Issue | Title | |
Vol 1, No 3 (2023) | Violating the Rules of Centralized Management of Technical Means of Counteracting the Threats to Information Security | Abstract PDF (Eng) similar documents |
E. A. Russkevich | ||
"... technical means of counteracting the threats to information security; to elaborate theoretical ..." | ||
Vol 1, No 1 (2023) | Terrorist Crimes in the Era of Digitalization: Forms of Activity and Measures for Counteraction | Abstract PDF (Eng) similar documents |
E. Yu. Antonova | ||
"... commitment. A conclusion was made that, to provide the efficiency of measures for counteracting terrorist ..." | ||
Vol 2, No 2 (2024) | Demarcation of Cyberspace: Political and Legal Effects of Applying the Concept of Sovereign States’ Interests | Abstract PDF (Eng) similar documents |
Y. A. Abdelkarim | ||
"... in the context of fulfilling security requirements and intensifying national defense against cyber threats ..." | ||
Vol 2, No 4 (2024) | Countering Cyberattacks: Gaps in International Law and Prospects for Overcoming them | Abstract PDF (Eng) similar documents |
M. M. Rahman, T. K. Das | ||
"... юридических мер противодействия им на международном уровне. Методы: представлены доктринальным юридическим ..." | ||
Vol 1, No 4 (2023) | Employing the Responsibility to Protect (R2P) to Impose Universal Jurisdiction Regarding Cyber-Terrorism | Abstract PDF (Eng) similar documents |
Ya. A. Abdelkarim | ||
"... and establishment of jurisdiction, have become a breeding ground for the emergence of a new global threat ..." | ||
Vol 3, No 1 (2025) | Crimes in the Age of Artificial Intelligence: a Hybrid Approach to Liability and Security in the Digital Era | Abstract PDF (Eng) similar documents |
N. Bhatt | ||
"... for research in the field of explicable artificial intelligence and security standards. These measures ..." | ||
Vol 3, No 1 (2025) | Universal Information Security Governance System: Organizational and Legal Principles | Abstract PDF (Eng) similar documents |
M. A. Hadi, M. N. Abdulredha | ||
"... security governance system that will allow each organization to create its own effective information ..." | ||
Vol 1, No 3 (2023) | Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models | Abstract PDF (Eng) similar documents |
D. Utegen, B. Zh. Rakhmetov | ||
"... information security of persons and state-legal protection of their right to privacy. Methods: risk-oriented ..." | ||
Vol 1, No 4 (2023) | Achieving Algorithmic Transparency and Managing Risks of Data Security when Making Decisions without Human Interference: Legal Approaches | Abstract PDF (Eng) similar documents |
A. K. Zharova | ||
"... stringent requirements for ensuring the security of personal and other big data obtained and processed ..." | ||
Vol 1, No 3 (2023) | Sovereignty vs. Digital Sovereignty | Abstract PDF (Eng) similar documents |
M. Robles-Carrillo | ||
Vol 1, No 4 (2023) | Ethics of Artificial Intelligence and Robotics: Key Issues and Modern Ways to Solve Them | Abstract PDF (Eng) similar documents |
N. Yadav | ||
Vol 2, No 2 (2024) | Prospects and Issues Concerning the Regulatory Regime of E-Payment System in Nigeria | Abstract PDF (Eng) similar documents |
I. O. Haruna, P. A. Aidonojie, O. J. Beida | ||
"... of electronic signature, trust in technology, data privacy, security of electronic transactions, fraud ..." | ||
Vol 1, No 4 (2023) | Digital Inclusion for People with Autism Spectrum Disorders: Review of the Current Legal Models and Doctrinal Concepts | Abstract PDF (Eng) similar documents |
J. Hutson, P. Hutson | ||
Vol 2, No 3 (2024) | Legal Issues of Ensuring Technological Sovereignty | Abstract PDF (Eng) similar documents |
M. V. Zaloilo | ||
"... -tech products based on them in order to ensure national security of the Russian Federation. ..." | ||
Vol 2, No 4 (2024) | Overcoming Illegal Cross-border Transfer of Personal Data | Abstract PDF (Eng) similar documents |
D. V. Bakhteev, A. M. Sosnovikova, E. V. Kazenas | ||
"... . In the second section, the modeling method allows forming an algorithm for identifying information security ..." | ||
Vol 1, No 4 (2023) | Towards Legal Regulations of Generative AI in the Creative Industry | Abstract PDF (Eng) similar documents |
N. I. Shumakova, J. J. Lloyd, E. V. Titova | ||
"... of universal legal rules, regulations, instruments and standards, the current lack of which poses a threat ..." | ||
Vol 1, No 1 (2023) | Legal Regulation of Relations in the Sphere of Crowdfunding in the Republic of Belarus | Abstract PDF (Eng) similar documents |
A. V. Vasilevskii | ||
"... of measures was proposed, which may prevent risks and threats associated with procurement and extension ..." | ||
Vol 2, No 4 (2024) | Sociological and Criminological Research of Victimization Issues: Preliminary Stage and New Sphere of Cybercrime Categorization | Abstract PDF (Eng) similar documents |
A. M. Auwal, S. Lazarus | ||
"... противодействия ей в нигерийском социуме. Особое внимание уделено вопросам гендерного неравенства, социально ..." | ||
Vol 2, No 2 (2024) | Legal Issues of Cross-Border Data Transfer in the Era of Digital Government | Abstract PDF (Eng) similar documents |
G. Bolatbekkyzy | ||
"... of digital technology proliferation and government digitalization, including legal guarantees, security ..." | ||
Vol 2, No 2 (2024) | Legal Regulation of International Trade in Cryptographic Products and Technologies: WTO Tools and Regional Agreements | Abstract PDF (Eng) similar documents |
S. Q. Hashimy, J. S. Magoge | ||
"... or bans on the import and export of cryptographic technologies and encrypted data on security grounds ..." | ||
0 - 0 of 28 Items | > >> |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default articles containing any term in the query are returned (i.e., OR is implied)
- Make sure that a word exists in an article by prefixing it with +; e.g., +journal +access scholarly academic
- Combine multiple words with AND to find articles containing all terms; e.g., education AND research
- Exclude a word by prefixing it with - or NOT; e.g., online -politics or online NOT politics
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing". Hint: Quoting Chinese or Japanese words will help you to find exact word matches in mixed-language fields, e.g. "中国".
- Use parentheses to create more complex queries; e.g., archive ((journal AND conference) NOT theses)