Vol 12 No 1 (2023): Proceedings of Data in Education, Culture, and Interdisciplinary Studies
Data Articles in Law Science

The Digital Legal Landscape: Unveiling Institutional Contributions, Research Focus, and Influential Authors
Dunia Hukum Digital: Mengungkap Kontribusi Institusi, Fokus Penelitian, dan Penulis Berpengaruh

Ageng Wicaksono
Universitas Muhammadiyah Sidoarjo, Indonesia
Mochammad Tanzil Multazam
universitas muhammadiyah sidoarjo, Indonesia
Rizqi Hasan
Universitas Muhammadiyah Sidoarjo, Indonesia
Picture in here are illustration from public domain image or provided by the author, as part of their works
Published October 12, 2023
  • Institutional Contributions,
  • Cybercrime,
  • Internet Security,
  • Cyber Law,
  • Focus Groups
How to Cite
Wicaksono, A., Multazam, M. T., & Hasan, R. (2023). The Digital Legal Landscape: Unveiling Institutional Contributions, Research Focus, and Influential Authors. Proceedings of The ICECRS, 12(1). https://doi.org/10.21070/icecrs.v12i2.1640


This data article delves into the intersection of cyberlaw and focus groups, sourcing data from Scholarly Works on lens.org via keywords "cyberlaw or cyber law and focus group," filtered for law-related journal articles. The study uncovers institutional contributions, active years in article production, key study areas, and prolific authors. It highlights the proactive role of institutions like the University of South Africa and Singapore Management University, emphasizing cyberlaw's significance in addressing digital challenges. The focus on legal aspects related to cybercrime and internet security emerges as critical. These insights are invaluable, guiding future research in comprehending the legal dynamics of the digital world and its implications.


  • Institutional Contributions: Highlights proactive roles of specific institutions in cyberlaw research.
  • Critical Study Areas: Emphasizes legal aspects of cybercrime and internet security.
  • Guiding Future Research: Provides essential insights for understanding digital legal dynamics and implications.

Keywords:  Institutional Contributions, Cybercrime, Internet Security, Cyber Law, Focus Groups


Download data is not yet available.


  1. D. V. der Merwe, “A comparative overview of the (sometimes uneasy) relationship between digital information and certain legal fields in South Africa and Uganda,” Potchefstroom Electron. Law J., vol. 17, no. 1, pp. 296–326, Apr. 2017, doi: 10.17159/1727-3781/2014/v17i1a2250.
  2. M. W. S. Wong, “Cyber-trespass and ‘Unauthorized Access’ as Legal Mechanisms of Access Control: Lessons from the US Experience,” Int. J. Law Inf. Technol., vol. 15, no. 1, pp. 90–128, Mar. 2006, doi: 10.1093/ijlit/eal014.
  3. P. Swire, “Elephants and Mice Revisited: Law and Choice of Law on the Internet,” Univ. Pa. Law Rev., vol. 153, no. 6, pp. 1975-, Jun. 2005, doi: 10.2307/4150654.
  4. M. Burri, “Regulating Code: Good Governance and Better Regulation in the Information Age, by Ian Brown and Christopher T. Marsden,” Int. J. Law Inf. Technol., vol. 22, no. 2, pp. 208–214, Jan. 2014, doi: 10.1093/ijlit/eat019.
  5. N. K. Katyal, “Digital Architecture as Crime Control,” Yale Law J., vol. 112, no. 8, pp. 2261–2289, 2003, doi: 10.2307/3657476.
  6. F. Cassim, “Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,” Potchefstroom Electron. Law J., vol. 12, no. 4, pp. 35–79, Jun. 2017, doi: 10.17159/1727-3781/2009/v12i4a2740.
  7. B. van den Berg and E. Keymolen, “International Review of Law, Computers & Technology - Regulating security on the Internet : control versus trust,” Int. Rev. Law Comput. Technol., vol. 31, no. 2, pp. 188–205, Mar. 2017, doi: 10.1080/13600869.2017.1298504.
  8. F. Cassim, “Addressing the spectre of cyber terrorism: a comparative perspective,” Potchefstroom Electron. Law J., vol. 15, no. 2, pp. 380–415, May 2017, doi: 10.17159/1727-3781/2012/v15i2a2494.
  9. M. Roscini, “Cyber Operations as Nuclear Counterproliferation Measures,” J. Confl. Secur. Law, vol. 19, no. 1, pp. 133–157, Jan. 2014, doi: 10.1093/jcsl/krt028.
  10. M. N. Njotini, “Protecting Critical Databases – Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa,” Potchefstroom Electron. Law J., vol. 16, no. 1, pp. 450–481, Apr. 2017, doi: 10.17159/1727-3781/2013/v16i1a2318.