Addressing Cybersecurity and Data Breach Regulations: A Global Perspective
Keywords:
Comparative Analysis, Contract Law, Common Law Jurisdictions, Civil LawAbstract
The complex relationship between technology and data in today's increasingly digital environment has altered the trajectory of contemporary society. However, this transition to digital has spawned serious problems, the most pressing of which is cybersecurity and the persistent risk of data breaches. the worldwide framework of laws and policies concerning cybercrime and data breaches. provides insight into the myriad methods used by different nations and regions to protect confidential data, lessen vulnerability, and promote a safe online atmosphere. the ever-changing character of cyber threats and data breaches, with all the havoc they can wreak on individuals, businesses, and economies. the intricacies of the international regulatory environment, which lay bare a sophisticated web of rules and regulations designed to cope with these issues on a worldwide scale.
References
Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613.
Clarke, R. (2019). Privacy and data protection by design - from policy to engineering. Computer Law & Security Review, 35, 18-35.
Council of the European Union. (2016). General Data Protection Regulation (GDPR). Regulation (EU) 2016/679.
Gartner. (2020). Magic Quadrant for Security Information and Event Management. Retrieved from https://www.gartner.com/en/documents/3987668
Kshetri, N. (2017). The role of global and domestic institutional actors in the development of advanced encryption standard (AES) standards. Regulation & Governance, 11(1), 30-49.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards and Technology, 53(6), 50.
NIST. (2014). Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology.
Rosenzweig, P., & Nessen, D. H. (2013). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. WW Norton & Company.
Stoddart, E. (2017). Evasive Hacking: How States Manipulate the Internet to Attack Their Targets. Oxford University Press.
United Nations General Assembly. (2015). The UN Guidelines for the Regulation of Computerized Personal Data Files. Resolution 45/95.
United Nations Office on Drugs and Crime (UNODC). (2015). The Use of Artificial Intelligence in the Fight Against Cybercrime. Vienna.
World Economic Forum. (2019). The Global Risks Report 2019. Retrieved from https://www.weforum.org/reports/the-global-risks-report-2019
World Intellectual Property Organization (WIPO). (2018). Artificial Intelligence: Intellectual Property Policy Considerations. Geneva.
Zhang, J., Walder, R., & Lyu, M. R. (2017). Security threat analysis and modeling. Proceedings of the IEEE, 105(4), 620-637.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.