Vol 11 (2022): Proceedings of Data Article on Law Science
Data Articles in Law Science

Dataset: Cyber Law and Piracy: A Comprehensive Analysis of Scholarly Works from 2012-2022
Dataset: Hukum Dunia Maya dan Pembajakan: Analisis Komprehensif Karya Ilmiah dari tahun 2012-2022


Kurnia Ningsih Kolopita
Universitas Negeri Gorontalo, Indonesia
Bio
Mochammad Tanzil Multazam
Universitas Muhammadiyah Sidoarjo, Indonesia
Bio
Picture in here are illustration from public domain image or provided by the author, as part of their works
Published November 30, 2022
Keywords
  • cyber law,
  • piracy,
  • legal domain,
  • scholarly works,
  • Lens.org
How to Cite
Kolopita, K. N., & Multazam, M. T. (2022). Dataset: Cyber Law and Piracy: A Comprehensive Analysis of Scholarly Works from 2012-2022. Proceedings of The ICECRS, 11, 10.21070/icecrs.v11i0.1684. https://doi.org/10.21070/icecrs.v11i0.1684

Abstract

This data article aims to compile and analyze scholarly works on cyber law and piracy within the legal domain using Lens.org's search and filtering tools. The methodology involves an initial keyword search followed by three filtering stages, narrowing the scope to journal articles published between 2012 and 2022. The analysis highlights the most active authors, institutions, publishers, and countries/regions. Results indicate that University of Louisville, George E Higgins, Springer Nature, and the United States are leading contributors in this field. The findings offer valuable insights for researchers seeking relevant literature on cyber law and piracy in the context of law.


Highlights:

  1. The study provides a comprehensive overview of scholarly works related to cyber law and piracy in the legal domain, enabling efficient access to relevant literature.
  2. The analysis highlights key contributors in the field, including authors, institutions, publishers, and countries/regions, identifying leaders in the domain.
  3. The study demonstrates the effectiveness of Lens.org's search and filtering tools in identifying and analyzing relevant scholarly works within specific research areas.

 

 

Downloads

Download data is not yet available.

References

  1. F. Cassim, “Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,” Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad, vol. 12, no. 4, p. 35, Jun. 2017, doi: 10.17159/1727-3781/2009/v12i4a2740.
  2. N. K. Katyal, “Digital Architecture as Crime Control,” The Yale Law Journal, vol. 112, no. 8, p. 2261, Jun. 2003, doi: 10.2307/3657476
  3. E. Goldman, “The Challenges of Regulating Warez Trading,” Social Science Computer Review, vol. 23, no. 1, pp. 24–28, Feb. 2005, doi: 10.1177/0894439304271531.
  4. I. Rajagopal, “Cons in the panopticon: Anti–globalization and cyber–piracy,” First Monday, vol. 9, no. 9, Sep. 2004, doi: 10.5210/fm.v9i9.1174.
  5. I. Brunton-Smith and D. J. McCarthy, “Explaining Young People’s Involvement in Online Piracy: An Empirical Assessment Using the Offending Crime and Justice Survey in England and Wales,” Victims & Offenders, vol. 11, no. 4, pp. 509–533, Jan. 2016, doi: 10.1080/15564886.2015.1121943.
  6. G. H. Tang, “Copyright, censorship and privacy: Is cyberspace over crowded?,” International Journal of Intellectual Property Management, vol. 2, no. 2, p. 201, 2008, doi: 10.1504/ijipm.2008.019342
  7. M. A. Zohourian, “A New Maritime Security Architecture for the 21st Century Maritime Silk Road: The South China Sea and the Persian Gulf,” Revista de Estudos Constitucionais, Hermenêutica e Teoria do Direito, vol. 12, no. 2, Jun. 2020, doi: 10.4013/rechtd.2020.122.05.
  8. D. Guilfoyle, “Prosecuting Pirates: The Contact Group on Piracy off the Coast of Somalia, Governance and International Law,” Global Policy, vol. 4, no. 1, pp. 73–79, Feb. 2013, doi: 10.1111/j.1758-5899.2012.00190.x.
  9. D. Gliha, “Piracy in light of marine insurance law with a view of ransom payments,” Zbornik Pravnog fakulteta Sveučilišta u Rijeci, vol. 39, no. 2, pp. 833–856, 2018, doi: 10.30925/zpfsr.39.2.5.