Exploring Cyberlaw and Framework Research Trends: A Data Analysis

Mengeksplorasi Tren Penelitian Hukum Siber dan Kerangka Kerja: Sebuah Analisis Data

  • Anggita Diva Amelya Universitas Muhammadiyah Sidoarjo
  • Rifqi Ridlo Phahlevy Universitas Muhammadiyah Sidoarjo
  • Irta Fiddina Universitas Muhammadiyah Sidoarjo
Keywords: Artificial Intelligence, Ethical Implications, Machine Learning, Privacy Concerns, Data Security

Abstract

This data article presents an analysis of research trends in the field of cyberlaw and framework, conducted by filtering data through the Lens.org database with the keyword 'cyberlaw and framework,' subject filter 'law,' and document type 'journal article.' The data is beneficial for understanding the landscape of journal articles addressing cyberlaw and framework, making it a valuable resource for students and researchers seeking information on this topic. The primary objectives are to determine the volume of journal articles on cyberlaw and framework, identify prolific institutions, active countries, and prominent publishers within the field. The data reveals annual publication trends, highlights active institutions by discipline, showcases prolific authors, and presents valuable insights into the most prominent publishers. This comprehensive analysis provides a snapshot of the current state of research in cyberlaw and framework, serving as a valuable resource for scholars and professionals alike.

Highlight:

  • Artificial Intelligence (AI) is rapidly advancing, impacting various aspects of our lives.
  • Ethical implications arise as AI and machine learning make decisions affecting individuals and society.
  • Ensuring data security and addressing privacy concerns are critical in AI development.

Keywords: Artificial Intelligence, Ethical Implications, Machine Learning, Privacy Concerns, Data Security

Downloads

Download data is not yet available.

References

J. R. C. Nurse, “A framework for effective corporate communication after cybersecurity incidents,” J. Artic., vol. 99, p. 102036, Dec. 2020

D. V. der Merwe, “A comparative overview of the (sometimes uneasy) relationship between digital information and certain legal fields in South Africa and Uganda,” Acad. Sci. South Afr., vol. 171, no. 1, p. 326, Apr. 2017.

L. Urquhart and D. McAuley, “Avoiding the internet of insecure industrial things,” J. Artic, vol. 34, no. 3, pp. 450–466, 2018.

G. Stratton, A. Powell, and R. Cameron, “Crime and Justice in Digital Society: Towards a ‘Digital Criminology’?,” J. Artic, vol. 6, no. 2, pp. 17–33, May 2017

W. B. Chik, “‘Customary internet-ional law’: Creating a body of customary law for cyberspace. Part 1: Developing rules for transitioning custom into law,” Elservise Bv, vol. 26, no. 1, pp. 3–22, Jan. 2010.

D. P. Anugerah and M. Indiani, “Data Protection in Financial Technology Services (A Study in Indonesian Legal Perspective),” Univ. Sriwij., vol. 2, no. 1, pp. 82–92, Jan. 2018.

R. Wong, D. Garrie, and D. W. Loewenherz, “Revisiting network neutrality,” J. Artic., no. 3/4, p. 319, 2008.

E. Mik, “Smart contracts: Terminology, technical limitations and real-world complexity,” J. Artic., vol. 9, no. 2, pp. 269–300, Mar. 2017.

U. J. Orji, “The African Union convention on cybersecurity: A regional response towards cyber stability?,” Masaryk Univ. Press, vol. 12, no. 2, pp. 91–130, Sep. 2018.

R. McCusker, “Transnational organised cyber crime: distinguishing threat from reality,” J. Artic., vol. 46, no. 4, pp. 257–273, Mar. 2006.

Published
2023-10-16
How to Cite
Amelya, A. D., Phahlevy, R. R., & Fiddina, I. (2023). Exploring Cyberlaw and Framework Research Trends: A Data Analysis. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i1.1512