LEADER 06013nam 22006975 450 001 9910831004403321 005 20240322031023.0 010 $a9783031418204 010 $a3031418204 024 7 $a10.1007/978-3-031-41820-4 035 $a(MiAaPQ)EBC31131991 035 $a(Au-PeEL)EBL31131991 035 $a(OCoLC)1420627375 035 $a(CKB)30323280500041 035 $a(DE-He213)978-3-031-41820-4 035 $a(EXLCZ)9930323280500041 100 $a20240206d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aLegal Developments on Cybersecurity and Related Fields /$fedited by Francisco António Carneiro Pacheco de Andrade, Pedro Miguel Fernandes Freitas, Joana Rita de Sousa Covelo de Abreu 205 $a1st ed. 2024. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2024. 215 $a1 online resource (341 pages) 225 1 $aLaw, Governance and Technology Series,$x2352-1910 ;$v60 311 08$a9783031418198 311 08$a3031418190 327 $aLegal Developments on Cybersecurity and Related Fields: Introductory notes and presentation -- PART I ? CYBERSECURITY, CYBERDEFENCE AND LAW -- Getting critical. Making sense of the EU security framework for cloud providers -- Cyber operations targeting space systems. Legal questions and the context of privatisation -- A legal assessment of the concept of risk in reversible operations through cyber and electronic means -- Knowledge management and continuous improvement in cyberspace -- Information security metrics: challenges and models in an all-digital world -- Cyberterrorism and the Portuguese counter-terrorism act -- PART II ? CYBERSECURITY AND LAW: SPECIFIC TOPICS -- Towards cybersecurity regulation of software in the European Union -- The importance of the computer undercover agent as an investigative measure against cybercrime: a special reference to child pornography crimes -- Post-Mortem data protection and succession in digital assets under Spanish law -- The suitability of the regime oftechnological measures for copyright protection in the face of modern cybersecurity risks -- Digital signatures and quantum computing -- No words needed? Emojis as evidence in judicial proceedings -- PART III ? CYBERSECURITY, ETHICS AND FUNDAMENTAL RIGHTS -- Bug bounties: ethical and legal aspects -- Profiling and cybersecurity: a perspective from fundamental rights' protection in the EU -- Legal developments on smart public governance and fundamental rights in the digital age -- Biometric signatures in the context of Regulation (EU) nr. 910/2014 and the general data protection regulation: the evidential value and anonymization of biometric data -- Cybersecurity issues in electronic communications and some insights on digital literacy and technological infrastructures? demands ? anticipations of the European Digital Decade through the lens of a Declaration on digital rights and principles. 330 $aThis book presents a fresh approach to cybersecurity issues, seeking not only to analyze the legal landscape of the European Union and its Member States, but to do so in an interdisciplinary manner, involving scholars from diverse backgrounds ? ranging from legal experts to ICT and engineering professionals. Cybersecurity requirements must be understood in a broader context, encompassing not just conventional aspects, but also emerging topics. This can only be achieved through an interdisciplinary approach. Indeed, cybersecurity should be consistently considered in relation to cybercrime and/or cyber defense, while examining it through the lens of specific domains that are intertwined with various legal fields. Moreover, it is crucial to uphold ethical standards and safeguard fundamental rights, particularly regarding personal data protection. By adopting this comprehensive perspective, the significance of cybersecurity in the exercise of public authority becomes apparent. It also plays an essential role in upholding the fundamental values of both individual Member States and the EU as a whole, such as the rule of law. Moreover, it fosters trust, transparency, and effectiveness in market relations and public administration interactions. In turn, the book draws on the expertise of its authors to provide insights into ICT components and technologies. Understanding these elements holistically is essential to viewing every "cyber" phenomenon from a legal standpoint. In addition to the holistic and interdisciplinary approach it presents, the book offers a captivating exploration of cybersecurity and an engaging read for anyone interested in the field. 410 0$aLaw, Governance and Technology Series,$x2352-1910 ;$v60 606 $aInformation technology$xLaw and legislation 606 $aMass media$xLaw and legislation 606 $aLaw$zEurope 606 $aCriminal law 606 $aData protection 606 $aIT Law, Media Law, Intellectual Property 606 $aEuropean Law 606 $aCriminal Law and Criminal Procedure Law 606 $aData and Information Security 615 0$aInformation technology$xLaw and legislation. 615 0$aMass media$xLaw and legislation. 615 0$aLaw 615 0$aCriminal law. 615 0$aData protection. 615 14$aIT Law, Media Law, Intellectual Property. 615 24$aEuropean Law. 615 24$aCriminal Law and Criminal Procedure Law. 615 24$aData and Information Security. 676 $a005.8026 700 $aCarneiro Pacheco de Andrade$b Francisco António$01680079 701 $aFernandes Freitas$b Pedro Miguel$01680080 701 $ade Sousa Covelo de Abreu$b Joana Rita$01680081 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910831004403321 996 $aLegal Developments on Cybersecurity and Related Fields$94048709 997 $aUNINA