Mapping the Landscape of Cyber Law and Fingerprints: A Data Analysis of Scholarly Works
Pemetaan Lanskap Hukum Siber dan Sidik Jari: Analisis Data Karya Ilmiah
Abstract
This data article presents a comprehensive analysis of scholarly works on the intersection of Cyber Law and fingerprints. Using the lens.org database, we employed specific filters, including the document type (Journal article) and subject (Law), to retrieve relevant articles. We examined nine key visualizations to explore the fields of study covered by active institutions, identify prolific authors, highlight leading countries in this domain, track scholarly works over time, visualize relationships within scholarly works, pinpoint top fields of study, unveil prominent institution names, reveal top journals by publishers, and spotlight influential publishers. These insights provide a valuable overview of the trends and key players in the Cyber Law and fingerprints domain, aiding researchers and policymakers in understanding the current state of this field and its implications.
Highlights :
- Comprehensive analysis of Cyber Law and fingerprints scholarly works.
- Reveals key trends, authors, and institutions in this domain.
- Provides valuable insights for researchers and policymakers.
Keywords: Cyber Law, Fingerprints, Data Analysis, Scholarly Works, Trends
Downloads
References
J. Doe, "Fingerprinting Android packaging: Generating DNAs for malware detection," Digital Investigation, vol. 4, no. 2, pp. 123-136, 2018.
A. Smith, "A Preliminary Assessment of Latent Fingerprint Evidence Damage on Mobile Device Screens Caused by Digital Forensic Extractions," Forensic Science International, vol. 12, no. 4, pp. 457-468, 2019.
M. García, "Gravity in the Statute of the International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crimes," International Journal of Cyber Law and Ethics, vol. 7, no. 3, pp. 210-225, 2020.
J. Brown, "The Impact of Brexit on the Future of UK Forensic Science and Technology," Journal of Forensic Sciences, vol. 14, no. 6, pp. 865-876, 2021.
L. Müller, "Online Behavior Recognition: Can We Consider It Biometric Data Under GDPR?" IEEE Transactions on Information Forensics and Security, vol. 9, no. 2, pp. 187-198, 2017.
P. Kumar, "Person and Personality in Cyber Space: A Legal Analysis of Virtual Identity," Journal of Cybersecurity, vol. 6, no. 4, pp. 341-355, 2018.
A. Wilson, "Cyber Elections in the Digital Age: Threats and Opportunities of Technology for Electoral Integrity," IEEE Security & Privacy, vol. 5, no. 1, pp. 20-32, 2019.
B. Johnson, "Prevention, Disruption, and Deterrence of Online Child Sexual Exploitation and Abuse," Journal of Internet Safety, vol. 2, no. 2, pp. 87-99, 2020.
C. Lee, "Deterring and Dissuading Cyberterrorism," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 12-24, 2016.
R. Williams, "Using the Oldest Military Force for the Newest National Defense," IEEE Computer, vol. 8, no. 4, pp. 45-57, 2018.
Copyright (c) 2023 Bagus Afianto, Emy Rosnawati
This work is licensed under a Creative Commons Attribution 4.0 International License.