We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 374 results
  1. Legal Developments on Cybersecurity and Related Fields

    This book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member...
    Francisco António Carneiro Pacheco de Andrade, Pedro Miguel Fernandes Freitas, Joana Rita de Sousa Covelo de Abreu in Law, Governance and Technology Series
    Book 2024
  2. Digital Signatures and Quantum Computing

    The legal framework of electronic signatures in the European Union is mainly based on the use of Public Key cryptography systems or asymmetric...
    Francisco António Carneiro Pacheco de Andrade, José Carlos Bacelar Almeida in Legal Developments on Cybersecurity and Related Fields
    Chapter 2024
  3. Biometric Signatures in the Context of Regulation (EU) nr. 910/2014 and the General Data Protection Regulation: The Evidential Value and Anonymization of Biometric Data

    In this chapter, we intend to analyze the importance of the biometric signature in the context of the dematerialization of legal business, given its...
    Francisco António Carneiro Pacheco de Andrade, Ana Silva, Ricardo Guimarães in Legal Developments on Cybersecurity and Related Fields
    Chapter 2024
  4. Legal Developments on Cybersecurity and Related Fields: Introductory Notes and Presentation

    This book presents an innovative approach to cybersecurity issues, aiming not only to analyse the legal landscape of the European Union and its...
    Francisco António Carneiro Pacheco de Andrade, Pedro Miguel Freitas, Joana Rita de Sousa Covelo de Abreu in Legal Developments on Cybersecurity and Related Fields
    Chapter 2024
  5. Cyber Operations Targeting Space Systems. Legal Questions and the Context of Privatisation

    The present chapter addresses how legal uncertainty creates an environment where the escalation of cyber operations targeting space systems may...
    Chapter 2024
  6. The Importance of the Computer Undercover Agent as an Investigative Measure Against Cybercrime: A Special Reference to Child Pornography Crimes

    The Internet is a scenario in which a wide range of criminal activities can be carried out and, in addition, it is a medium in which it is very...
    Chapter 2024
  7. Legal Management of the Concept of Risk in Reversible Operations Against Space Assets

    In recent years, the spectrum of risks to space infrastructures has broadened considerably, both in terms of heterogeneity and severity. Today, the...
    Chapter 2024
  8. Towards Cyber Security Regulation of Software in the European Union

    Under European Union law, software, the defining asset class of the twenty-first century, carries broad rights. It is subject to only a limited and...
    Chapter 2024
  9. Legal Developments on Smart Public Governance and Fundamental Rights in the Digital Age

    As the title itself suggests, this chapter proposes to reflect on two of the most important challenges which are being faced by public governance...
    Isabel Celeste Fonseca, Joel A. Alves in Legal Developments on Cybersecurity and Related Fields
    Chapter 2024
  10. Research on Legal Issues in the Mature Period of CryptoSDRs

    As an increasing number of countries accept and recognize cryptoSDRs until all countries eventually adopt them as the world’s main supersovereign...
    Chapter 2024
  11. The Impact of CryptoSDRs and China’s Countermeasures

    The birth of cryptoSDRs will inevitably have a significant impact on China’s industrial development, economic operation, legal formulation, policy...
    Chapter 2024
  12. A Study on the Creation, Impact and Legal Issues of Crypto Special Drawing Rights

    This book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and Crypto-SDRs and provides a...

    Book 2024
  13. Bug Bounties: Ethical and Legal Aspects

    Bug bounty programs are a new approach to pen-testing. Through them, organisations are willing to test their products taking advantage of hackers...
    Chapter 2024
  14. Post-Mortem Data Protection and Succession in Digital Assets Under Spanish Law

    This contribution analyses a hot topic across Europe: the issue of post-mortem data protection and succession in digital assets focusing on Spanish...
    Chapter 2024
  15. Getting Critical: Making Sense of the EU Cybersecurity Framework for Cloud Providers

    In this chapter, we review how the EU cybersecurity regulatory framework impacts providers of cloud computing services. We examine the evolving...
    Ian Walden, Johan David Michels in Legal Developments on Cybersecurity and Related Fields
    Chapter 2024
  16. Profiling and Cybersecurity: A Perspective from Fundamental Rights’ Protection in the EU

    In this text we will be assessing to what extent personal data protection is related to the development of AI systems, as well as testing to what...
    Chapter 2024
  17. Information Security Metrics: Challenges and Models in an All-Digital World

    The evolution of ICT and the accelerated adoption process in all sectors of activity have revealed immense cybersecurity threats, which can...
    Henrique Santos, Teresa Pereira, André Oliveira in Legal Developments on Cybersecurity and Related Fields
    Chapter 2024
  18. Cyberterrorism and the Portuguese Counter-Terrorism Act

    Starting with an analysis of the international doctrine on the conceptualization of cyberterrorism, the aim of this article is to assess whether Law...
    Pedro Miguel Fernandes Freitas in Legal Developments on Cybersecurity and Related Fields
    Chapter 2024
  19. Risks and Regulations in the Early Stage of the Birth of CryptoSDRs

    Based on the introduction provided in the previous chapters, we can see that the birth of cryptoSDRs was a gradual process, and the reform of the IMF...
    Chapter 2024
Did you find what you were looking for? Share feedback.