Search Results
Cybersecurity, Privacy, & Networks eJournal

31,507 Total downloads | Link to this page | Subscribe to this eJournal (requires login)

Viewing: 1 - 50 of 617 papers

1.

The Economics of Cryptocurrency Pump and Dump Schemes

Number of pages: 19 Posted: 03 Jan 2019
Working Paper Series
University of Tulsa - Tandy School of Computer Science, University of New Mexico - Computer Science Department, University of Tulsa - Tandy School of Computer Science, Technion-Israel Institute of Technology, Berglas School of Economics, Tel Aviv University, University of Tulsa - Tandy School of Computer Science and University of New Mexico - Computer Science Department

Multiple version iconThere are 2 versions of this paper

Downloads 1,606
2.

Informed Trading and Cybersecurity Breaches

Harvard Business Law Review, Vol. 8, 2018, Columbia Law and Economics Working Paper No. 580
Number of pages: 49 Posted: 17 Feb 2018 Last Revised: 12 Jun 2018
Accepted Paper Series
Columbia Law School and Columbia University - School of Law
Downloads 890
3.

Verifying Identity as a Social Intersection

Number of pages: 20 Posted: 20 May 2019
Working Paper Series
Microsoft Research, Stanford University - Department of Economics and Microsoft Research New York City
Downloads 860
4.

The European Union General Data Protection Regulation: What It Is And What It Means

UC Berkeley Public Law Research Paper
Number of pages: 35 Posted: 16 Oct 2018 Last Revised: 15 Feb 2019
Working Paper Series
University of California, Berkeley - School of Information, Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT) and University of Amsterdam - IViR Institute for Information Law (IViR)
Downloads 725
5.

Implication of International Law in Electronic Commerce and Cyber Crime: An Experience of Nepal

Number of pages: 15 Posted: 18 Nov 2018
Working Paper Series
Sai Nath University
Downloads 709
6.

The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know

Houser, Kimberly and Sanders, Debra, The Use of Big Data Analytics by the IRS: What Tax Practitioners Need to Know (February, 2018). Journal of Taxation, Vol. 128, No. 2, 2018. Thomas Reuters/Tax & Accounting.
Number of pages: 16 Posted: 01 Mar 2018 Last Revised: 17 Oct 2018
Accepted Paper Series
Oklahoma State University and Washington State University
Downloads 578
7.

Return on Data

Yale Law & Policy Review, Forthcoming
Number of pages: 48 Posted: 08 Apr 2019 Last Revised: 22 Apr 2019
Accepted Paper Series
Independent Researcher
Downloads 492
8.

Computer Crime Law, 2018 Summer Supplement

Number of pages: 46 Posted: 14 Aug 2018
Working Paper Series
University of Southern California Gould School of Law
Downloads 481
9.

The Insurance Business in Transition to the Physical-Cyber Market: Communication, Coordination and Harmonization of Cyber Risk Coverages

Number of pages: 34 Posted: 28 Jun 2018 Last Revised: 21 Oct 2018
Working Paper Series
School of Risk Management, St. John's University
Downloads 441
10.

Data Protection and Competition Law: The Dawn of ‘Uberprotection’

Research Handbook on Privacy and Data Protection Law: Values, Norms and Global Politics, Gloria González Fuster, Rosamunde van Brakel and Paul De Hert (eds.), Edward Elgar Publ'g 2019 (Forthcoming) ,
Number of pages: 24 Posted: 03 Dec 2018 Last Revised: 18 Jan 2019
Working Paper Series
Future of Privacy Forum and Linklaters
Downloads 434
11.

Constructing Cointegrated Cryptocurrency Portfolios for Statistical Arbitrage

Studies in Economics and Finance, 2019
Number of pages: 20 Posted: 31 Aug 2018 Last Revised: 17 Feb 2019
Accepted Paper Series
University of Washington - Department of Applied Math and Computational Finance and Risk Management
Downloads 433
12.

Individual Cyber Security: Empowering Employees to Resist Spear Phishing to Prevent Identity Theft and Ransomware Attacks

Thomas, J. E. (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management, 12(3). 1-23. doi:10.5539/ijbm.v13n6p1
Number of pages: 24 Posted: 24 May 2018
Accepted Paper Series
Bush School of Government and Public Service
Downloads 428
13.

A Framework for Strategic Intra- and Inter-Organizational Adoption of the Blockchain Technology

Number of pages: 6 Posted: 22 Jul 2017
Working Paper Series
Leiden University - Leiden Institute of Advanced Computer Science (LIACS)
Downloads 427
14.

Timber Tracking: Reducing Complexity of Due Diligence by Using Blockchain Technology

Number of pages: 6 Posted: 08 Aug 2017
Working Paper Series
University of Copenhagen - Faculty of Science and University of Copenhagen
Downloads 398
15.

Block Chain Based Security Mechanism for Internet of Vehicles (IoV)

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 6 Posted: 03 May 2018
Working Paper Series
Indira Gandhi Delhi Technical University for Women and Indira Gandhi Delhi Technical University for Women (IGDTUW)
Downloads 365
16.

A Primer for Blockchain

University of Missouri-Kansas City Law Review, Forthcoming
Number of pages: 48 Posted: 04 Feb 2019 Last Revised: 14 Jun 2019
Working Paper Series
Western Carolina University - College of Business and George Washington University
Downloads 328
17.

Analysis of Contracts in Various Formats of Blockchain

Number of pages: 7 Posted: 09 Feb 2017
Working Paper Series
DoPT,Government of India
Downloads 328
18.

Acquisitions in the Third Party Tracking Industry: Competition and Data Protection Aspects

Number of pages: 29 Posted: 13 Nov 2018
Working Paper Series
University of Oxford and Harvard University, Law School
Downloads 323
19.

Volatility and Welfare in a Crypto Economy

Number of pages: 32 Posted: 29 Aug 2018 Last Revised: 07 Jun 2019
Working Paper Series
McGill University - Desautels Faculty of Management
Downloads 317
20.

Throw Away the Key, or the Key Holder? Coercive Contempt for Lost or Forgotten Cryptoasset Private Keys, or Obstinate Holders

Northwestern Journal of Technology and Intellectual Property (2019 Forthcoming)
Number of pages: 37 Posted: 14 Feb 2019
Accepted Paper Series
New York University School of Law
Downloads 311
21.

Wannacry, Ransomware, and the Emerging Threat to Corporations

Tennessee Law Review, Forthcoming
Number of pages: 58 Posted: 04 Sep 2018 Last Revised: 14 Dec 2018
Working Paper Series
Western Carolina University - College of Business and Western Carolina University
Downloads 290
22.
Downloads 278
23.

The Use of Big Data Analytics by the IRS: Efficient Solution or the End of Privacy as We Know it?

Vanderbilt Journal of Entertainment & Technology Law, Vol. 19, No. 4, 2017
Number of pages: 67 Posted: 06 Apr 2017 Last Revised: 24 Jun 2018
Accepted Paper Series
Oklahoma State University and Washington State University
Downloads 278
24.

Understanding the Human Dimension of Cyber Security

Indian Journal of Criminology & Criminalistics (ISSN 0970 – 4345), Vol .34 No. 1 Jan- June,2015, p.141-152,
Number of pages: 12 Posted: 31 May 2017
Accepted Paper Series
Government of India - Lok Nayak Jayaprakash Narayan National Institute of Criminology & Forensic Science
Downloads 259
25.

Data Controllers, Data Processors, and the Growing Use of Connected Products in the Enterprise: Managing Risks, Understanding Benefits, and Complying with the GDPR

Journal of Internet Law (Wolters Kluwer), August 2018
Number of pages: 21 Posted: 22 Jun 2018 Last Revised: 05 Oct 2018
Accepted Paper Series
Hintze Law PLLC
Downloads 234
26.

Crypto-Friendliness: Understanding Blockchain Public Policy

Number of pages: 26 Posted: 07 Aug 2018
Working Paper Series
RMIT University
Downloads 233
27.

Twenty Years of Web Scraping and the Computer Fraud and Abuse Act

24 B.U. J. Sci. & Tech. L. 372 (2018)
Number of pages: 44 Posted: 14 Aug 2018 Last Revised: 28 Nov 2018
Accepted Paper Series
Boston University School of Law
Downloads 219
28.

Whose Robot Is It Anyway?: Liability for Artificial-Intelligence-Based Robots

University of Illinois Law Review, Vol. 2020, Forthcoming
Number of pages: 40 Posted: 13 Mar 2019
Accepted Paper Series
Tel Aviv University - Buchmann Faculty of Law
Downloads 218
29.

Semada’s Proof of Stake Protocol

U of St. Thomas (Minnesota) Legal Studies Research Paper No. 18-10
Number of pages: 39 Posted: 27 Feb 2018
Working Paper Series
Department of Mathematics, Metropolitan State University and University of St. Thomas, Minnesota - School of Law
Downloads 214
30.

Why Quantum Computing Will Not Destabilize International Security: The Political Logic of Cryptology

Number of pages: 53 Posted: 10 Jul 2018
Working Paper Series
Munk School of Global Affairs & Public Policy and Department of Political Science, University of Toronto
Downloads 205
31.

Lowering Legal Barriers to RPKI Adoption

U of Penn Law School, Public Law Research Paper No. 19-02
Number of pages: 35 Posted: 02 Jan 2019 Last Revised: 09 Jan 2019
Working Paper Series
University of Pennsylvania Law School and University of Pennsylvania - Center for Technology, Innovation & Competition
Downloads 203
32.

Cyber Security Issues and Challenges in E-Commerce

Proceedings of 10th International Conference on Digital Strategies for Organizational Success
Number of pages: 8 Posted: 28 Jan 2019
Working Paper Series
Institute for Technology and Management (ITM)
Downloads 202
33.

A Survey on Digital Image Steganography: Current Trends and Challenges

Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018
Number of pages: 17 Posted: 08 May 2018 Last Revised: 19 May 2018
Working Paper Series
National Institute of Technology, Nagaland - Department of Computer Science and Engineering and National Institute of Technology, Nagaland - Department of Computer Science and Engineering
Downloads 201
34.

What Voters are Asked to Verify Affects Ballot Verification: A Quantitative Analysis of Voters' Memories of Their Ballots

Number of pages: 23 Posted: 06 Dec 2018 Last Revised: 13 Apr 2019
Working Paper Series
Georgia Institute of Technology, Georgia Institute of Technology and Coalition for Good Governance
Downloads 193
35.

Information and Communication Technologies, Protests, and Censorship

Number of pages: 49 Posted: 02 Jun 2017 Last Revised: 08 Jun 2017
Working Paper Series
University of Melbourne - Melbourne Institute of Applied Economic and Social Research, University of Mannheim and Institute for Political Economy and Governance, Barcelona
Downloads 192
36.

Compliance as a Service

Queen Mary School of Law Legal Studies Research Paper No. 287/2018
Number of pages: 34 Posted: 14 Nov 2018
Accepted Paper Series
Queen Mary University of London, School of Law - Centre for Commercial Law Studies, Queen Mary University of London, School of Law - Centre for Commercial Law Studies and Queen Mary University of London - Centre for Commercial Law Studies
Downloads 187
37.

Publishing Privacy Logs to Facilitate Transparency and Accountability

Journal of Web Semantics First Look
Number of pages: 28 Posted: 26 Jun 2018
Working Paper Series
McMaster University - Department of Computing and Software and University of Toronto - Department of Mechanical and Industrial Engineering
Downloads 182
38.

Cryptocurrency Value and 51% Attacks: Evidence from Event Studies

Number of pages: 19 Posted: 02 Dec 2018
Working Paper Series
Northumbria University, University of London, Government of the Russian Federation - Financial University (Moscow Branch) and Financial University under the Government of the Russian Federation
Downloads 174
39.

The Contemporary Cybercrime Ecosystem: A Multi-Disciplinary Overview of the State of Affairs and Developments

Broadhead, S. The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments, Computer Law & Security Review: The International Journal of Technology Law and Practice (2018), DOI/10.1016/j.clsr.2018.08.005
Number of pages: 22 Posted: 17 Nov 2018
Working Paper Series
University of Graz
Downloads 167
40.

Social Media Giveth, Social Media Taketh Away: Facebook, Friendships, and APIs

International Journal of Communication, Forthcoming
Number of pages: 20 Posted: 11 Dec 2017
Accepted Paper Series
University of Oxford - Oxford Internet Institute
Downloads 166
41.

Privatized Cybersecurity Law

UC Irvine Law Review (2020 Forthcoming)
Number of pages: 51 Posted: 11 Mar 2019 Last Revised: 27 Mar 2019
Accepted Paper Series
University of Tulsa College of Law
Downloads 165
42.

Review: 2017 Strategic Trends in the Global Cyber Conflict

Number of pages: 15 Posted: 08 Jul 2018
Working Paper Series
Tel Aviv University, Tel Aviv University, Independent, Tel Aviv University, Independent and Tel Aviv University
Downloads 164
43.

Censorship and Collateral Damage: Analyzing the Telegram Ban in Iran

Berkman Klein Center Research Publication No. 2018-4
Number of pages: 24 Posted: 26 Sep 2018
Working Paper Series
Harvard University - Berkman Klein Center for Internet & Society and Psiphon
Downloads 162
44.

Cloud Service Providers Under the NIS Directive – The UK's Implementation (With GDPR Comparisons)

Number of pages: 14 Posted: 29 Jun 2018 Last Revised: 09 May 2019
Working Paper Series
Imperial College London
Downloads 161
45.

Algorithms and Security Concern in Blockchain Technology: A Brief Review

Number of pages: 15 Posted: 29 Aug 2018
Working Paper Series
University of Bedfordshire, University of Bedfordshire and University of Bedfordshire
Downloads 157
46.

Governance of the Facebook Privacy Crisis

Number of pages: 107 Posted: 04 Jun 2019 Last Revised: 10 Jun 2019
Working Paper Series
Western Carolina University - College of Business
Downloads 153
47.

Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World (Introduction)

Simon Chesterman (ed), Data Protection Law in Singapore: Privacy and Sovereignty in an Interconnected World (2nd edition; Singapore: Academy Publishing, 2018), 1-9
Number of pages: 13 Posted: 19 Jul 2018 Last Revised: 26 Jul 2018
Accepted Paper Series
National University of Singapore (NUS) - Faculty of Law

Multiple version iconThere are 2 versions of this paper

Downloads 149
48.

Bitcoin and the GDPR: Allocating Responsibility in Distributed Networks

35(2) Computer Law & Security Review 2019, 182-198
Number of pages: 36 Posted: 02 Jan 2019 Last Revised: 02 Apr 2019
Accepted Paper Series
University of Natural Resources and Life Sciences, Institute of Law, University of Graz - Department of Tax and Fiscal Law, Independent and University of Natural Resources and Life Sciences, Vienna – Institute of Law
Downloads 146
49.

The Market for Data Privacy

Number of pages: 59 Posted: 23 Mar 2019
Working Paper Series
Imperial College London, Imperial College Business School and Imperial College London

Multiple version iconThere are 2 versions of this paper

Downloads 146
50.

Deterring Cybercrime: Focus on Intermediaries

32(3) Berkeley Technology Law Journal 1093 (2017), UC Berkeley Public Law Research Paper
Number of pages: 41 Posted: 17 May 2018
Accepted Paper Series
University of California, Berkeley - Jurisprudence and Social Policy Program, University of California, Berkeley - School of Information and New York University (NYU) - NYU Tandon School of Engineering
Downloads 143