Search

Showing total 484 results

Search Constraints

Start Over You searched for: Language english Remove constraint Language: english Journal computer law & security review Remove constraint Journal: computer law & security review Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
484 results

Search Results

1. The problem of spam law: a comment on the Malaysian communications and multimedia commission's discussion paper on regulating unsolicited commercial messages

2. ... and still we are left wanting: Malta's White Paper on digital rights.

6. ELECTRONIC SIGNATURES — EVIDENCE: THE EVIDENTIAL ISSUES RELATING TO ELECTRONIC SIGNATURES1<fn id="fn1"><no>1</no>The author wishes to thank Professor Tapper, Peter Howes COO of rchive-it.com, Charles Hollander QC, John Theobald of Ikan plc and Nicholas Bohm consultant to Fox Williams and Alec Muffett Principle Engineer Security at Sun Microsystems Limited, for reading the first draft of this paper and for their valuable comments. All errors and omissions remain with the author.</fn> — PART 1

7. EU Data Protection Policy: The Privacy Fallacy: Adverse Effects of Europe’s Data Protection Policy in an Information-Driven Economy1<fn id="fn1"><no>1</no>I presented a short version of this paper at a seminar hosted by FEDMA and the Center for Information Policy Leadership @ Hunton & Williams (Data Flows and Individual Autonomy: The Benefits of Free Flow and the Cost of Privacy, Brussels, May 22, 2001). I am grateful for comments received from participants at that seminar, including Ulf Bru¨hann, Commission of the EC, and Paul de Hert, Catholic University Brabant (KUB). In addition, Marty Abrams, Professor Fred Cate, Oscar Marquis, and Jan Dhont, all of the law firm of Hunton & Williams, and Professor Corien Prins, Catholic University Brabant (KUB), made helpful comments and suggestions. My thinking on this subject has been shaped by discussions in the context of the Global Solutions Project of the Center for Information Policy Leadership @ Hunton & Williams.</fn>

8. Harmonizing innovation and regulation: The EU Artificial Intelligence Act in the international trade context.

9. ETIAS system and new proposals to advance the use of AI in public services.

10. Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions.

11. The authenticity crisis.

12. Consumer neuro devices within EU product safety law: Are we prepared for big tech ante portas?

13. Identification and demarcation—A general definition and method to address information technology in European IT security law.

14. Balancing the platform responsibility paradox: A case for amplification regulation to mitigate the spread of harmful but legal content online.

15. Transborder flow of personal data (TDF) in Africa: Stocktaking the ills and gains of a divergently regulated business mechanism.

16. The rise of livestreaming e-commerce in China and challenges for regulation: A critical examination of a landmark case occurring during COVID-19 pandemic.

17. Stack is the New Black?: Evolution and Outcomes of the 'India-Stackification' Process.

18. Privacy icons as a component of effective transparency and controls under the GDPR: effective data protection by design based on art. 25 GDPR.

19. Is the regulation of connected and automated vehicles (CAVs) a wicked problem and why does it matter?

20. The future EU postal regulation. What can be learnt from the telecommunication regulations.

21. Towards a right to repair for the Internet of Things: A review of legal and policy aspects.

22. Challenges in regulating cloud service providers in EU financial regulation: From operational to systemic risks, and examining challenges of the new oversight regime for critical cloud service providers under the Digital Operational Resilience Act.

23. The development of China's electronic case file regulations and its future implications.

24. FutureNewsCorp, or how the AI Act changed the future of news.

25. Citizen scientists as data controllers: Data protection and ethics challenges of distributed science.

26. The right not to use the internet.

27. Research on the application and examination of electronic evidence preserved on the blockchain in Chinese copyright judicial practice.

28. Originality and the future of copyright in an age of generative AI.

29. Algorithms that forget: Machine unlearning and the right to erasure.

30. The European AI liability directives – Critique of a half-hearted approach and lessons for the future.

31. "Lawful interception – A market access barrier in the European Union"?

32. An institutional account of responsiveness in financial regulation- Examining the fallacy and limits of 'same activity, same risks, same rules' as the answer to financial innovation and regulatory arbitrage.

33. How might the GDPR evolve? A question of politics, pace and punishment.

34. Algorithmic proxy discrimination and its regulations.

35. Better alone than in bad company: Addressing the risks of companion chatbots through data protection by design.

36. Open Banking goes to Washington: Lessons from the EU on regulatory-driven data sharing regimes.

37. Data sovereignty and data transfers as fundamental elements of digital transformation: Lessons from the BRICS countries.

38. EU sanctions in response to cyber-attacks as crime-based emergency measures.

39. Ontological models for representing image-based sexual abuses.

40. Non-fungible tokens, tokenization, and ownership.

41. From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China.

42. Tripartite perspective on the copyright-sharing economy in China.

43. EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era.

44. From fragile to smart consumers: Shifting paradigm for the digital era.

45. Greed for data and exclusionary conduct in data-driven markets.

46. Regulating internet platforms in the EU - The emergence of the 'Level playing Field'.

47. Untangling the cyber norm to protect critical infrastructures.

48. Beyond financial regulation of crypto-asset wallet software: In search of secondary liability.

49. The drive for virtual (online) courts and the failure to consider obligations to combat human trafficking – A short note of concern on identification, protection and privacy of victims.

50. Some risks of tokenization and blockchainizaition of private law.