Dataset: Cyber Law and Piracy: A Comprehensive Analysis of Scholarly Works from 2012-2022
Dataset: Hukum Dunia Maya dan Pembajakan: Analisis Komprehensif Karya Ilmiah dari tahun 2012-2022
Abstract
This data article aims to compile and analyze scholarly works on cyber law and piracy within the legal domain using Lens.org's search and filtering tools. The methodology involves an initial keyword search followed by three filtering stages, narrowing the scope to journal articles published between 2012 and 2022. The analysis highlights the most active authors, institutions, publishers, and countries/regions. Results indicate that University of Louisville, George E Higgins, Springer Nature, and the United States are leading contributors in this field. The findings offer valuable insights for researchers seeking relevant literature on cyber law and piracy in the context of law.
Highlights:
- The study provides a comprehensive overview of scholarly works related to cyber law and piracy in the legal domain, enabling efficient access to relevant literature.
- The analysis highlights key contributors in the field, including authors, institutions, publishers, and countries/regions, identifying leaders in the domain.
- The study demonstrates the effectiveness of Lens.org's search and filtering tools in identifying and analyzing relevant scholarly works within specific research areas.
Downloads
References
F. Cassim, “Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,” Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad, vol. 12, no. 4, p. 35, Jun. 2017, doi: 10.17159/1727-3781/2009/v12i4a2740.
N. K. Katyal, “Digital Architecture as Crime Control,” The Yale Law Journal, vol. 112, no. 8, p. 2261, Jun. 2003, doi: 10.2307/3657476
E. Goldman, “The Challenges of Regulating Warez Trading,” Social Science Computer Review, vol. 23, no. 1, pp. 24–28, Feb. 2005, doi: 10.1177/0894439304271531.
I. Rajagopal, “Cons in the panopticon: Anti–globalization and cyber–piracy,” First Monday, vol. 9, no. 9, Sep. 2004, doi: 10.5210/fm.v9i9.1174.
I. Brunton-Smith and D. J. McCarthy, “Explaining Young People’s Involvement in Online Piracy: An Empirical Assessment Using the Offending Crime and Justice Survey in England and Wales,” Victims & Offenders, vol. 11, no. 4, pp. 509–533, Jan. 2016, doi: 10.1080/15564886.2015.1121943.
G. H. Tang, “Copyright, censorship and privacy: Is cyberspace over crowded?,” International Journal of Intellectual Property Management, vol. 2, no. 2, p. 201, 2008, doi: 10.1504/ijipm.2008.019342
M. A. Zohourian, “A New Maritime Security Architecture for the 21st Century Maritime Silk Road: The South China Sea and the Persian Gulf,” Revista de Estudos Constitucionais, Hermenêutica e Teoria do Direito, vol. 12, no. 2, Jun. 2020, doi: 10.4013/rechtd.2020.122.05.
D. Guilfoyle, “Prosecuting Pirates: The Contact Group on Piracy off the Coast of Somalia, Governance and International Law,” Global Policy, vol. 4, no. 1, pp. 73–79, Feb. 2013, doi: 10.1111/j.1758-5899.2012.00190.x.
D. Gliha, “Piracy in light of marine insurance law with a view of ransom payments,” Zbornik Pravnog fakulteta Sveučilišta u Rijeci, vol. 39, no. 2, pp. 833–856, 2018, doi: 10.30925/zpfsr.39.2.5.
Copyright (c) 2022 Kurnia Ningsih Kolopita, Mochammad Tanzil Multazam
This work is licensed under a Creative Commons Attribution 4.0 International License.