0.8(top 50%)
impact factor
50(top 100%)
papers
168(top 50%)
citations
6(top 50%)
h-index
0.8(top 50%)
impact factor
112
all documents
211
doc citations
11(top 50%)
g-index

Top Articles

#TitleJournalYearCitations
1Avatars in the metaverse: potential legal issues and remediesInternational Cybersecurity Law Review202243
2Understanding the Chinese Data Security LawInternational Cybersecurity Law Review202113
3The global governance on automated facial recognition (AFR): ethical and legal opportunities and privacy challengesInternational Cybersecurity Law Review202112
4Cybersecurity and remote working: Croatia’s (non-)response to increased cyber threatsInternational Cybersecurity Law Review202011
5Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governanceInternational Cybersecurity Law Review202210
6Open source intelligenceInternational Cybersecurity Law Review20218
7The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?International Cybersecurity Law Review20207
8Data security management and data protection for video conferencing softwareInternational Cybersecurity Law Review20206
9Vorschlag für eine NIS-Richtlinie 2.0 – vom erweiterten Anwendungsbereich erfasste Unternehmen und ihre VerpflichtungenInternational Cybersecurity Law Review20216
10Analysis of the cybersecurity ecosystem in the European UnionInternational Cybersecurity Law Review20226
11The EU Cybersecurity Act and European standards: an introduction to the role of European standardizationInternational Cybersecurity Law Review20205
12Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory studyInternational Cybersecurity Law Review20225
13Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchangeInternational Cybersecurity Law Review20225
14Regulation of Internet-of-Things cybersecurity in Europe and Germany as exemplified by devices for childrenInternational Cybersecurity Law Review20204
15Cybersecurity of medical devices: new challenges arising from the AI Act and NIS 2 Directive proposalsInternational Cybersecurity Law Review20224
16One step ahead: mapping the Italian and German cybersecurity laws against the proposal for a NIS2 directiveInternational Cybersecurity Law Review20224
17The legal obligation to provide timely security patching and automatic updatesInternational Cybersecurity Law Review20224
18The Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elementsInternational Cybersecurity Law Review20224
19Global disinformation campaigns and legal challengesInternational Cybersecurity Law Review20203
20Contesting sovereignty in cyberspaceInternational Cybersecurity Law Review20203
21Legal challenges of an open web indexInternational Cybersecurity Law Review20212
22Necessary or premature? The NIS 2 Directive from the perspective of the telecommunications sectorInternational Cybersecurity Law Review20212
23Numbers and statistics: data and cyber breaches under the General Data Protection RegulationInternational Cybersecurity Law Review20212
24Die Strafbarkeit des Betreibens krimineller Handelsplattformen im Internet – Der neue § 127 StGBInternational Cybersecurity Law Review20212
25European Cybersecurity Certification Schemes and cybersecurity in the EU internal marketInternational Cybersecurity Law Review02
26Cybersicherheit in Krankenhäusern – Teil 1: IT-Compliance als LeitungsaufgabeInternational Cybersecurity Law Review20222
27A review of product safety regulations in the European UnionInternational Cybersecurity Law Review20222
28Invalidation of the EU–US Privacy Shield: impact on data protection and data security regarding the transfer of personal data to the United StatesInternational Cybersecurity Law Review20211
29Global network security governance trend and China’s practiceInternational Cybersecurity Law Review20211
30Going it alone? UK cybersecurity regulation post-BrexitInternational Cybersecurity Law Review20211
31Covid-19: a catalyst for cybercrime?International Cybersecurity Law Review20211
32Cybersecurity in outsourcing and cloud computing: a growing challenge for contract draftingInternational Cybersecurity Law Review20211
33Security Updates im IoT nach den Richtlinien über digitale Inhalte (DI-RL) und über den Warenkauf (WK-RL)International Cybersecurity Law Review20201
34Cybersecurity regulation in Brazil and Latin America: an overviewInternational Cybersecurity Law Review20221
35Cybersicherheit in Krankenhäusern – Teil 2: vom Normalfall zum NotfallInternational Cybersecurity Law Review20221
36Incidental data: observation of privacy compromising data on social media platformsInternational Cybersecurity Law Review20231
37The European framework for cybersecurity: strong assets, intricate historyInternational Cybersecurity Law Review01
38Regulation of the European Parliament and the Council on digital operational resilience for the financial sector (DORA)International Cybersecurity Law Review01
39Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governanceInternational Cybersecurity Law Review20231
40Der Cybersicherheitsrahmen der Europäischen Union: das Zusammenspiel zwischen Cyber Resilience Act und NIS-2-RichtlinieInternational Cybersecurity Law Review01
41Applying blockchain to the modern legal system: Kleros as a decentralised dispute resolution systemInternational Cybersecurity Law Review01
42The institutional logic of security assessment of cross-border data transfers in China: context and progressInternational Cybersecurity Law Review20200
43Regulation and deregulation: understanding the evolution of the Chinese cryptography legal regime from the newly released Cryptography Law of ChinaInternational Cybersecurity Law Review20200
44Commentary on newly released measures for cyber security review of ChinaInternational Cybersecurity Law Review20200
45Cybersecurity and the risk governance triangleInternational Cybersecurity Law Review20210
46The Japanese Basic Act on Cybersecurity and the historical development of the Japanese legal framework for cybersecurityInternational Cybersecurity Law Review20210
47Desolates IT-Sicherheitsgesetz 2.0 im AnmarschInternational Cybersecurity Law Review20210
48Die vertragliche Ausgestaltung von Pen-Tests – eine praxisgeleitete Analyse auftragstypischer KonstellationenInternational Cybersecurity Law Review20210
49Korea’s cybersecurity regulations and enforcement related to security incidentsInternational Cybersecurity Law Review20210
50Square pegs, round holes, and Indian cybersecurity lawsInternational Cybersecurity Law Review20210