Cyberlaw and Identification: A Comprehensive Analysis of Journal Articles on Lens.org
Cyberlaw dan Identifikasi: Analisis Komprehensif Artikel Jurnal di Lens.org
Abstract
This data article aims to provide a comprehensive overview of the landscape of journal articles related to Cyberlaw and Identification on Lens.org. The data was collected by using the keywords "Cyberlaw OR Cyber Law AND Identification" and filtering for journal articles in the subject of law. The results reveal a significant volume of articles, with the highest production in 2017, decreasing in recent years. The London School of Economics and Political Science stands out as a prominent institution, and the United Kingdom leads in authorship. Elsevier emerges as the top publisher, with a focus on topics like privacy and international cyber law. This data article sheds light on the global trends in Cyberlaw and Identification research, providing valuable insights for scholars and the public interested in this field.
Highlights:
-
Extensive Coverage: The data analysis revealed a wealth of journal articles on Cyberlaw and Identification, with a peak in 2017, offering a broad resource for researchers and scholars.
-
Prominent Institutions: The London School of Economics and Political Science emerged as a leading contributor, underlining its significance in the field of Cyberlaw.
-
Leading Trends: The United Kingdom took the lead in authorship, while Elsevier stood out as the dominant publisher, emphasizing the global importance of privacy and international cyber law research.
Keywords: Cyberlaw, Identification, Journal Articles, Data Analysis, Global Trends
Downloads
References
D. V. der Merwe, “A comparative overview of the (sometimes uneasy) relationship between digital information and certain legal fields in South Africa and Uganda,” Potchefstroom Electron. Law J., vol. 17, no. 1, pp. 296–326, Apr. 2017, doi: 10.17159/1727-3781/2014/v17i1a2250.
D. P. Anugerah and M. Indriani, “Data Protection in Financial Technology Services (A Study in Indonesian Legal Perspective),” Sriwij. Law Rev., vol. 2, no. 1, pp. 82–92, Jan. 2018, doi: 10.28946/slrev.vol2.iss1.112.pp82-92.
D. M. Sithigh, “Because the computer speaks English? Language rights and digital media,” J. Media Law, vol. 7, no. 1, pp. 65–84, Jan. 2015, doi: 10.1080/17577632.2015.1059605.
R. Wong and J. Savirimuthu, “Identity principles in the digital age: a closer view,” Int. J. Intellect. Prop. Manag., vol. 2, no. 4, pp. 396-, 2008, doi: 10.1504/ijipm.2008.021434.
M. Roscini, “Correction to: Gravity in the Statute of the International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crimes,” Crim. Law Forum, vol. 30, no. 3, pp. 247–272, Jun. 2019, doi: 10.1007/s10609-019-09370-0.
I. Couzigou, “Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations,” Int. Rev. Law Comput. Technol., vol. 32, no. 1, pp. 37–57, Jan. 2018, doi: 10.1080/13600869.2018.1417763.
M. E. O’Connell, “Cyber Security without Cyber War,” J. Confl. Secur. Law, vol. 17, no. 2, pp. 187–209, Jul. 2012, doi: 10.1093/jcsl/krs017.
J. Brabyn, “Protection Against Judicially Compelled Disclosure of the Identity of News Gatherers’ Confidential Sources in Common Law Jurisdictions,” Mod. Law Rev., vol. 69, no. 6, pp. 895–934, 2006, doi: 10.1111/j.1468-2230.2006.00616.x.
M. Lagazio, N. Sherif, and M. Cushman, “A multi-level approach to understanding the impact of cyber crime on the financial sector,” Comput. Secur., vol. 45, pp. 58–74, 2014, doi: 10.1016/j.cose.2014.05.006.
Y. Cherdantseva et al., “A review of cyber security risk assessment methods for SCADA systems,” Comput. Secur., vol. 56, pp. 1–27, 2016, doi: 10.1016/j.cose.2015.09.009.
Copyright (c) 2023 Enrico Bagus Trispratama, Mochammad Tanzil Multazam
This work is licensed under a Creative Commons Attribution 4.0 International License.