Search
Search Results
-
Legal Developments on Cybersecurity and Related Fields
This book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member... -
Digital Signatures and Quantum Computing
The legal framework of electronic signatures in the European Union is mainly based on the use of Public Key cryptography systems or asymmetric... -
The Importance of the Computer Undercover Agent as an Investigative Measure Against Cybercrime: A Special Reference to Child Pornography Crimes
The Internet is a scenario in which a wide range of criminal activities can be carried out and, in addition, it is a medium in which it is very... -
Towards Cyber Security Regulation of Software in the European Union
Under European Union law, software, the defining asset class of the twenty-first century, carries broad rights. It is subject to only a limited and... -
Biometric Signatures in the Context of Regulation (EU) nr. 910/2014 and the General Data Protection Regulation: The Evidential Value and Anonymization of Biometric Data
In this chapter, we intend to analyze the importance of the biometric signature in the context of the dematerialization of legal business, given its... -
Legal Developments on Cybersecurity and Related Fields: Introductory Notes and Presentation
This book presents an innovative approach to cybersecurity issues, aiming not only to analyse the legal landscape of the European Union and its... -
Legal Management of the Concept of Risk in Reversible Operations Against Space Assets
In recent years, the spectrum of risks to space infrastructures has broadened considerably, both in terms of heterogeneity and severity. Today, the... -
Legal Developments on Smart Public Governance and Fundamental Rights in the Digital Age
As the title itself suggests, this chapter proposes to reflect on two of the most important challenges which are being faced by public governance... -
Cyber Operations Targeting Space Systems. Legal Questions and the Context of Privatisation
The present chapter addresses how legal uncertainty creates an environment where the escalation of cyber operations targeting space systems may... -
Research on Legal Issues in the Mature Period of CryptoSDRs
As an increasing number of countries accept and recognize cryptoSDRs until all countries eventually adopt them as the world’s main supersovereign... -
The Impact of CryptoSDRs and China’s Countermeasures
The birth of cryptoSDRs will inevitably have a significant impact on China’s industrial development, economic operation, legal formulation, policy... -
A Study on the Creation, Impact and Legal Issues of Crypto Special Drawing Rights
This book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and Crypto-SDRs and provides a...
-
Bug Bounties: Ethical and Legal Aspects
Bug bounty programs are a new approach to pen-testing. Through them, organisations are willing to test their products taking advantage of hackers... -
Post-Mortem Data Protection and Succession in Digital Assets Under Spanish Law
This contribution analyses a hot topic across Europe: the issue of post-mortem data protection and succession in digital assets focusing on Spanish... -
Cybersecurity Issues in Electronic Communications and Some Insights on Digital Literacy and Technological Infrastructures’ Demands: Anticipations of the European Digital Decade Through the Lens of a Declaration on Digital Rights and Principles
European Union is living its Digital Decade until 2030, where digital technologies are changing the way people relate, work, and behave, with the... -
Getting Critical: Making Sense of the EU Cybersecurity Framework for Cloud Providers
In this chapter, we review how the EU cybersecurity regulatory framework impacts providers of cloud computing services. We examine the evolving... -
Profiling and Cybersecurity: A Perspective from Fundamental Rights’ Protection in the EU
In this text we will be assessing to what extent personal data protection is related to the development of AI systems, as well as testing to what... -
Information Security Metrics: Challenges and Models in an All-Digital World
The evolution of ICT and the accelerated adoption process in all sectors of activity have revealed immense cybersecurity threats, which can... -
Cyberterrorism and the Portuguese Counter-Terrorism Act
Starting with an analysis of the international doctrine on the conceptualization of cyberterrorism, the aim of this article is to assess whether Law... -
Risks and Regulations in the Early Stage of the Birth of CryptoSDRs
Based on the introduction provided in the previous chapters, we can see that the birth of cryptoSDRs was a gradual process, and the reform of the IMF...