| dc.contributor.author | Marotta, Angelica | |
| dc.contributor.author | Madnick, Stuart | |
| dc.date.accessioned | 2025-09-16T16:43:32Z | |
| dc.date.available | 2025-09-16T16:43:32Z | |
| dc.date.issued | 2028-09-08 | |
| dc.identifier.issn | 0360-0300 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/162660 | |
| dc.description.abstract | As cyber-attacks become more frequent, sophisticated, and impactful, governments worldwide are responding by introducing or proposing new cybersecurity regulations. This paper examines over 170 recent regulations and trends in cybersecurity across various regions, including the United States, Europe, and beyond. It identifies 17 key features in many of these regulations, which we have grouped into 5 categories, analyzes observed patterns, and proposes areas for improvement. This paper's primary objective is to significantly contribute to the cybersecurity compliance domain by helping researchers understand the structure of these regulations and helping organizations to assess and mitigate their cyber risk within an increasingly complex and regulated cybersecurity environment. Our findings provide valuable direction to those trying to navigate the flood of new cybersecurity regulations and the governments enacting new cybersecurity regulations. | en_US |
| dc.publisher | Association for Computing Machinery | en_US |
| dc.relation.isversionof | http://dx.doi.org/10.1145/3757318 | en_US |
| dc.rights | Creative Commons Attribution | en_US |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en_US |
| dc.source | Association for Computing Machinery | en_US |
| dc.title | Analyzing and Categorizing Emerging Cybersecurity Regulations | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Angelica Marotta and Stuart Madnick. 2025. Analyzing and Categorizing Emerging Cybersecurity Regulations. ACM Comput. Surv. 58, 2, Article 51 (January 2026), 36 pages. | en_US |
| dc.contributor.department | Sloan School of Management | en_US |
| dc.relation.journal | ACM Computing Surveys | en_US |
| dc.identifier.mitlicense | PUBLISHER_POLICY | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
| eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
| dc.date.updated | 2025-09-01T07:57:25Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | The author(s) | |
| dspace.date.submission | 2025-09-01T07:57:25Z | |
| mit.journal.volume | 58 | en_US |
| mit.journal.issue | 2 | en_US |
| mit.license | PUBLISHER_CC | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |