Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9783031418204
    Language: English
    Pages: 1 Online-Ressource(VI, 344 p. 6 illus., 4 illus. in color.)
    Edition: 1st ed. 2024.
    Series Statement: Law, Governance and Technology Series 60
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Information technology ; Mass media ; Law ; Criminal law. ; Data protection.
    Abstract: Legal Developments on Cybersecurity and Related Fields: Introductory notes and presentation -- PART I – CYBERSECURITY, CYBERDEFENCE AND LAW -- Getting critical. Making sense of the EU security framework for cloud providers -- Cyber operations targeting space systems. Legal questions and the context of privatisation -- A legal assessment of the concept of risk in reversible operations through cyber and electronic means -- Knowledge management and continuous improvement in cyberspace -- Information security metrics: challenges and models in an all-digital world -- Cyberterrorism and the Portuguese counter-terrorism act -- PART II – CYBERSECURITY AND LAW: SPECIFIC TOPICS -- Towards cybersecurity regulation of software in the European Union -- The importance of the computer undercover agent as an investigative measure against cybercrime: a special reference to child pornography crimes -- Post-Mortem data protection and succession in digital assets under Spanish law -- The suitability of the regime of technological measures for copyright protection in the face of modern cybersecurity risks -- Digital signatures and quantum computing -- No words needed? Emojis as evidence in judicial proceedings -- PART III – CYBERSECURITY, ETHICS AND FUNDAMENTAL RIGHTS -- Bug bounties: ethical and legal aspects -- Profiling and cybersecurity: a perspective from fundamental rights' protection in the EU -- Legal developments on smart public governance and fundamental rights in the digital age -- Biometric signatures in the context of Regulation (EU) nr. 910/2014 and the general data protection regulation: the evidential value and anonymization of biometric data -- Cybersecurity issues in electronic communications and some insights on digital literacy and technological infrastructures’ demands – anticipations of the European Digital Decade through the lens of a Declaration on digital rights and principles.
    Abstract: This book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member States, but to do so in an interdisciplinary manner, involving scholars from diverse backgrounds – ranging from legal experts to ICT and engineering professionals. Cybersecurity requirements must be understood in a broader context, encompassing not just conventional aspects, but also emerging topics. This can only be achieved through an interdisciplinary approach. Indeed, cybersecurity should be consistently considered in relation to cybercrime and/or cyber defense, while examining it through the lens of specific domains that are intertwined with various legal fields. Moreover, it is crucial to uphold ethical standards and safeguard fundamental rights, particularly regarding personal data protection. By adopting this comprehensive perspective, the significance of cybersecurity in the exercise of public authority becomes apparent. It also plays an essential role in upholding the fundamental values of both individual Member States and the EU as a whole, such as the rule of law. Moreover, it fosters trust, transparency, and effectiveness in market relations and public administration interactions. In turn, the book draws on the expertise of its authors to provide insights into ICT components and technologies. Understanding these elements holistically is essential to viewing every "cyber" phenomenon from a legal standpoint. In addition to the holistic and interdisciplinary approach it presents, the book offers a captivating exploration of cybersecurity and an engaging read for anyone interested in the field.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...