Search Results
Cybersecurity, Privacy, & Networks eJournal

16,641 Total downloads | Link to this page | Subscribe to this eJournal (requires login)

Viewing: 1 - 50 of 316 papers

1.

The Economics of Cryptocurrency Pump and Dump Schemes

Number of pages: 19 Posted: 03 Jan 2019
Working Paper Series
University of Tulsa - Tandy School of Computer Science, University of New Mexico - Computer Science Department, University of Tulsa - Tandy School of Computer Science, Technion-Israel Institute of Technology, Berglas School of Economics, Tel Aviv University, University of Tulsa - Tandy School of Computer Science and University of New Mexico - Computer Science Department

Multiple version iconThere are 2 versions of this paper

Downloads 1,261
2.

Informed Trading and Cybersecurity Breaches

Harvard Business Law Review, Vol. 8, 2018, Columbia Law and Economics Working Paper No. 580
Number of pages: 49 Posted: 17 Feb 2018 Last Revised: 12 Jun 2018
Accepted Paper Series
Columbia Law School and Columbia University - School of Law
Downloads 819
3.

The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know

Houser, Kimberly and Sanders, Debra, The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know (February, 2018). Journal of Taxation, Vol. 128, No. 2, 2018. Thomas Reuters/Tax & Accounting.
Number of pages: 16 Posted: 01 Mar 2018 Last Revised: 17 Oct 2018
Accepted Paper Series
Oklahoma State University and Washington State University
Downloads 430
4.

The European Union General Data Protection Regulation: What It Is And What It Means

UC Berkeley Public Law Research Paper
Number of pages: 40 Posted: 16 Oct 2018 Last Revised: 16 Jan 2019
Working Paper Series
University of California, Berkeley - School of Information, Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT) and University of Amsterdam - IViR Institute for Information Law (IViR)
Downloads 421
5.

The Insurance Business in Transition to the Physical-Cyber Market: Communication, Coordination and Harmonization of Cyber Risk Coverages

Number of pages: 34 Posted: 28 Jun 2018 Last Revised: 21 Oct 2018
Working Paper Series
School of Risk Management, St. John's University
Downloads 414
6.

Computer Crime Law, 2018 Summer Supplement

Number of pages: 46 Posted: 14 Aug 2018
Working Paper Series
University of Southern California Gould School of Law
Downloads 408
7.

A Framework for Strategic Intra- and Inter-Organizational Adoption of the Blockchain Technology

Number of pages: 6 Posted: 22 Jul 2017
Working Paper Series
Leiden University - Leiden Institute of Advanced Computer Science (LIACS)
Downloads 388
8.

Implication of International Law in Electronic Commerce and Cyber Crime: An Experience of Nepal

Number of pages: 15 Posted: 18 Nov 2018
Working Paper Series
Sai Nath University
Downloads 373
9.

Timber Tracking: Reducing Complexity of Due Diligence by Using Blockchain Technology

Number of pages: 6 Posted: 08 Aug 2017
Working Paper Series
University of Copenhagen - Faculty of Science and University of Copenhagen
Downloads 331
10.

Not-So-Smart Blockchain Contracts and Artificial Responsibility

Stanford Technology Law Review, vol. 21, p.198, 2018, NYU School of Law, Public Law Research Paper No. 18-44
Number of pages: 38 Posted: 14 Jun 2018 Last Revised: 09 Oct 2018
Accepted Paper Series
Brooklyn Law School
Downloads 324
11.

Analysis of Contracts in Various Formats of Blockchain

Number of pages: 7 Posted: 09 Feb 2017
Working Paper Series
DoPT,Government of India
Downloads 319
12.

Block Chain Based Security Mechanism for Internet of Vehicles (IoV)

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 6 Posted: 03 May 2018
Working Paper Series
Indira Gandhi Delhi Technical University for Women and Indira Gandhi Institute of Technology
Downloads 280
13.

Acquisitions in the Third Party Tracking Industry: Competition and Data Protection Aspects

Number of pages: 29 Posted: 13 Nov 2018
Working Paper Series
University of Oxford and Harvard University, Law School
Downloads 262
14.

Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks

Thomas, J. E. (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management, 12(3). 1-23. doi:10.5539/ijbm.v13n6p1
Number of pages: 24 Posted: 24 May 2018
Accepted Paper Series
Bush School of Government and Public Service
Downloads 261
15.

Data Protection and Competition Law: The Dawn of ‘Uberprotection’

Number of pages: 24 Posted: 03 Dec 2018
Working Paper Series
Future of Privacy Forum and Linklaters
Downloads 247
16.

The Use of Big Data Analytics by the IRS: Efficient Solution or the End of Privacy as We Know it?

Vanderbilt Journal of Entertainment & Technology Law, Vol. 19, No. 4, 2017
Number of pages: 67 Posted: 06 Apr 2017 Last Revised: 24 Jun 2018
Accepted Paper Series
Oklahoma State University and Washington State University
Downloads 247
17.

Constructing Cointegrated Cryptocurrency Portfolios for Statistical Arbitrage

Number of pages: 20 Posted: 31 Aug 2018
Working Paper Series
University of Washington - Department of Applied Math and Computational Finance and Risk Management
Downloads 228
18.

Volatility and Welfare in a Crypto Economy

Number of pages: 38 Posted: 29 Aug 2018 Last Revised: 25 Dec 2018
Working Paper Series
McGill University - Desautels Faculty of Management
Downloads 226
19.

Understanding the Human Dimension of Cyber Security

Indian Journal of Criminology & Criminalistics (ISSN 0970 – 4345), Vol .34 No. 1 Jan- June,2015, p.141-152,
Number of pages: 12 Posted: 31 May 2017
Accepted Paper Series
Member, Indian Police Service
Downloads 221
20.
Downloads 198
21.

Semada’s Proof of Stake Protocol

U of St. Thomas (Minnesota) Legal Studies Research Paper No. 18-10
Number of pages: 39 Posted: 27 Feb 2018
Working Paper Series
Department of Mathematics, Metropolitan State University and University of St. Thomas, Minnesota - School of Law
Downloads 190
22.

Data Controllers, Data Processors, and the Growing Use of Connected Products in the Enterprise: Managing Risks, Understanding Benefits, and Complying with the GDPR

Journal of Internet Law (Wolters Kluwer), August 2018
Number of pages: 21 Posted: 22 Jun 2018 Last Revised: 05 Oct 2018
Accepted Paper Series
Hintze Law PLLC
Downloads 178
23.

Lowering Legal Barriers to RPKI Adoption

U of Penn Law School, Public Law Research Paper No. 19-02
Number of pages: 35 Posted: 02 Jan 2019 Last Revised: 09 Jan 2019
Working Paper Series
University of Pennsylvania Law School and University of Pennsylvania - Center for Technology, Innovation & Competition
Downloads 166
24.

Publishing Privacy Logs to Facilitate Transparency and Accountability

Journal of Web Semantics First Look
Number of pages: 28 Posted: 26 Jun 2018
Working Paper Series
McMaster University - Department of Computing and Software and University of Toronto - Department of Mechanical and Industrial Engineering
Downloads 163
25.

Why Quantum Computing Will Not Destabilize International Security: The Political Logic of Cryptology

Number of pages: 53 Posted: 10 Jul 2018
Working Paper Series
Munk School of Global Affairs & Public Policy and Department of Political Science, University of Toronto
Downloads 157
26.

Information and Communication Technologies, Protests, and Censorship

Number of pages: 49 Posted: 02 Jun 2017 Last Revised: 08 Jun 2017
Working Paper Series
University of California, Los Angeles (UCLA) - Department of Political Science, University of Mannheim and Institute for Political Economy and Governance, Barcelona
Downloads 156
27.

Twenty Years of Web Scraping and the Computer Fraud and Abuse Act

24 B.U. J. Sci. & Tech. L. 372 (2018)
Number of pages: 44 Posted: 14 Aug 2018 Last Revised: 28 Nov 2018
Accepted Paper Series
Boston University School of Law
Downloads 156
28.

Social Media Giveth, Social Media Taketh Away: Facebook, Friendships, and APIs

International Journal of Communication, Forthcoming
Number of pages: 20 Posted: 11 Dec 2017
Accepted Paper Series
University of Oxford - Oxford Internet Institute
Downloads 148
29.

Wannacry, Ransomware, and the Emerging Threat to Corporations

Tennessee Law Review, Forthcoming
Number of pages: 58 Posted: 04 Sep 2018 Last Revised: 14 Dec 2018
Working Paper Series
Western Carolina University - College of Business and Western Carolina University
Downloads 136
30.

The Contemporary Cybercrime Ecosystem: A Multi-Disciplinary Overview of the State of Affairs and Developments

Broadhead, S. The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments, Computer Law & Security Review: The International Journal of Technology Law and Practice (2018), DOI/10.1016/j.clsr.2018.08.005
Number of pages: 22 Posted: 17 Nov 2018
Working Paper Series
University of Graz
Downloads 128
31.

A Survey on Digital Image Steganography: Current Trends and Challenges

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 17 Posted: 08 May 2018 Last Revised: 19 May 2018
Working Paper Series
National Institute of Technology, Nagaland - Department of Computer Science and Engineering and National Institute of Technology, Nagaland - Department of Computer Science and Engineering
Downloads 127
32.

Crypto-Friendliness: Understanding Blockchain Public Policy

Number of pages: 26 Posted: 07 Aug 2018
Working Paper Series
RMIT University
Downloads 125
33.

Bitcoin Average Dormancy: A Measure of Turnover and Trading Activity

Smith, RD. (2018). Bitcoin Average Dormancy: A Measure of Turnover and Trading Activity. Ledger, 3, 91-99.
Number of pages: 9 Posted: 26 Jun 2017 Last Revised: 22 Nov 2018
Accepted Paper Series
Supreme Vinegar LLC
Downloads 123
34.

Deterring Cybercrime: Focus on Intermediaries

32(3) Berkeley Technology Law Journal 1093 (2017), UC Berkeley Public Law Research Paper
Number of pages: 41 Posted: 17 May 2018
Accepted Paper Series
University of California, Berkeley - Jurisprudence and Social Policy Program, University of California, Berkeley - School of Information and New York University (NYU) - NYU Tandon School of Engineering
Downloads 122
35.

Censorship and Collateral Damage: Analyzing the Telegram Ban in Iran

Berkman Klein Center Research Publication No. 2018-4
Number of pages: 24 Posted: 26 Sep 2018
Working Paper Series
Harvard University - Berkman Klein Center for Internet & Society and Psiphon
Downloads 120
36.

Review: 2017 Strategic Trends in the Global Cyber Conflict

Number of pages: 15 Posted: 08 Jul 2018
Working Paper Series
Tel Aviv University, Tel Aviv University, Independent, Tel Aviv University, Independent and Tel Aviv University
Downloads 120
37.

Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World (Introduction)

Simon Chesterman (ed), Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World (2nd edition; Singapore: Academy Publishing, 2018), 1-9
Number of pages: 13 Posted: 19 Jul 2018 Last Revised: 26 Jul 2018
Accepted Paper Series
National University of Singapore (NUS) - Faculty of Law

Multiple version iconThere are 2 versions of this paper

Downloads 119
38.

Litigating Data Sovereignty

Yale Law Journal, Vol. 128, 2018
Number of pages: 79 Posted: 19 Oct 2018 Last Revised: 03 Dec 2018
Accepted Paper Series
University of Arizona - James E. Rogers College of Law
Downloads 115
39.

Privacy Harms

Hastings Law Journal, Vol. 69, 2018
Number of pages: 60 Posted: 19 Apr 2018 Last Revised: 11 Jun 2018
Accepted Paper Series
McGill University Faculty of Law and University of Toronto - Faculty of Law
Downloads 113
40.

An Exploration of Strict Products Liability and the Internet of Things

Number of pages: 21 Posted: 22 Jun 2018
Working Paper Series
Center for Democracy and Technology
Downloads 107
41.

Privacy and Our Digital Selves

The Straits Times, September 2, 2017
Number of pages: 7 Posted: 11 Sep 2017
Accepted Paper Series
National University of Singapore (NUS) - Faculty of Law
Downloads 106
42.

Algorithms and Security Concern in Blockchain Technology: A Brief Review

Number of pages: 15 Posted: 29 Aug 2018
Working Paper Series
University of Bedfordshire, University of Bedfordshire and University of Bedfordshire
Downloads 105
43.

Cloud Service Providers Under the NIS Directive – The UK's Implementation (With GDPR Comparisons)

Number of pages: 14 Posted: 29 Jun 2018
Working Paper Series
Imperial College London
Downloads 103
44.

The Cyber Security Ecosystem: Defining a Taxonomy of Existing, Emerging and Future Cyber Threats

SWIFT Institute Working Paper No. 2016-002
Number of pages: 39 Posted: 05 Oct 2017
Accepted Paper Series
Independent and Coventry University - Business School
Downloads 103
45.

Regulating New Weapons Technology

New Technologies and the Law of Armed Conflict (Eric Talbot Jensen, ed.) (2018 Forthcoming)
Number of pages: 30 Posted: 02 Jul 2018
Accepted Paper Series
Yale University - Yale Information Society Project
Downloads 99
46.

Compliance as a Service

Queen Mary School of Law Legal Studies Research Paper No. 287/2018
Number of pages: 34 Posted: 14 Nov 2018
Accepted Paper Series
Queen Mary University of London, School of Law - Centre for Commercial Law Studies, Queen Mary University of London, School of Law - Centre for Commercial Law Studies and Queen Mary University of London - Centre for Commercial Law Studies
Downloads 97
47.

Deciphering Chinese Censorship: Introducing CensorScout and the Weibo Censorship Dashboard

Number of pages: 17 Posted: 05 Nov 2018
Working Paper Series
Phillips Academy Andover and Phillips Academy Andover
Downloads 94
48.

Are Cryptocurrencies Securities?

Number of pages: 7 Posted: 12 Jul 2018
Working Paper Series
University of New South Wales (UNSW), UNSW Business School
Downloads 92
49.

Big Data Privacy, Ethics and Enterprise Continuous Monitoring Systems

Number of pages: 22 Posted: 04 Aug 2018
Working Paper Series
University of Southern California - Marshall School of Business
Downloads 86
50.

Data Centric Security Approach: A Way to Achieve Security & Privacy in Cloud Computing

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 3 Posted: 07 May 2018 Last Revised: 21 May 2018
Working Paper Series
Amity University, Amity University and Guru Gobind Singh Indraprastha (GGSIP) University
Downloads 86