cyber law
Recently Published Documents


TOTAL DOCUMENTS

68
(FIVE YEARS 24)

H-INDEX

3
(FIVE YEARS 1)

2022 ◽  
pp. 500-513
Author(s):  
Regner Sabillon

This chapter studies the phases to unify our national cybersecurity strategy model (NCSSM) in any nation cyber strategy that is either under development or improvement stages. This methodology consists of developing international cybersecurity strategies, alliances, and cooperation with different stakeholders at all possible levels. The research evaluated the best practices of 10 leading countries and five intergovernmental organizations in terms of developing effective cybersecurity strategies and policies. The authors also assessed a series of cybersecurity best practices that can be aligned with cyber governance and cyber law when countries wish to develop or enhance national cyber strategies. Furthermore, they propose guidelines to audit the national cyber strategies by utilizing their cybersecurity audit model (CSAM). CSAM could be considered for conducting cybersecurity audits in any nation state in pursuance of reviewing and measuring the cybersecurity assurance, maturity, and cyber readiness and to detect the needs to increase cyber awareness to defend and protect critical cyber assets.


2021 ◽  
Vol 13 (2) ◽  
Author(s):  
Rohman Hakim ◽  
Khaerul Umam ◽  
Husen Saeful Anwar

The purpose of this study was to analyze the application of e-government through Samsat Mobile Jawa Barat at the Regional Revenue Agency of West Java Province. The theory used in this study uses e-government theory which includes (1) content development, (2) competency building, (3) connectivity, (4) cyber law, (5) citizen interface, and (6) capital. The research approach used is a qualitative approach. Data collection techniques by interview, observation and documentation. The data analysis technique is based on Creswell's thinking with a bottom-up hierarchical approach model. The results of this study indicate that the implementation of e-government through Samsat Mobile Jawa Barat in the Regional Revenue Agency of West Java Province has been running quite well. Although based on Idrajati's e-government theory, there are several criteria that need to be improved. Such as content development criteria that still do not provide an iOS-based Samsat Mobile Jawa Barat application, competency building criteria have not yet produced employees who are experts in managing the appearance of the Bapenda West Java website design and content. The connectivity criteria are good because they are in the West Java region. Cyber law criteria must be added specifically, because it only follows the rules of the central government, the citizen interface criteria still need to be developed because it only has two channels, namely the website and the android application. While the criteria for capital is sufficient, it only needs additional sources of capital apart from the APBD.


2021 ◽  
Vol 9 (09) ◽  
pp. 274-279
Author(s):  
Sumanta Bhattacharya ◽  
◽  
Bhavneet Kaur Sachdev ◽  
Arpan Kundu ◽  
Khewan Bansal ◽  
...  

Cyber space industry has made massive profit during this pandemic with everything going online along with the electronic industry in India , Today , Asia has the maximum population playing video gamers, the gaming industry is earning in billions , digital education , digital economy , work from home everything went online over night , which gave rise to cyber crime cases in India . India data is vulnerable and there is no cyber law which talks about privacy , more than 50% of the population lost their sensitive information online , there was cases of online job frauds and debit and credit fraud . The cyber law in India requires reform where phishing and cyber warfare are given legal protection in India , DATA protection , privacy and spamming requires legal attention . Banks are sensitive to cyber criminal because of the poor cyber security system and not so strong cyber laws which has affected the economy , people have lost many in lacs in these months , The cases of risen in 2020 to 2021 . India also needs to upgrade its cyber security policy and bring in professional in this field.


2021 ◽  
Vol 5 (2) ◽  
pp. 211
Author(s):  
Gomgom TP Siregar ◽  
Sarman Sinaga

Globalization makes the world without borders, countries compete freely in various fields, and sometimes cross the jurisdictional limits of a country, overcoming cybercrime in legislation is absolutely necessary. Related to the jurisdiction of this crime which is a global crime, it is necessary to have a separate law that regulates cybercrime. The approach method using normative juridical. The results of research and discussion stated that The law globalization and politics provides cybercrime countermeasures in the application of legal norms between nations, which increasingly play an important role, especially how to regulate all forms of advances in information technology, communication, and transportation. This is inseparable from the foreign policy that has been woven between nations so far. Cybercrime regulation in legislation is absolutely necessary. Regarding jurisdiction over this crime, which is a global crime, it is necessary to have a separate law that regulates cybercrime, namely cyber law, which also regulates its jurisdiction by including the principle that allows cybercrime actors who harm the state even though they are outside the territory of the country.


2021 ◽  
pp. 208-222
Author(s):  
Mark Grabowski ◽  
Eric P. Robinson
Keyword(s):  

2021 ◽  
Author(s):  
Mark Grabowski ◽  
Eric P. Robinson
Keyword(s):  

This chapter studies the phases to unify our national cybersecurity strategy model (NCSSM) in any nation cyber strategy that is either under development or improvement stages. This methodology consists of developing international cybersecurity strategies, alliances, and cooperation with different stakeholders at all possible levels. The research evaluated the best practices of 10 leading countries and five intergovernmental organizations in terms of developing effective cybersecurity strategies and policies. The authors also assessed a series of cybersecurity best practices that can be aligned with cyber governance and cyber law when countries wish to develop or enhance national cyber strategies. Furthermore, they propose guidelines to audit the national cyber strategies by utilizing their cybersecurity audit model (CSAM). CSAM could be considered for conducting cybersecurity audits in any nation state in pursuance of reviewing and measuring the cybersecurity assurance, maturity, and cyber readiness and to detect the needs to increase cyber awareness to defend and protect critical cyber assets.


2021 ◽  
Author(s):  
M. Shuaib Ahmed ◽  
Akshayaa M R ◽  
Dr. N. Gopinathan
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document