This early stage research article aims to outline an issue that, though not strictly connected to the cyber-sphere, is most likely going to affect it. Standard Setting/Developing Organisations (SSOs/SDOs) are getting more and more important in the electronics manufacturing field and also in the IP field by setting de facto mandatory rules for products to be safer but, most importantly, more efficient. Standards create trust in complex objects such as IoT devices, that are increasingly more available, especially the ones for the house. It is worth mentioning that the standards these organisations envision are not comparable to legislation but carry a significant ‘moral’ weight (soft law). However, these organisations are private in character...
The aim of the law is to maintain social order, peace, and justice in society, whereas the aim of et...
Modern society’s ever-increasing reliance on technology raises complex legal challenges. In the sear...
In this research article, we explore the use of a design process for adapting existing cyber risk as...
This early stage research article aims to outline an issue that, though not strictly connected to th...
This early stage research article aims to outline an issue that, though not strictly connected to th...
Businesses all over the world consider standards essential enablers of technological development. St...
While the Internet of Things (IoT) has created an interconnected world via phones, laptops, and even...
The purpose of this article is to explain why it is relevant to connect the European case-law on the...
Internet of Thing (IoT)s. It focuses in particular on the question of liability in circumstances whe...
While there is an identifiable trend towards protecting consumers from data breaches and data misuse...
The Internet of Things (IoT) is an emerging area of the modern technology which impacts use cases ac...
This article aims to cast light on how the fast-evolving European cybersecurity regulatory framework...
The popularity of products linked to the Internet of Things (‘IoT’) increases each year. As demand f...
The Internet of Things is advancing as a new technological paradigm with enormous economic and socie...
We report on a research project for the European Commission into what will happen to safety regulati...
The aim of the law is to maintain social order, peace, and justice in society, whereas the aim of et...
Modern society’s ever-increasing reliance on technology raises complex legal challenges. In the sear...
In this research article, we explore the use of a design process for adapting existing cyber risk as...
This early stage research article aims to outline an issue that, though not strictly connected to th...
This early stage research article aims to outline an issue that, though not strictly connected to th...
Businesses all over the world consider standards essential enablers of technological development. St...
While the Internet of Things (IoT) has created an interconnected world via phones, laptops, and even...
The purpose of this article is to explain why it is relevant to connect the European case-law on the...
Internet of Thing (IoT)s. It focuses in particular on the question of liability in circumstances whe...
While there is an identifiable trend towards protecting consumers from data breaches and data misuse...
The Internet of Things (IoT) is an emerging area of the modern technology which impacts use cases ac...
This article aims to cast light on how the fast-evolving European cybersecurity regulatory framework...
The popularity of products linked to the Internet of Things (‘IoT’) increases each year. As demand f...
The Internet of Things is advancing as a new technological paradigm with enormous economic and socie...
We report on a research project for the European Commission into what will happen to safety regulati...
The aim of the law is to maintain social order, peace, and justice in society, whereas the aim of et...
Modern society’s ever-increasing reliance on technology raises complex legal challenges. In the sear...
In this research article, we explore the use of a design process for adapting existing cyber risk as...