- data analysis,
- online social networking,
- scholarly works,
- institutional insights
Copyright (c) 2023 Melanie Merliya Cahyo, Rifqi Ridlo Phahlevy
This work is licensed under a Creative Commons Attribution 4.0 International License.
This data article presents a comprehensive analysis of scholarly works related to cyberlaw and online social networking. The goal was to identify the most prolific institutions and authors contributing to this field. Data was collected from scholarly works available on Lens.org, filtered for journal articles in the "law" category, and supplemented with image analysis. Results revealed that in 2017 and 2018, the highest number of publications were recorded. Notably, the article titled "Smart Contracts: Terminology, Technical Boundaries, and Real-World Complexity" garnered the most access. Eliza Mik, Fawzia Cassim, and Warren B Chik emerged as the most active authors, each contributing two documents. The University of South Africa emerged as the most active institution in the field of law. The top journal, "Potchefstroom Electronic Law Journal," was published by the Academy of Science of South Africa, while the Academy itself was the most prolific publisher. In the realm of online social networking, the leading institution was highlighted. These insights offer valuable knowledge for researchers and students interested in cyberlaw and online social networking.
- Analysis of scholarly works in cyberlaw and online social networking.
- Identification of top institutions, authors, and publications in the field.
- Valuable insights for researchers and students in law and technology.
Keywords: data analysis, cyberlaw, online social networking, scholarly works, institutional insights
- S. Thomas, "Law, smart technology, and circular economy: all watched over by machines of Loving Grace?," Journal of Law, Innovation and Technology, vol. 10, no. 2, pp. 230-265, 2018.
- J. O. Uchenna, "The African union convention on cybersecurity: A regional response towards cyber stability?," Journal of Law and Technology, vol. 12, no. 2, pp. 91-130, 2018.
- D. B. Bibi Van and K. Esther, "International Review of Law, Computers & Technology - Regulating security on the Internet: control versus trust," Journal of Law, Computers & Technology, vol. 31, no. 2, pp. 188-205, 2017.
- M. Eliza, "Smart contracts: Terminology, technical limitations and real world complexity," Journal of Law, Innovation and Technology, vol. 9, no. 2, pp. 269-300, 2017.
- M. Eliza, "The Unimportance of being electronic or popular misconceptions about Internet contracting," Journal of Law and Information Technology, vol. 19, no. 4, pp. 4-324, 2011.
- B. C. Warren, "Customary internet-ional law’: Creating a body of customary law for cyberspace. Part 1: Developing rules for transitioning custom into law," Journal of Computer Law & Security Review, vol. 26, no. 1, pp. 3-22, 2010.
- R. Marco, "Cyber Operations as Nuclear Counterproliferation Measures," Journal of Conflict and Security Law, vol. 19, no. 1, pp. 133-157, 2014.
- C. Fawzia, "Addressing the spectre of cyber terrorism: a comparative perspective," Journal of Potchefstroom Electronic Law, vol. 15, no. 2, pp. 380-415, 2017.
- D. M. Dana Van, "A comparative overview of the (sometimes uneasy) relationship between digital information and certain legal fields in South Africa and Uganda," Journal of Potchefstroom Electronic Law, vol. 17, no. 1, pp. 296-326, 2017.
- C. Fawzia, "Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study," Journal of Potchefstroom Electronic Law, vol. 12, no. 4, pp. 35-79, 2017