References
- AceleraPyme. Cyber Resilience Act for SMEs. Accessed January 2024. https://www.acelerapyme.gob.es
- Akdemir, N., Sungur, B., & Başaranel, B. (2020). Examining the challenges of policing economic cybercrime in the UK. Güvenlik Bilimleri Dergisi (pp. 113–134). International Security Congress Special Issue. doi: 10.28956/gbd.695956.
-
Amoo, O. (2024). Gdpr’s impact on cybersecurity: A review focusing on usa and european practices. International Journal of Science and Research Archive, 11(1), 1338–1347. doi: 10.30574/ijsra.2024.11.1.0220
Amoo O. 2024 Gdpr’s impact on cybersecurity: A review focusing on usa and european practices International Journal of Science and Research Archive 11 1 1338 1347 10.30574/ijsra.2024.11.1.0220
- Blei, D., Ng, A., & Jordan, M. (2003). Latent Dirichlet allocation. Journal of Machine Learning Research, 3, 993–1022
-
Butorina, M. (2024). The Draghi report interrupts the EU silent “family dinner”. Analytical Papers of the Institute of Europe Ras, 21(3), 43–51. doi: 10.15211/analytics32120244351
Butorina M. 2024 The Draghi report interrupts the EU silent “family dinner” Analytical Papers of the Institute of Europe Ras 21 3 43 51 10.15211/analytics32120244351
-
Chiara, P. (2022). The cyber resilience act: The eu commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements. International Cybersecurity Law Review, 3(2), 255–272. doi: 10.1365/s43439-022-00067-6
Chiara P. 2022 The cyber resilience act: The eu commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements International Cybersecurity Law Review 3 2 255 272 10.1365/s43439-022-00067-6
-
Council of the European Union. The General Data Protection Regulation (GDPR). Accessed January 2024. https://europa.eu/youreurope/business/dealing-with-customers/data-protection/data-protection-gdpr
Council of the European Union The General Data Protection Regulation (GDPR) Accessed January 2024. https://europa.eu/youreurope/business/dealing-with-customers/data-protection/data-protection-gdpr
- Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive)
-
European Commission. Cybersecurity Strategy for the digital decade. Accessed January 2024. https://digital-strategy.ec.europa.eu/policies/cybersecurity-strategy
European Commission Cybersecurity Strategy for the digital decade Accessed January 2024. https://digital-strategy.ec.europa.eu/policies/cybersecurity-strategy
-
Fuster, G., & Jasmontaite, L. (2020). Cybersecurity regulation in the european union: The digital, the critical and fundamental rights. In M. Christen, B. Gordijn, & M. Loi (Eds.), The Ethics of Cybersecurity. The International Library of Ethics, Law and Technology, vol 21. 97–115. Springer, Cham. doi: 10.1007/978-3-030-29053-5_5
Fuster G. Jasmontaite L. 2020 Cybersecurity regulation in the european union: The digital, the critical and fundamental rights In M. Christen, B. Gordijn, & M. Loi (Eds.), The Ethics of Cybersecurity. The International Library of Ethics, Law and Technology vol 21 97 115 Springer, Cham. doi: 10.1007/978-3-030-29053-5_5
-
Haesendonck, L. (2023). The role of stakeholder involvement in the evolving eu hta process: Insights generated through the european access academy’s multi-stakeholder pre-convention questionnaire. Journal of Market Access & Health Policy, 11(1), 2217543. doi: 10.1080/20016689.2023.2217543
Haesendonck L. 2023 The role of stakeholder involvement in the evolving eu hta process: Insights generated through the european access academy’s multi-stakeholder pre-convention questionnaire Journal of Market Access & Health Policy 11 1 2217543 10.1080/20016689.2023.2217543
- HSE. What happened during the cyber attack? Accessed January 2024. https://www2.hse.ie/services/cyber-attack/what-happened/ (https://www2.hse.ie/services/cyber-attack/)
-
IBM. Cyber attacks: definition and examples. Accessed January 2024. https://www.ibm.com/es-es/topics/cyber-attack
IBM Cyber attacks: definition and examples Accessed January 2024. https://www.ibm.com/es-es/topics/cyber-attack
-
Julian, E., Pavlovic, M., Sola-Morales, O., Gianfrate, F., Toumi, M., Bucher, H. C., Dierks, C., Greiner, W., Mol, P., Bergmann, J. F., & Salmonson, T. (2022). Shaping a research agenda to ensure a successful european health technology assessment: Insights generated during the inaugural convention of the european access academy. Health Economics Review, 12(1), 54. doi: 10.1186/s13561-022-00402-x
Julian E. Pavlovic M. Sola-Morales O. Gianfrate F. Toumi M. Bucher H. C. Dierks C. Greiner W. Mol P. Bergmann J. F. Salmonson T. 2022 Shaping a research agenda to ensure a successful european health technology assessment: Insights generated during the inaugural convention of the european access academy Health Economics Review 12 1 54 10.1186/s13561-022-00402-x
- Kempf, E. (2024). Towards shared European finances. doi: 10.59704/0559ae84b5e101f4
-
Khurshid, A., Alsaaidi, R., Aslam, M., & Raza, S. (2022). EU cybersecurity act and iot certification: Landscape, perspective and a proposed template scheme. IEEE Access, 10, 129932–129948. doi: 10.1109/access.2022.3225973
Khurshid A. Alsaaidi R. Aslam M. Raza S. 2022 EU cybersecurity act and iot certification: Landscape, perspective and a proposed template scheme IEEE Access 10 129932 129948 10.1109/access.2022.3225973
-
Ludvigsen, K., & Nagaraja, S. (2022). The opportunity to regulate cybersecurity in the EU (and the world): Recommendations for the cybersecurity resilience act. doi: 10.48550/arxiv.2205.13196
Ludvigsen K. Nagaraja S. 2022 The opportunity to regulate cybersecurity in the EU (and the world): Recommendations for the cybersecurity resilience act 10.48550/arxiv.2205.13196
-
Schmitz, S., & Chiara, P. (2022). One step ahead: Mapping the Italian and German cybersecurity laws against the proposal for a nis2 directive. International Cybersecurity Law Review, 3(2), 289–311. doi: 10.1365/s43439-022-00058-7
Schmitz S. Chiara P. 2022 One step ahead: Mapping the Italian and German cybersecurity laws against the proposal for a nis2 directive International Cybersecurity Law Review 3 2 289 311 10.1365/s43439-022-00058-7
-
Turk, Ž. (2024). Regulating artificial intelligence: A technology-independent approach. European View, 23(1), 87–93. doi: 10.1177/17816858241242890
Turk Ž. 2024 Regulating artificial intelligence: A technology-independent approach European View 23 1 87 93 10.1177/17816858241242890
- Vasilescu, N. G., Pocatilu, P., & Doinea, M. (2023). IoT security challenges for smart homes. In Education, Research and Business Technologies: Proceedings of 21st International Conference on Informatics in Economy (IE 2022) (pp. 41–49). Springer Nature Singapore