- Institutional Contributions,
- Internet Security,
- Cyber Law,
- Focus Groups
Copyright (c) 2023 Ageng Wicaksono, Mochammad Tanzil Multazam
This work is licensed under a Creative Commons Attribution 4.0 International License.
This data article delves into the intersection of cyberlaw and focus groups, sourcing data from Scholarly Works on lens.org via keywords "cyberlaw or cyber law and focus group," filtered for law-related journal articles. The study uncovers institutional contributions, active years in article production, key study areas, and prolific authors. It highlights the proactive role of institutions like the University of South Africa and Singapore Management University, emphasizing cyberlaw's significance in addressing digital challenges. The focus on legal aspects related to cybercrime and internet security emerges as critical. These insights are invaluable, guiding future research in comprehending the legal dynamics of the digital world and its implications.
- Institutional Contributions: Highlights proactive roles of specific institutions in cyberlaw research.
- Critical Study Areas: Emphasizes legal aspects of cybercrime and internet security.
- Guiding Future Research: Provides essential insights for understanding digital legal dynamics and implications.
Keywords: Institutional Contributions, Cybercrime, Internet Security, Cyber Law, Focus Groups
- D. V. der Merwe, “A comparative overview of the (sometimes uneasy) relationship between digital information and certain legal fields in South Africa and Uganda,” Potchefstroom Electron. Law J., vol. 17, no. 1, pp. 296–326, Apr. 2017, doi: 10.17159/1727-3781/2014/v17i1a2250.
- M. W. S. Wong, “Cyber-trespass and ‘Unauthorized Access’ as Legal Mechanisms of Access Control: Lessons from the US Experience,” Int. J. Law Inf. Technol., vol. 15, no. 1, pp. 90–128, Mar. 2006, doi: 10.1093/ijlit/eal014.
- P. Swire, “Elephants and Mice Revisited: Law and Choice of Law on the Internet,” Univ. Pa. Law Rev., vol. 153, no. 6, pp. 1975-, Jun. 2005, doi: 10.2307/4150654.
- M. Burri, “Regulating Code: Good Governance and Better Regulation in the Information Age, by Ian Brown and Christopher T. Marsden,” Int. J. Law Inf. Technol., vol. 22, no. 2, pp. 208–214, Jan. 2014, doi: 10.1093/ijlit/eat019.
- N. K. Katyal, “Digital Architecture as Crime Control,” Yale Law J., vol. 112, no. 8, pp. 2261–2289, 2003, doi: 10.2307/3657476.
- F. Cassim, “Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,” Potchefstroom Electron. Law J., vol. 12, no. 4, pp. 35–79, Jun. 2017, doi: 10.17159/1727-3781/2009/v12i4a2740.
- B. van den Berg and E. Keymolen, “International Review of Law, Computers & Technology - Regulating security on the Internet : control versus trust,” Int. Rev. Law Comput. Technol., vol. 31, no. 2, pp. 188–205, Mar. 2017, doi: 10.1080/13600869.2017.1298504.
- F. Cassim, “Addressing the spectre of cyber terrorism: a comparative perspective,” Potchefstroom Electron. Law J., vol. 15, no. 2, pp. 380–415, May 2017, doi: 10.17159/1727-3781/2012/v15i2a2494.
- M. Roscini, “Cyber Operations as Nuclear Counterproliferation Measures,” J. Confl. Secur. Law, vol. 19, no. 1, pp. 133–157, Jan. 2014, doi: 10.1093/jcsl/krt028.
- M. N. Njotini, “Protecting Critical Databases – Towards a Risk Based Assessment of Critical Information Infrastructures (CIIS) in South Africa,” Potchefstroom Electron. Law J., vol. 16, no. 1, pp. 450–481, Apr. 2017, doi: 10.17159/1727-3781/2013/v16i1a2318.