Search

Showing total 472 results

Search Constraints

Start Over You searched for: Language english Remove constraint Language: english Journal computer law & security review Remove constraint Journal: computer law & security review Database Academic Search Index Remove constraint Database: Academic Search Index Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
472 results

Search Results

1. The problem of spam law: a comment on the Malaysian communications and multimedia commission's discussion paper on regulating unsolicited commercial messages

2. ... and still we are left wanting: Malta's White Paper on digital rights.

3. The authenticity crisis.

4. Balancing the platform responsibility paradox: A case for amplification regulation to mitigate the spread of harmful but legal content online.

5. The rise of livestreaming e-commerce in China and challenges for regulation: A critical examination of a landmark case occurring during COVID-19 pandemic.

6. Transborder flow of personal data (TDF) in Africa: Stocktaking the ills and gains of a divergently regulated business mechanism.

7. Stack is the New Black?: Evolution and Outcomes of the 'India-Stackification' Process.

8. Consumer neuro devices within EU product safety law: Are we prepared for big tech ante portas?

9. Is the regulation of connected and automated vehicles (CAVs) a wicked problem and why does it matter?

10. The future EU postal regulation. What can be learnt from the telecommunication regulations.

11. Towards a right to repair for the Internet of Things: A review of legal and policy aspects.

12. Challenges in regulating cloud service providers in EU financial regulation: From operational to systemic risks, and examining challenges of the new oversight regime for critical cloud service providers under the Digital Operational Resilience Act.

13. The development of China's electronic case file regulations and its future implications.

14. Identification and demarcation—A general definition and method to address information technology in European IT security law.

15. Privacy icons as a component of effective transparency and controls under the GDPR: effective data protection by design based on art. 25 GDPR.

16. FutureNewsCorp, or how the AI Act changed the future of news.

17. Citizen scientists as data controllers: Data protection and ethics challenges of distributed science.

18. The right not to use the internet.

19. Research on the application and examination of electronic evidence preserved on the blockchain in Chinese copyright judicial practice.

21. ELECTRONIC SIGNATURES — EVIDENCE: THE EVIDENTIAL ISSUES RELATING TO ELECTRONIC SIGNATURES1<fn id="fn1"><no>1</no>The author wishes to thank Professor Tapper, Peter Howes COO of rchive-it.com, Charles Hollander QC, John Theobald of Ikan plc and Nicholas Bohm consultant to Fox Williams and Alec Muffett Principle Engineer Security at Sun Microsystems Limited, for reading the first draft of this paper and for their valuable comments. All errors and omissions remain with the author.</fn> — PART 1

22. EU Data Protection Policy: The Privacy Fallacy: Adverse Effects of Europe’s Data Protection Policy in an Information-Driven Economy1<fn id="fn1"><no>1</no>I presented a short version of this paper at a seminar hosted by FEDMA and the Center for Information Policy Leadership @ Hunton & Williams (Data Flows and Individual Autonomy: The Benefits of Free Flow and the Cost of Privacy, Brussels, May 22, 2001). I am grateful for comments received from participants at that seminar, including Ulf Bru¨hann, Commission of the EC, and Paul de Hert, Catholic University Brabant (KUB). In addition, Marty Abrams, Professor Fred Cate, Oscar Marquis, and Jan Dhont, all of the law firm of Hunton & Williams, and Professor Corien Prins, Catholic University Brabant (KUB), made helpful comments and suggestions. My thinking on this subject has been shaped by discussions in the context of the Global Solutions Project of the Center for Information Policy Leadership @ Hunton & Williams.</fn>

23. The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond.

24. The EU Regulatory approach(es) to AI liability, and its Application to the financial services market.

25. Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.0.

26. Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?

27. Frontex as a hub for surveillance and data sharing: Challenges for data protection and privacy rights.

28. Originality and the future of copyright in an age of generative AI.

29. Algorithms that forget: Machine unlearning and the right to erasure.

30. The European AI liability directives – Critique of a half-hearted approach and lessons for the future.

31. "Lawful interception – A market access barrier in the European Union"?

32. An institutional account of responsiveness in financial regulation- Examining the fallacy and limits of 'same activity, same risks, same rules' as the answer to financial innovation and regulatory arbitrage.

34. Tripartite perspective on the copyright-sharing economy in China.

35. EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era.

36. Lost in translation? Critically assessing the promises and perils of Brazil's Digital Markets Act proposal in the light of international experiments.

37. Promoting more accountable AI in the boardroom through smart regulation.

38. Substantive fairness in the GDPR: Fairness Elements for Article 5.1a GDPR.

39. A fair trial in complex technology cases: Why courts and judges need a basic understanding of complex technologies.

40. Clarifying "personal data" and the role of anonymisation in data protection law: Including and excluding data from the scope of the GDPR (more clearly) through refining the concept of data protection.

41. Discrimination for the sake of fairness by design and its legal framework.

42. The European Health Data Space: An expanded right to data portability?

43. ITALIAN-LEGAL-BERT models for improving natural language processing tasks in the Italian legal domain.

44. An entity-centric approach to manage court judgments based on Natural Language Processing.

45. Enforcing legal information extraction through context-aware techniques: The ASKE approach.

46. A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime.

47. Cybersecurity in the EU: How the NIS2-directive stacks up against its predecessor.

48. Data modelling as a means of power: At the legal and computer science crossroads.

49. Beyond financial regulation of crypto-asset wallet software: In search of secondary liability.

50. Untangling the cyber norm to protect critical infrastructures.