Filters








427,010 Hits in 4.7 sec

Trends in Information Security Regulation [chapter]

Christopher A. Canning, Baoying Wang
Handbook of Research on Computational Forensics, Digital Crime, and Investigation  
This chapter reviews the history of information security legislation, analyzes current information security regulations, and proposes improvements for the future information security regulations.  ...  bACKGROUND There are many laws and regulations on security information issued at different levels in different countries all over the world.  ... 
doi:10.4018/978-1-60566-836-9.ch022 fatcat:4rveha2ehfbfjpgam5na6ebl54

Combining the MDM and BWM Algorithm to Determine the Optimal Crowdfunding Tokenization Solution for Digital Assets Market Startups

Chien-Heng Chou, Chun-Yueh Lin
2022 Systems  
In addition, it makes a practical contribution in the context of the rapid development of FinTech, as the evaluation model proposed in this study can be a valuable measurement tool for startup entrepreneurs  ...  This study makes important contributions in theory and in practice by providing a decision-making model based on the modified Delphi method and the best worst method, which can serve as a valuable reference  ...  Informed Consent Statement: Not applicable. Data Availability Statement: Data sharing is not applicable to this article. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/systems10040087 fatcat:orkvoowcdfeqfl6sdoi3rl737u

The Influence of Regulations on Innovation in Information Security

Lara Khansa, Divakaran Liginlal
2007 Americas Conference on Information Systems  
Motivated by these findings, we argue in favor of regulating the IT industry, which includes the information security sector, not through imposing punitive regimes but rather by providing incentives to  ...  We aim to establish the link between regulations and innovation through the intermediary of demand for information security products and services.  ...  Their suggestions were instrumental in improving the paper.  ... 
dblp:conf/amcis/KhansaL07 fatcat:my7u33j4u5htll5nj6kulwgncu

Cybersecurity Futures: How Can We Regulate Emergent Risks?

Benoit Dupont
2013 Technology Innovation Management Review  
, criminal law, traffic regulationsfor mobile robots, the law of war, privacy regulations, international industrial and security standards, telecom regulation, etc) in order to move toward a regulatory  ...  We tend to think about new trends in isolation; in this article, I argue for a more holistic approach.  ... 
doi:10.22215/timreview/700 fatcat:74ovuiesanhtvbgp6h3mbe7kvi

The Efficacy of Cybersecurity Regulation

David Thaw
2013 Social Science Research Network  
Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do-and should-deliberately encode regulatory  ...  This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted  ...  A Brief Summary of Information Security Regulations I discuss the various information security regulations considered in this Article in more depth later when developing a method of classifying those regulations  ... 
doi:10.2139/ssrn.2241838 fatcat:lqisyrzvyrhobds72tqfxm37oi

The Unsettled Issue from Leidos, Inc. v. Indiana Public Retirement System: Should Item 303 Provide a Private Right of Action?

Jon Jacobson
2022 Indiana Law Review  
. 24 wo acts in the 1930s are largely responsible for the framework of securities regulation that remains in place to this day. 25 First was the Securities Act of 1933 (the "Securities Act").  ...  an overview of terms frequently used in securities regulation which are essential to understanding the issue in Leidos.  ...  in federal court and longer than a short book. 249 This growing flood of trend disclosures will hurt investors' understanding of which trends management actually considers to be relevant and not just  ... 
doi:10.18060/26026 fatcat:hvxmz6senbgvzezzkhkgvfxpoq

Page 43 of ALI-ABA Business Law Course Materials Journal Vol. 33, Issue 6 [page]

2009 ALI-ABA Business Law Course Materials Journal  
developments and trends in self-regulation.  ...  Background On Self-Regulation In The Securities industry Securities exchanges provided regulation of their markets long before the adoption of the federal securities laws.  ... 

Transparency after 9/11: Balancing the "Right-to-Know" with the Need for Security

M Cohen
2002 Corporate Environmental Strategy  
One of the growing trends in voluntary information disclosure is Internet reporting.  ...  In spite of the recent curtailment of information availability and concerns over security, there is a legitimate need for environmental information.  ... 
doi:10.1016/s1066-7938(02)00116-1 fatcat:az32pzy4wrffbp4q4flp3zbjpa

A Meta-Analysis of Industrial Security Research for Sustainable Organizational Growth

Harang Yu, Hangbae Chang
2020 Sustainability  
Subsequently, meta-analyses are conducted on South Korea and abroad to compare their status and research trends in the industrial security field.  ...  This study first examines the literature on industrial security and its current status in South Korea, which is considered an active industrial security research environment.  ...  Legal/regulations comprises the largest portion of all trends, or 34%; this reveals the importance of enacting industrial security-related laws.  ... 
doi:10.3390/su12229526 fatcat:kzdiqnpus5hotf6ihcdpxy2qni

Regulatory oversight of human pathogens and toxins in Canada

C Labrie, S Lecordier
2015 Canada Communicable Disease Report  
and secure use of human pathogens and toxins in Canada.  ...  The Act and the Human Pathogens and Toxins Regulations (the Regulations), in full force since December 1, 2015, provides legislative and statutory requirements for the comprehensive oversight of the control  ...  Act and Regulations.  ... 
pmid:29769973 pmcid:PMC5868715 fatcat:ux6k5z5snfevpkpgqa67pvf7jq

Regulatory oversight of human pathogens and toxins in Canada

C Labrie, S Lecordier
2015 Canada Communicable Disease Report  
and secure use of human pathogens and toxins in Canada.  ...  The Act and the Human Pathogens and Toxins Regulations (the Regulations), in full force since December 1, 2015, provides legislative and statutory requirements for the comprehensive oversight of the control  ...  Act and Regulations.  ... 
doi:10.14745/ccdr.v41is6a03 fatcat:ubritkvetzcgvj2gg2okxkvw4u

A Study on the Improvement of the Cybersecurity Legal System in China

2016 Chinese Journal of Engineering Science  
Furthermore, the author suggests that these laws should be supported by matching regulations and enforcement mechanisms.  ...  service administration law, personal information protection law, e-government law, information and communication network law, and cyber society administration law.  ...  In other words, a system of cyber laws and regulations has begun to take shape in China, covering the fields of Internet network operation security, data security, and contents management; personal information  ... 
doi:10.15302/j-sscae-2016.06.006 fatcat:pxpb6cifdbcwtkzzkdfbz4fzvm

Information Security Risks in Civil Aviation Network: Classification, Identification and Preventive Strategies

Lian Ran
2021 DEStech Transactions on Environment Energy and Earth Science  
Information security of civil aviation network is an important issue in national cyberspace security governance.  ...  information security risks in civil aviation network through generalization and summary approaches.  ...  information security, cooperation is an irresistible trend.  ... 
doi:10.12783/dteees/peees2020/35463 fatcat:cdm2m3u6q5h33k6dfkr2dhsfxm

Legally "reasonable" security requirements: A 10-year FTC retrospective

Travis D. Breaux, David L. Baumer
2011 Computers & security  
The results reveal trends in FTC enforcement actions that are institutionalizing security knowledge as evidenced by 39 security requirements that mitigate 110 legal security vulnerabilities.  ...  Growth in electronic commerce has enabled businesses to reduce costs and expand markets by deploying information technology through new and existing business practices.  ...  Reasonable security is a non-functional requirement that is periodically adjusted by regulators to address changes in business practices, information technology and public concern.  ... 
doi:10.1016/j.cose.2010.11.003 fatcat:gg2tppte7ncijihrk4amd4ccru

Issues and Emerging Trends in Identity Management

Manish Snehi, Jyoti Snehi, Renu Dhir
2012 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Emerging Trends in Information technology involves identity audit, automated compliance, Role lifecycle management, authorization, Information centricidentity, E-SSO and strong authentication, Open ID,  ...  Identity Management is emerging as a significant technology to help in handling the complexity of today"s Business companies, dealing with security in thevirtualized environment, strong authentication  ...  Study of challenges and Issues will help in Promoting identity management and leading to new emerging trends which will be more secure for business and other organization.  ... 
doi:10.24297/ijct.v3i2b.6773 fatcat:7t2e3nynyzb6pmptolpjsmcvxa
« Previous Showing results 1 — 15 out of 427,010 results