An assessment of U.S. legislation on cybersecurity
Cybercrime continues to be on the rise and cybercriminals are launching increasingly sophisticated cyberattacks aimed at disrupting businesses through denial of service attacks and stealing personal information all with serious economic consequences. Law and policy makers are under increasing pressu...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 294 |
---|---|
container_issue | |
container_start_page | 289 |
container_title | |
container_volume | |
creator | Murray, A. Zeadally, S. Flowers, A. |
description | Cybercrime continues to be on the rise and cybercriminals are launching increasingly sophisticated cyberattacks aimed at disrupting businesses through denial of service attacks and stealing personal information all with serious economic consequences. Law and policy makers are under increasing pressure to develop timely legislations to address cybercrime issues and provide effective measures to prosecute cybercriminals. We present a comprehensive review of the various laws that are currently available in the Unites States to control cybercrime and support cybersecurity. We also discuss proposed bills in light of how they address cybersecurity challenges in current legislations. Finally, we briefly present recent regulations and proposed bills related to cybersecurity in a few other countries which have set up various government initiatives in this area. |
doi_str_mv | 10.1109/CyberSec.2012.6246106 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6246106</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6246106</ieee_id><sourcerecordid>6246106</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-f30c119e5d979a6e7bb7a839d70c343e7a893c59775f2d13cd8b32848121c7883</originalsourceid><addsrcrecordid>eNpVT0tqwzAUVCmBltQnCAVdwKqenqzPMpj-INBF0nWQ5eei4jjFche-fV2aTYeBYWYxwzB2D1IASP9Qzw2Ne4pCSVDCKG1AmitWeOtAG4ugldbX_3wFN6zI-VMuWFIAc8vUduAhZ8r5RMPEzx1_F3vBe_pIuQ9TOg98YfwdyxS_xzTNd2zVhT5TcdE1Ozw9HuqXcvf2_Fpvd2Xycio7lBHAU9V664Mh2zQ2OPStlRE10mI8xspbW3WqBYyta1A57UBBtM7hmm3-ahMRHb_GdArjfLwcxR_9WEZ2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An assessment of U.S. legislation on cybersecurity</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Murray, A. ; Zeadally, S. ; Flowers, A.</creator><creatorcontrib>Murray, A. ; Zeadally, S. ; Flowers, A.</creatorcontrib><description>Cybercrime continues to be on the rise and cybercriminals are launching increasingly sophisticated cyberattacks aimed at disrupting businesses through denial of service attacks and stealing personal information all with serious economic consequences. Law and policy makers are under increasing pressure to develop timely legislations to address cybercrime issues and provide effective measures to prosecute cybercriminals. We present a comprehensive review of the various laws that are currently available in the Unites States to control cybercrime and support cybersecurity. We also discuss proposed bills in light of how they address cybersecurity challenges in current legislations. Finally, we briefly present recent regulations and proposed bills related to cybersecurity in a few other countries which have set up various government initiatives in this area.</description><identifier>ISBN: 9781467314251</identifier><identifier>ISBN: 1467314250</identifier><identifier>EISBN: 9781467314244</identifier><identifier>EISBN: 1467314242</identifier><identifier>EISBN: 1467314269</identifier><identifier>EISBN: 9781467314268</identifier><identifier>DOI: 10.1109/CyberSec.2012.6246106</identifier><language>eng</language><publisher>IEEE</publisher><subject>Business ; Computer crime ; Computers ; cyberattack ; cybercrime ; cybersecurity ; Law ; Legislation</subject><ispartof>Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012, p.289-294</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6246106$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6246106$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Murray, A.</creatorcontrib><creatorcontrib>Zeadally, S.</creatorcontrib><creatorcontrib>Flowers, A.</creatorcontrib><title>An assessment of U.S. legislation on cybersecurity</title><title>Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)</title><addtitle>CyberSec</addtitle><description>Cybercrime continues to be on the rise and cybercriminals are launching increasingly sophisticated cyberattacks aimed at disrupting businesses through denial of service attacks and stealing personal information all with serious economic consequences. Law and policy makers are under increasing pressure to develop timely legislations to address cybercrime issues and provide effective measures to prosecute cybercriminals. We present a comprehensive review of the various laws that are currently available in the Unites States to control cybercrime and support cybersecurity. We also discuss proposed bills in light of how they address cybersecurity challenges in current legislations. Finally, we briefly present recent regulations and proposed bills related to cybersecurity in a few other countries which have set up various government initiatives in this area.</description><subject>Business</subject><subject>Computer crime</subject><subject>Computers</subject><subject>cyberattack</subject><subject>cybercrime</subject><subject>cybersecurity</subject><subject>Law</subject><subject>Legislation</subject><isbn>9781467314251</isbn><isbn>1467314250</isbn><isbn>9781467314244</isbn><isbn>1467314242</isbn><isbn>1467314269</isbn><isbn>9781467314268</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVT0tqwzAUVCmBltQnCAVdwKqenqzPMpj-INBF0nWQ5eei4jjFche-fV2aTYeBYWYxwzB2D1IASP9Qzw2Ne4pCSVDCKG1AmitWeOtAG4ugldbX_3wFN6zI-VMuWFIAc8vUduAhZ8r5RMPEzx1_F3vBe_pIuQ9TOg98YfwdyxS_xzTNd2zVhT5TcdE1Ozw9HuqXcvf2_Fpvd2Xycio7lBHAU9V664Mh2zQ2OPStlRE10mI8xspbW3WqBYyta1A57UBBtM7hmm3-ahMRHb_GdArjfLwcxR_9WEZ2</recordid><startdate>201206</startdate><enddate>201206</enddate><creator>Murray, A.</creator><creator>Zeadally, S.</creator><creator>Flowers, A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201206</creationdate><title>An assessment of U.S. legislation on cybersecurity</title><author>Murray, A. ; Zeadally, S. ; Flowers, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-f30c119e5d979a6e7bb7a839d70c343e7a893c59775f2d13cd8b32848121c7883</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Business</topic><topic>Computer crime</topic><topic>Computers</topic><topic>cyberattack</topic><topic>cybercrime</topic><topic>cybersecurity</topic><topic>Law</topic><topic>Legislation</topic><toplevel>online_resources</toplevel><creatorcontrib>Murray, A.</creatorcontrib><creatorcontrib>Zeadally, S.</creatorcontrib><creatorcontrib>Flowers, A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Murray, A.</au><au>Zeadally, S.</au><au>Flowers, A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An assessment of U.S. legislation on cybersecurity</atitle><btitle>Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)</btitle><stitle>CyberSec</stitle><date>2012-06</date><risdate>2012</risdate><spage>289</spage><epage>294</epage><pages>289-294</pages><isbn>9781467314251</isbn><isbn>1467314250</isbn><eisbn>9781467314244</eisbn><eisbn>1467314242</eisbn><eisbn>1467314269</eisbn><eisbn>9781467314268</eisbn><abstract>Cybercrime continues to be on the rise and cybercriminals are launching increasingly sophisticated cyberattacks aimed at disrupting businesses through denial of service attacks and stealing personal information all with serious economic consequences. Law and policy makers are under increasing pressure to develop timely legislations to address cybercrime issues and provide effective measures to prosecute cybercriminals. We present a comprehensive review of the various laws that are currently available in the Unites States to control cybercrime and support cybersecurity. We also discuss proposed bills in light of how they address cybersecurity challenges in current legislations. Finally, we briefly present recent regulations and proposed bills related to cybersecurity in a few other countries which have set up various government initiatives in this area.</abstract><pub>IEEE</pub><doi>10.1109/CyberSec.2012.6246106</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781467314251 |
ispartof | Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012, p.289-294 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6246106 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Business Computer crime Computers cyberattack cybercrime cybersecurity Law Legislation |
title | An assessment of U.S. legislation on cybersecurity |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T22%3A21%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20assessment%20of%20U.S.%20legislation%20on%20cybersecurity&rft.btitle=Proceedings%20Title:%202012%20International%20Conference%20on%20Cyber%20Security,%20Cyber%20Warfare%20and%20Digital%20Forensic%20(CyberSec)&rft.au=Murray,%20A.&rft.date=2012-06&rft.spage=289&rft.epage=294&rft.pages=289-294&rft.isbn=9781467314251&rft.isbn_list=1467314250&rft_id=info:doi/10.1109/CyberSec.2012.6246106&rft_dat=%3Cieee_6IE%3E6246106%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467314244&rft.eisbn_list=1467314242&rft.eisbn_list=1467314269&rft.eisbn_list=9781467314268&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6246106&rfr_iscdi=true |