
    • by 
    •   13  
      Artificial IntelligenceEthicsPrivacyComputer Ethics
Fake news is not a new issue but it poses a greater challenge now. The velocity of information has increased drastically with messages now spreading internationally within seconds online. Readers are overwhelmed by the flood of... more
    • by  and +1
    •   10  
      PropagandaInformation WarfareMedia LiteracyInformation operations (IO)
Amidst rapid urban development, sustainable transportation solutions are required to meet the increasing demands for mobility whilst mitigating the potentially negative social, economic, and environmental impacts. This study analyses... more
    • by  and +1
    •   197  
      Information SystemsRisk Management and InsuranceTransportation EngineeringInformation Science
Eight U.S. states are leading the rest in cybersecurity readiness. In “State of the States on Cybersecurity,” Senior Fellow Francesca Spidalieri reviews the efforts of state governments in California, Maryland, Michigan, New Jersey, New... more
    • by 
    •   3  
      CybersecurityNational SecurityCybersecurity policy
El progreso de los medios cibernéticos y su aplicación como medio de defensa – ataque por parte de diversos actores de la sociedad internacional, así como la utilización del campo de batalla virtual (ciberespacio) por parte de los Estados... more
    • by 
    •   5  
      CyberlawCyber crimeCybersecurityCybersecurity policy
Ciberseguridad Nacional en México y sus desafíos RESUMEN 1 Debido a los avances tecnológicos los Estados enfrentan nuevos desafíos en la llamada Era de la Información. Estos desafíos están ligados a la falta de protección y al mal uso del... more
    • by 
    •   5  
      CyberspaceCyber SecurityCyberwarCyberwarfare, Cyberterrorism, Geopolitics
In liberal democratic countries, the role of the state in cybersecurity is a politically contested space. We investigate that role along three dimensions: the first is theoretical and we look at existing cybersecurity literature, showing... more
    • by 
    •   5  
      CybersecurityCyber SecuritySecurity PolicyCyber Politics
Cybercafé administrator used to be a major player in cybercrimes control in conjunction with security operatives, until the advent and popularity of internet service by the GSM operators in Nigeria. This study investigates the level of... more
    • by 
    •   6  
      CybercrimesNetwork SecurityCyber EthicsCyberspace
Internet can be considered as one of the greatest achievements of humanity of the last century, which connected the entire world. It created a new space for connections, information and communications, as well as cooperation. Thus, it... more
    • by 
    •   3  
      CyberspaceCybersecurity policyCyberwars
Dynamiczny rozwój technologii cyfrowej sprawił, że komputeryzacja objęła niemal wszystkie sektory państwa. Ekspansja tej technologii wywarła ogromny wpływ także na społeczeństwo, które współcześnie przekształca się w społeczeństwo... more
    • by  and +1
    •   5  
      CybercrimesCyber crimeCyberscienceCybersecurity
Cyberspace poses a great challenge to the traditional governance, that is mainly state-centric-it challenges the traditional concepts like security, borders, privacy and sovereignty. Legal discussions about cyberspace governance often... more
    • by 
    •   7  
      European UnionCybersecurityCyber SecurityCybersecurity Law
The ongoing digitization leads to a deepening dependence of the next life spheres on information technology. The global net- work has become the basic tool for work, communication and entertainment. The changes that are taking place have... more
    • by 
    •   5  
      CyberlawCybersecurityCyber SecurityCybersecurity Law
DERECHOS HUMANOS Y SEGURIDAD DIGITAL: UNA PAREJA PERFECTA El rol de organizaciones multilaterales en la agenda latinoamericana de seguridad digital: El caso de la OEA
    • by 
    •   4  
      Digital RightsCybersecurity policyOASSeguridad Digital
Recently we have witnessed the worldwide adoption of many different types of innovative technologies, such as crowdsourcing, ridesharing, open and big data, aiming at delivering public services more efficiently and effectively. Among... more
    • by  and +1
    •   232  
      ManagementRisk Management and InsuranceInformation TechnologyPolicy Analysis/Policy Studies