Have a personal or library account? Click to login
The evolution of mobile cybersecurity regulations in the European Union Cover

The evolution of mobile cybersecurity regulations in the European Union

Open Access
|Mar 2025

References

  1. AceleraPyme. Cyber Resilience Act for SMEs. Accessed January 2024. https://www.acelerapyme.gob.es
    AceleraPyme Cyber Resilience Act for SMEs Accessed January 2024. https://www.acelerapyme.gob.es
  2. Akdemir, N., Sungur, B., & Başaranel, B. (2020). Examining the challenges of policing economic cybercrime in the UK. Güvenlik Bilimleri Dergisi (pp. 113–134). International Security Congress Special Issue. doi: 10.28956/gbd.695956.
  3. Amoo, O. (2024). Gdpr’s impact on cybersecurity: A review focusing on usa and european practices. International Journal of Science and Research Archive, 11(1), 1338–1347. doi: 10.30574/ijsra.2024.11.1.0220
    Amoo O. 2024 Gdpr’s impact on cybersecurity: A review focusing on usa and european practices International Journal of Science and Research Archive 11 1 1338 1347 10.30574/ijsra.2024.11.1.0220
  4. Blei, D., Ng, A., & Jordan, M. (2003). Latent Dirichlet allocation. Journal of Machine Learning Research, 3, 993–1022
  5. Butorina, M. (2024). The Draghi report interrupts the EU silent “family dinner”. Analytical Papers of the Institute of Europe Ras, 21(3), 43–51. doi: 10.15211/analytics32120244351
    Butorina M. 2024 The Draghi report interrupts the EU silent “family dinner” Analytical Papers of the Institute of Europe Ras 21 3 43 51 10.15211/analytics32120244351
  6. Chiara, P. (2022). The cyber resilience act: The eu commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements. International Cybersecurity Law Review, 3(2), 255–272. doi: 10.1365/s43439-022-00067-6
    Chiara P. 2022 The cyber resilience act: The eu commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements International Cybersecurity Law Review 3 2 255 272 10.1365/s43439-022-00067-6
  7. Council of the European Union. The General Data Protection Regulation (GDPR). Accessed January 2024. https://europa.eu/youreurope/business/dealing-with-customers/data-protection/data-protection-gdpr
    Council of the European Union The General Data Protection Regulation (GDPR) Accessed January 2024. https://europa.eu/youreurope/business/dealing-with-customers/data-protection/data-protection-gdpr
  8. Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive)
  9. European Commission. Cybersecurity Strategy for the digital decade. Accessed January 2024. https://digital-strategy.ec.europa.eu/policies/cybersecurity-strategy
    European Commission Cybersecurity Strategy for the digital decade Accessed January 2024. https://digital-strategy.ec.europa.eu/policies/cybersecurity-strategy
  10. Fuster, G., & Jasmontaite, L. (2020). Cybersecurity regulation in the european union: The digital, the critical and fundamental rights. In M. Christen, B. Gordijn, & M. Loi (Eds.), The Ethics of Cybersecurity. The International Library of Ethics, Law and Technology, vol 21. 97–115. Springer, Cham. doi: 10.1007/978-3-030-29053-5_5
    Fuster G. Jasmontaite L. 2020 Cybersecurity regulation in the european union: The digital, the critical and fundamental rights In M. Christen, B. Gordijn, & M. Loi (Eds.), The Ethics of Cybersecurity. The International Library of Ethics, Law and Technology vol 21 97 115 Springer, Cham. doi: 10.1007/978-3-030-29053-5_5
  11. Haesendonck, L. (2023). The role of stakeholder involvement in the evolving eu hta process: Insights generated through the european access academy’s multi-stakeholder pre-convention questionnaire. Journal of Market Access & Health Policy, 11(1), 2217543. doi: 10.1080/20016689.2023.2217543
    Haesendonck L. 2023 The role of stakeholder involvement in the evolving eu hta process: Insights generated through the european access academy’s multi-stakeholder pre-convention questionnaire Journal of Market Access & Health Policy 11 1 2217543 10.1080/20016689.2023.2217543
  12. HSE. What happened during the cyber attack? Accessed January 2024. https://www2.hse.ie/services/cyber-attack/what-happened/ (https://www2.hse.ie/services/cyber-attack/)
  13. IBM. Cyber attacks: definition and examples. Accessed January 2024. https://www.ibm.com/es-es/topics/cyber-attack
    IBM Cyber attacks: definition and examples Accessed January 2024. https://www.ibm.com/es-es/topics/cyber-attack
  14. Julian, E., Pavlovic, M., Sola-Morales, O., Gianfrate, F., Toumi, M., Bucher, H. C., Dierks, C., Greiner, W., Mol, P., Bergmann, J. F., & Salmonson, T. (2022). Shaping a research agenda to ensure a successful european health technology assessment: Insights generated during the inaugural convention of the european access academy. Health Economics Review, 12(1), 54. doi: 10.1186/s13561-022-00402-x
    Julian E. Pavlovic M. Sola-Morales O. Gianfrate F. Toumi M. Bucher H. C. Dierks C. Greiner W. Mol P. Bergmann J. F. Salmonson T. 2022 Shaping a research agenda to ensure a successful european health technology assessment: Insights generated during the inaugural convention of the european access academy Health Economics Review 12 1 54 10.1186/s13561-022-00402-x
  15. Kempf, E. (2024). Towards shared European finances. doi: 10.59704/0559ae84b5e101f4
    Kempf E. 2024 Towards shared European finances 10.59704/0559ae84b5e101f4
  16. Khurshid, A., Alsaaidi, R., Aslam, M., & Raza, S. (2022). EU cybersecurity act and iot certification: Landscape, perspective and a proposed template scheme. IEEE Access, 10, 129932–129948. doi: 10.1109/access.2022.3225973
    Khurshid A. Alsaaidi R. Aslam M. Raza S. 2022 EU cybersecurity act and iot certification: Landscape, perspective and a proposed template scheme IEEE Access 10 129932 129948 10.1109/access.2022.3225973
  17. Ludvigsen, K., & Nagaraja, S. (2022). The opportunity to regulate cybersecurity in the EU (and the world): Recommendations for the cybersecurity resilience act. doi: 10.48550/arxiv.2205.13196
    Ludvigsen K. Nagaraja S. 2022 The opportunity to regulate cybersecurity in the EU (and the world): Recommendations for the cybersecurity resilience act 10.48550/arxiv.2205.13196
  18. Schmitz, S., & Chiara, P. (2022). One step ahead: Mapping the Italian and German cybersecurity laws against the proposal for a nis2 directive. International Cybersecurity Law Review, 3(2), 289–311. doi: 10.1365/s43439-022-00058-7
    Schmitz S. Chiara P. 2022 One step ahead: Mapping the Italian and German cybersecurity laws against the proposal for a nis2 directive International Cybersecurity Law Review 3 2 289 311 10.1365/s43439-022-00058-7
  19. Turk, Ž. (2024). Regulating artificial intelligence: A technology-independent approach. European View, 23(1), 87–93. doi: 10.1177/17816858241242890
    Turk Ž. 2024 Regulating artificial intelligence: A technology-independent approach European View 23 1 87 93 10.1177/17816858241242890
  20. Vasilescu, N. G., Pocatilu, P., & Doinea, M. (2023). IoT security challenges for smart homes. In Education, Research and Business Technologies: Proceedings of 21st International Conference on Informatics in Economy (IE 2022) (pp. 41–49). Springer Nature Singapore
DOI: https://doi.org/10.2478/mmcks-2025-0004 | Journal eISSN: 2069-8887 | Journal ISSN: 1842-0206
Language: English
Page range: 52 - 63
Submitted on: Mar 3, 2025
Accepted on: Apr 3, 2025
Published on: Mar 30, 2025
Published by: Society for Business Excellence
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2025 Cosmin Alexandru Teodorescu, Cristian-Eugen Ciurea, Bogdan-Paul Saftiuc, Daniela Staicu, published by Society for Business Excellence
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.