Search Results
Cybersecurity, Privacy, & Networks eJournal

9,518 Total downloads | Link to this page | Subscribe to this eJournal (requires login)
Search Within

Viewing: 1 - 50 of 218 papers

1.

Informed Trading and Cybersecurity Breaches

Harvard Business Law Review, Vol. 8, 2018, Columbia Law and Economics Working Paper No. 580
Number of pages: 49 Posted: 17 Feb 2018 Last Revised: 12 Jun 2018
Accepted Paper Series
Columbia Law School and Columbia University - School of Law
Downloads 761
2.

A Framework for Strategic Intra- and Inter-Organizational Adoption of the Blockchain Technology

Number of pages: 6 Posted: 22 Jul 2017
Working Paper Series
Leiden University - Leiden Institute of Advanced Computer Science (LIACS)
Downloads 359
3.

Computer Crime Law, 2018 Summer Supplement

Number of pages: 46 Posted: 14 Aug 2018
Working Paper Series
University of Southern California Gould School of Law
Downloads 334
4.

The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know

Houser, Kimberly and Sanders, Debra, The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know (February, 2018). Journal of Taxation, Vol. 128, No. 2, 2018. Thomas Reuters/Tax & Accounting.
Number of pages: 16 Posted: 01 Mar 2018 Last Revised: 17 Oct 2018
Accepted Paper Series
Oklahoma State University and Washington State University
Downloads 326
5.

Analysis of Contracts in Various Formats of Blockchain

Number of pages: 7 Posted: 09 Feb 2017
Working Paper Series
DoPT,Government of India
Downloads 300
6.

The Insurance Business in Transition to the Cyber-Physical Market: Communication, Coordination and Harmonization of Cyber Risk Coverages

Number of pages: 34 Posted: 28 Jun 2018
Working Paper Series
School of Risk Management, St. John's University
Downloads 293
7.

Timber Tracking: Reducing Complexity of Due Diligence by Using Blockchain Technology

Number of pages: 6 Posted: 08 Aug 2017
Working Paper Series
University of Copenhagen - Faculty of Science and University of Copenhagen
Downloads 292
8.

Not-So-Smart Blockchain Contracts and Artificial Responsibility

Stanford Technology Law Review, vol. 21, p.198, 2018, NYU School of Law, Public Law Research Paper No. 18-44
Number of pages: 38 Posted: 14 Jun 2018 Last Revised: 09 Oct 2018
Accepted Paper Series
Brooklyn Law School
Downloads 270
9.

The Use of Big Data Analytics by the IRS: Efficient Solution or the End of Privacy as We Know it?

Vanderbilt Journal of Entertainment & Technology Law, Vol. 19, No. 4, 2017
Number of pages: 67 Posted: 06 Apr 2017 Last Revised: 24 Jun 2018
Accepted Paper Series
Oklahoma State University and Washington State University
Downloads 227
10.

Understanding the Human Dimension of Cyber Security

Indian Journal of Criminology & Criminalistics (ISSN 0970 – 4345), Vol .34 No. 1 Jan- June,2015, p.141-152
Number of pages: 12 Posted: 31 May 2017
Accepted Paper Series
Member, Indian Police Service
Downloads 207
11.

Block Chain Based Security Mechanism for Internet of Vehicles (IoV)

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 6 Posted: 03 May 2018
Working Paper Series
Indira Gandhi Delhi Technical University for Women and Indira Gandhi Institute of Technology
Downloads 200
12.

Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks

Thomas, J. E. (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management, 12(3). 1-23. doi:10.5539/ijbm.v13n6p1
Number of pages: 24 Posted: 24 May 2018
Accepted Paper Series
Bush School of Government and Public Service
Downloads 182
13.

Semada’s Proof of Stake Protocol

U of St. Thomas (Minnesota) Legal Studies Research Paper No. 18-10
Number of pages: 39 Posted: 27 Feb 2018
Working Paper Series
Department of Mathematics, Metropolitan State University and University of St. Thomas, Minnesota - School of Law
Downloads 165
14.

The European Union General Data Protection Regulation: What It Is And What It Means

Number of pages: 40 Posted: 16 Oct 2018
Working Paper Series
University of California, Berkeley - School of Information, Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT) and University of Amsterdam - IViR Institute for Information Law (IViR)
Downloads 154
15.
Downloads 150
16.

Data Controllers, Data Processors, and the Growing Use of Connected Products in the Enterprise: Managing Risks, Understanding Benefits, and Complying with the GDPR

Journal of Internet Law (Wolters Kluwer), August 2018
Number of pages: 21 Posted: 22 Jun 2018 Last Revised: 05 Oct 2018
Accepted Paper Series
Hintze Law PLLC
Downloads 146
17.

Information and Communication Technologies, Protests, and Censorship

Number of pages: 49 Posted: 02 Jun 2017 Last Revised: 08 Jun 2017
Working Paper Series
University of California, Los Angeles (UCLA) - Department of Political Science, University of Mannheim and Institute for Political Economy and Governance, Barcelona
Downloads 144
18.

Social Media Giveth, Social Media Taketh Away: Facebook, Friendships, and APIs

International Journal of Communication, Forthcoming
Number of pages: 20 Posted: 11 Dec 2017
Accepted Paper Series
University of Oxford - Oxford Internet Institute
Downloads 137
19.

Volatility and Welfare in a Crypto Economy

Number of pages: 37 Posted: 29 Aug 2018 Last Revised: 07 Oct 2018
Working Paper Series
McGill University - Desautels Faculty of Management
Downloads 137
20.

Constructing Cointegrated Cryptocurrency Portfolios for Statistical Arbitrage

Number of pages: 20 Posted: 31 Aug 2018
Working Paper Series
University of Washington - Department of Applied Math and Computational Finance and Risk Management
Downloads 126
21.

Publishing Privacy Logs to Facilitate Transparency and Accountability

Journal of Web Semantics First Look
Number of pages: 28 Posted: 26 Jun 2018
Working Paper Series
McMaster University - Department of Computing and Software and University of Toronto - Department of Mechanical and Industrial Engineering
Downloads 124
22.

Why Quantum Computing Will Not Destabilize International Security: The Political Logic of Cryptology

Number of pages: 53 Posted: 10 Jul 2018
Working Paper Series
Munk School of Global Affairs & Public Policy and Department of Political Science, University of Toronto
Downloads 122
23.

Bitcoin Average Dormancy: A Measure of Turnover and Trading Activity

Number of pages: 12 Posted: 26 Jun 2017 Last Revised: 08 Feb 2018
Working Paper Series
Supreme Vinegar LLC
Downloads 119
24.

Deterring Cybercrime: Focus on Intermediaries

32(3) Berkeley Technology Law Journal 1093 (2017), UC Berkeley Public Law Research Paper
Number of pages: 41 Posted: 17 May 2018
Accepted Paper Series
University of California, Berkeley - Jurisprudence and Social Policy Program, University of California, Berkeley - School of Information and New York University (NYU) - NYU Tandon School of Engineering
Downloads 103
25.

Privacy Harms

Hastings Law Journal, Vol. 69, 2018
Number of pages: 60 Posted: 19 Apr 2018 Last Revised: 11 Jun 2018
Accepted Paper Series
McGill University Faculty of Law and University of Toronto - Faculty of Law
Downloads 101
26.

Privacy and Our Digital Selves

The Straits Times, September 2, 2017
Number of pages: 7 Posted: 11 Sep 2017
Accepted Paper Series
National University of Singapore (NUS) - Faculty of Law
Downloads 100
27.

The Cyber Security Ecosystem: Defining a Taxonomy of Existing, Emerging and Future Cyber Threats

SWIFT Institute Working Paper No. 2016-002
Number of pages: 39 Posted: 05 Oct 2017
Accepted Paper Series
Independent and Coventry University - Business School
Downloads 93
28.

An Exploration of Strict Products Liability and the Internet of Things

Number of pages: 21 Posted: 22 Jun 2018
Working Paper Series
Center for Democracy and Technology
Downloads 91
29.

A Survey on Digital Image Steganography: Current Trends and Challenges

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 17 Posted: 08 May 2018 Last Revised: 19 May 2018
Working Paper Series
National Institute of Technology, Nagaland - Department of Computer Science and Engineering and National Institute of Technology, Nagaland - Department of Computer Science and Engineering
Downloads 86
30.

Twenty Years of Web Scraping and the Computer Fraud and Abuse Act

Boston University journal of Science and Technology Law, Forthcoming
Number of pages: 44 Posted: 14 Aug 2018 Last Revised: 18 Oct 2018
Accepted Paper Series
Boston University School of Law
Downloads 86
31.

Review: 2017 Strategic Trends in the Global Cyber Conflict

Number of pages: 15 Posted: 08 Jul 2018
Working Paper Series
Tel Aviv University, Tel Aviv University, Independent, Tel Aviv University, Independent and Tel Aviv University
Downloads 85
32.

Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World (Introduction)

Simon Chesterman (ed), Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World (2nd edition; Singapore: Academy Publishing, 2018), 1-9
Number of pages: 13 Posted: 19 Jul 2018 Last Revised: 26 Jul 2018
Accepted Paper Series
National University of Singapore (NUS) - Faculty of Law

Multiple version iconThere are 2 versions of this paper

Downloads 81
33.

Wannacry, Ransomware, and the Emerging Threat to Corporations

Number of pages: 50 Posted: 04 Sep 2018
Working Paper Series
Western Carolina University - College of Business and Western Carolina University
Downloads 81
34.

Regulating New Weapons Technology

New Technologies and the Law of Armed Conflict (Eric Talbot Jensen, ed.) (2018 Forthcoming)
Number of pages: 30 Posted: 02 Jul 2018
Accepted Paper Series
Yale University - Yale Information Society Project
Downloads 79
35.

Crypto-Friendliness: Understanding Blockchain Public Policy

Number of pages: 26 Posted: 07 Aug 2018
Working Paper Series
RMIT University
Downloads 77
36.

Cloud Service Providers Under the NIS Directive – The UK's Implementation (With GDPR Comparisons)

Number of pages: 14 Posted: 29 Jun 2018
Working Paper Series
Imperial College London
Downloads 70
37.

Are Cryptocurrencies Securities?

Number of pages: 7 Posted: 12 Jul 2018
Working Paper Series
University of New South Wales (UNSW), UNSW Business School
Downloads 66
38.

Anonymous Atomic Swaps Using Homomorphic Hashing

Number of pages: 8 Posted: 30 Aug 2018 Last Revised: 21 Sep 2018
Working Paper Series
Independent and Independent
Downloads 64
39.

A Formal Approach Towards Assessing the Effectiveness of Anti-Spam Procedures

Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) Track 6, 2006
Number of pages: 10 Posted: 24 Apr 2007
Accepted Paper Series
RWTH Aachen University
Downloads 59
40.

Data Centric Security Approach: A Way to Achieve Security & Privacy in Cloud Computing

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 3 Posted: 07 May 2018 Last Revised: 21 May 2018
Working Paper Series
Amity University, Amity University and Guru Gobind Singh Indraprastha (GGSIP) University
Downloads 57
41.

Big Data Privacy, Ethics and Enterprise Continuous Monitoring Systems

Number of pages: 22 Posted: 04 Aug 2018
Working Paper Series
University of Southern California - Marshall School of Business
Downloads 55
42.

Censorship and Collateral Damage: Analyzing the Telegram Ban in Iran

Berkman Klein Center Research Publication No. 2018-4
Number of pages: 24 Posted: 26 Sep 2018
Working Paper Series
Harvard University - Berkman Klein Center for Internet & Society and Psiphon
Downloads 55
43.

Cybersecurity and Liability in a Big Data World

Number of pages: 19 Posted: 10 Aug 2018
Working Paper Series
Bocconi University - Department of Law and Bocconi University - ASK - Centre for Research on Management and Economics of Arts and Culture Institutions
Downloads 55
44.

Towards a Conceptualisation of Cloud (Cyber) Crime

Number of pages: 11 Posted: 20 Sep 2017
Working Paper Series
University of Leeds, Centre for Criminal Justice Studies
Downloads 55
45.

Litigating Data Sovereignty

Yale Law Journal, Vol. 128, 2018
Number of pages: 72 Posted: 19 Oct 2018
Accepted Paper Series
University of Arizona - James E. Rogers College of Law
Downloads 54
46.

Malware Detection Using Online Information Sharing Platforms and Behavior Based Analysis

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 4 Posted: 09 May 2018
Working Paper Series
Jaypee Institute of Information Technology (JIIT), Jaypee Institute of Information Technology (JIIT), Jaypee Institute of Information Technology (JIIT), Jaypee Institute of Information Technology (JIIT) and JIIT
Downloads 54
47.

Hamiltonian Cybersecurity

Wake Forest Law Review, Vol. 54, Forthcoming
Number of pages: 64 Posted: 28 Aug 2018
Accepted Paper Series
United States Naval Academy, Cyber Science Department
Downloads 51
48.

Algorithms and Security Concern in Blockchain Technology: A Brief Review

Number of pages: 15 Posted: 29 Aug 2018
Working Paper Series
University of Bedfordshire, University of Bedfordshire and University of Bedfordshire
Downloads 50
49.

Cyberterrorism

in Barney Warf (ed.), SAGE Encyclopedia of the Internet (Thousand Oaks, CA.: SAGE Publications Inc., 2018), pp. 169-171.
Number of pages: 16 Posted: 23 Jun 2018
Accepted Paper Series
University of Hull
Downloads 49
50.

Law, Borders and the Territorialisation of Cyberspace

Forthcoming, Indonesian Journal of International Law, 2018
Number of pages: 26 Posted: 02 Aug 2018
Working Paper Series
University of Sheffield - Faculty of Law
Downloads 49