About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
International Cybersecurity Law Review
›
top-articles
International Cybersecurity Law Review
0.8
(top 50%)
impact factor
50
(top 100%)
papers
168
(top 50%)
citations
6
(top 50%)
h
-index
0.8
(top 50%)
impact factor
112
all documents
211
doc citations
11
(top 50%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Avatars in the metaverse: potential legal issues and remedies
International Cybersecurity Law Review
2022
43
2
Understanding the Chinese Data Security Law
International Cybersecurity Law Review
2021
13
3
The global governance on automated facial recognition (AFR): ethical and legal opportunities and privacy challenges
International Cybersecurity Law Review
2021
12
4
Cybersecurity and remote working: Croatia’s (non-)response to increased cyber threats
International Cybersecurity Law Review
2020
11
5
Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance
International Cybersecurity Law Review
2022
10
6
Open source intelligence
International Cybersecurity Law Review
2021
8
7
The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?
International Cybersecurity Law Review
2020
7
8
Data security management and data protection for video conferencing software
International Cybersecurity Law Review
2020
6
9
Vorschlag für eine NIS-Richtlinie 2.0 – vom erweiterten Anwendungsbereich erfasste Unternehmen und ihre Verpflichtungen
International Cybersecurity Law Review
2021
6
10
Analysis of the cybersecurity ecosystem in the European Union
International Cybersecurity Law Review
2022
6
11
The EU Cybersecurity Act and European standards: an introduction to the role of European standardization
International Cybersecurity Law Review
2020
5
12
Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study
International Cybersecurity Law Review
2022
5
13
Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange
International Cybersecurity Law Review
2022
5
14
Regulation of Internet-of-Things cybersecurity in Europe and Germany as exemplified by devices for children
International Cybersecurity Law Review
2020
4
15
Cybersecurity of medical devices: new challenges arising from the AI Act and NIS 2 Directive proposals
International Cybersecurity Law Review
2022
4
16
One step ahead: mapping the Italian and German cybersecurity laws against the proposal for a NIS2 directive
International Cybersecurity Law Review
2022
4
17
The legal obligation to provide timely security patching and automatic updates
International Cybersecurity Law Review
2022
4
18
The Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements
International Cybersecurity Law Review
2022
4
19
Global disinformation campaigns and legal challenges
International Cybersecurity Law Review
2020
3
20
Contesting sovereignty in cyberspace
International Cybersecurity Law Review
2020
3
21
Legal challenges of an open web index
International Cybersecurity Law Review
2021
2
22
Necessary or premature? The NIS 2 Directive from the perspective of the telecommunications sector
International Cybersecurity Law Review
2021
2
23
Numbers and statistics: data and cyber breaches under the General Data Protection Regulation
International Cybersecurity Law Review
2021
2
24
Die Strafbarkeit des Betreibens krimineller Handelsplattformen im Internet – Der neue § 127 StGB
International Cybersecurity Law Review
2021
2
25
European Cybersecurity Certification Schemes and cybersecurity in the EU internal market
International Cybersecurity Law Review
0
2
26
Cybersicherheit in Krankenhäusern – Teil 1: IT-Compliance als Leitungsaufgabe
International Cybersecurity Law Review
2022
2
27
A review of product safety regulations in the European Union
International Cybersecurity Law Review
2022
2
28
Invalidation of the EU–US Privacy Shield: impact on data protection and data security regarding the transfer of personal data to the United States
International Cybersecurity Law Review
2021
1
29
Global network security governance trend and China’s practice
International Cybersecurity Law Review
2021
1
30
Going it alone? UK cybersecurity regulation post-Brexit
International Cybersecurity Law Review
2021
1
31
Covid-19: a catalyst for cybercrime?
International Cybersecurity Law Review
2021
1
32
Cybersecurity in outsourcing and cloud computing: a growing challenge for contract drafting
International Cybersecurity Law Review
2021
1
33
Security Updates im IoT nach den Richtlinien über digitale Inhalte (DI-RL) und über den Warenkauf (WK-RL)
International Cybersecurity Law Review
2020
1
34
Cybersecurity regulation in Brazil and Latin America: an overview
International Cybersecurity Law Review
2022
1
35
Cybersicherheit in Krankenhäusern – Teil 2: vom Normalfall zum Notfall
International Cybersecurity Law Review
2022
1
36
Incidental data: observation of privacy compromising data on social media platforms
International Cybersecurity Law Review
2023
1
37
The European framework for cybersecurity: strong assets, intricate history
International Cybersecurity Law Review
0
1
38
Regulation of the European Parliament and the Council on digital operational resilience for the financial sector (DORA)
International Cybersecurity Law Review
0
1
39
Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance
International Cybersecurity Law Review
2023
1
40
Der Cybersicherheitsrahmen der Europäischen Union: das Zusammenspiel zwischen Cyber Resilience Act und NIS-2-Richtlinie
International Cybersecurity Law Review
0
1
41
Applying blockchain to the modern legal system: Kleros as a decentralised dispute resolution system
International Cybersecurity Law Review
0
1
42
The institutional logic of security assessment of cross-border data transfers in China: context and progress
International Cybersecurity Law Review
2020
0
43
Regulation and deregulation: understanding the evolution of the Chinese cryptography legal regime from the newly released Cryptography Law of China
International Cybersecurity Law Review
2020
0
44
Commentary on newly released measures for cyber security review of China
International Cybersecurity Law Review
2020
0
45
Cybersecurity and the risk governance triangle
International Cybersecurity Law Review
2021
0
46
The Japanese Basic Act on Cybersecurity and the historical development of the Japanese legal framework for cybersecurity
International Cybersecurity Law Review
2021
0
47
Desolates IT-Sicherheitsgesetz 2.0 im Anmarsch
International Cybersecurity Law Review
2021
0
48
Die vertragliche Ausgestaltung von Pen-Tests – eine praxisgeleitete Analyse auftragstypischer Konstellationen
International Cybersecurity Law Review
2021
0
49
Korea’s cybersecurity regulations and enforcement related to security incidents
International Cybersecurity Law Review
2021
0
50
Square pegs, round holes, and Indian cybersecurity laws
International Cybersecurity Law Review
2021
0
site/software ©
exaly
; All materials licenced under
CC by-SA
.