scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "cybersecurity act"

1 - 8 of 8 results for
 "cybersecurity act"
Results per page:

Chapter 6 The Internet of Things (You Don’t Own) under Bourgeois Law

Publication Type: eBook

Abstract: This chapter will present the main IP issues in the IoT and concentrate on one of them, that has been framed as ‘death of ownership’ by Joshua Fairfield in Owned, a seminal book that will provide an initial framework to understand this issue. Ownership...

Subjects:
View details

Regulatory Cybersecurity in the European Union and the Republic of Moldova

Publication Type: Academic Journal

Source(s): CSIE Working Papers Series, Iss 14, Pp 6-14 (2019)

Abstract: The rapid development of information technology leads to various opportunities for both individuals and businesses to conduct including financial transactions through the Internet. In such circumstances, cyber security issues become very relevant. In t...

View details

Why Harmful Posts on Social Media should be regulated

Publication Type: Academic Journal

Source(s): International Review of Law, Vol 10, Iss 2 (2021)

Abstract: Harmful content over the internet is going viral nowadays on most of the social media platforms, which has negative effects on both adults and children, especially, with the increasing usage of social media tools during the Covid-19 situation. Therefor...

View details

Internet of Things and the Law

Publication Type: eBook

Abstract: Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth an...

Subjects:
View details

Securing Your Radiology Practice: Evidence-Based Strategies for Radiologists Compiled From 10 Years of Cyberattacks and HIPAA Breaches Involving Medical Imaging.

Publication Type: Academic Journal

Source(s): Perspectives in health information management [Perspect Health Inf Manag] 2022 Jul 01; Vol. 19 (3), pp. 1c. Date of Electronic Publication: 2022 Jul 01 (Print Publication: 2022).

Abstract: While there is significant literature discussing physical and cybersecurity risks around health information technology in general, the number of publications that specifically address medical imaging is much smaller, and many of these focus on the tech...

View details

Information security climate and the assessment of information security risk among healthcare employees.

Publication Type: Academic Journal

Source(s): Health informatics journal [Health Informatics J] 2020 Mar; Vol. 26 (1), pp. 461-473. Date of Electronic Publication: 2019 Mar 14.

Abstract: Since 2009, over 176 million patients in the United States have been adversely impacted by data breaches affecting Health Insurance Portability and Accountability Act-covered institutions. While the popular press often attributes data breaches to exter...

View details

Cybersecurity in healthcare: A systematic review of modern threats and trends.

Publication Type: Academic Journal

Source(s): Technology and health care : official journal of the European Society for Engineering and Medicine [Technol Health Care] 2017; Vol. 25 (1), pp. 1-10.

Abstract: Background: The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats.Objective: The objective of thi...

View details

Towards a Cognitive Theory of Cyber Deception.

Publication Type: Academic Journal

Source(s): Cognitive science [Cogn Sci] 2021 Jul; Vol. 45 (7), pp. e13013.

Abstract: This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present-day communication among humans is largely elec...

View details
sponsored