


default search action
Computer Law & Security Review, Volume 28
Volume 28, Number 1, February 2012
- Steve Saxby:

Editor's foreword. 1-2
- Graham Greenleaf:

Independence of data privacy authorities (Part I): International standards. 3-13 - Luiz Costa:

Privacy and the precautionary principle. 14-24 - Brendan Van Alsenoy:

Allocating responsibility among controllers, processors, and "everything in between": the definition of actors and roles in Directive 95/46/EC. 25-43 - Mònica Vilasau

:
Legal grounds to process personal data under Spanish legislation after the ECJ Judgment of 24 November 2011 (the ASNEF and FECEMD case). 44-53 - David Wright:

The state of the art in privacy impact assessment. 54-61 - Bart Custers:

Technology in policing: Experiences, obstacles and police needs. 62-68 - Amita Verma:

Cyber pornography in India and its implication on cyber café operators. 69-76 - M. Sakthivel:

Indian Copyright Act and new communication technologies: A special focus on webcasting. 77-82 - Julia Hörnle:

Premature or stillborn? - The recent challenge to the Digital Economy Act. 83-89 - Roger Clarke

:
How reliable is cloudsourcing? A review of articles in the technical media 2005-11. 90-95
- Helen Brown, Michael Dizon, Amy Trotter, Viktoria Hoof:

EU update. 96-101 - Mark Turner:

European national news. 102-107
- Gabriela Kennedy:

Asia-Pacific news. 108-115
- Kevin Aquilina, Achilles Emilianides, Tamar Gidron, Nicolas Ktenas, Tatiana-Eleni Synodinou

:
The CLSR-LSPI Seminar - 'The future of privacy regulation in the online world'. 116-118
Volume 28, Number 2, April 2012
- Steve Saxby:

Editor's foreword. 119-120
- Graham Greenleaf:

Independence of data privacy authorities (Part II): Asia-Pacific experience. 121-129 - Paul de Hert, Vagelis Papakonstantinou

:
The proposed data protection Regulation replacing Directive 95/46/EC: A sound system for the protection of individuals. 130-142 - Jef Ausloos:

The 'Right to be Forgotten' - Worth remembering? 143-152 - Norberto Nuno Gomes de Andrade:

Regulating electronic identity in the European Union: An analysis of the Lisbon Treaty's competences and legal basis for eID. 153-162 - Patrick Kierkegaard

:
Medical data breaches: Notification delayed is notification denied. 163-183 - Rachel L. Finn, David Wright:

Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. 184-194 - Stephen Mason:

Vehicle remote keyless entry systems and engine immobilisers: Do not believe the insurer that this technology is perfect. 195-200 - Paul Hunton:

Data attack of the cybercriminal: Investigating the digital currency of cybercrime. 201-207 - Tatiana-Eleni Synodinou

:
The media coverage of court proceedings in Europe: Striking a balance between freedom of expression and fair process. 208-219 - Grace Li

:
The return of public investment in telecommunications: Assessing the early challenges of the national broadband network policy in Australia. 220-230
- Helen Brown, Michael Dizon, Georgina McAdam, Viktoria Hoof:

EU update. 231-236 - Mark Turner:

European national news. 237-241
- Gabriela Kennedy:

Asia-Pacific news. 242-248
- Joseph V. DeMarco:

U.S Federal Trade Commission hosts public forum on facial recognition technology. 249-250
Volume 28, Number 3, June 2012
- Steve Saxby:

Editor's foreword. 251-253
- Luiz Costa, Yves Poullet:

Privacy and the regulation of 2012. 254-262 - Dara Hallinan, Michael Friedewald

, Paul McCarthy:
Citizens' perceptions of data protection and privacy in Europe. 263-272 - J. E. J. Prins, Dennis Broeders

, H. M. Griffioen:
iGovernment: A new perspective on the future of government digitisation. 273-282 - Tamar Gidron:

Privacy protection as a case study in personal rights protection in Israeli law. 283-295 - Mark Burdon

, Bill Lane, Paul von Nessen:
Data breach notification law in the EU and Australia - Where to now? 296-307 - Nancy J. King, V. T. Raja:

Protecting the privacy and security of sensitive customer data in the cloud. 308-319 - Maria Eduarda Barroso Gonçalves

, Maria Inês Gameiro:
Security, privacy and freedom and the EU legal and policy framework for biometrics. 320-327 - Lisa Collingwood:

Privacy, anonymity and liability: Will anonymous communicators have the last laugh? 328-334 - Mark Taylor, Glyn Hughes, John Haggerty, David Gresty, Peter Almond:

Digital evidence from mobile telephone applications. 335-339 - Paul Hinton, Edwin Baker, Chris Hill:

Latency - Time for lawyers to get up to speed? 340-346
- Patrick Charnley:

European Court of Justice rules on the protection of databases under the Database Directive (96/9/EC). 347-349
- Helen Brown, Michael Dizon, Carinne Maisel, Jason Raeburn:

EU update. 350-354 - Mark Turner:

European national news. 355-359
- Gabriela Kennedy:

Asia-Pacific news. 360-367
- Sylvia Mercado Kierkegaard, Nigel Waters, Graham Greenleaf, Elisabeth Thole, Willem Grosheide, Joseph V. DeMarco:

Comments to the CoE Convention 108 draft proposal on data protection. 368-377
Volume 28, Number 4, August 2012
- Steve Saxby:

Editor's foreword. 379-380
- Rodger Jamieson, Lesley Pek Wee Land

, Donald Winchester, Greg Stephens, Alex Steel, Alana Maurushat, Rick Sarre
:
Addressing identity crime in crime management information systems: Definitions, classification, and empirics. 381-395 - Eliza Mik

:
Mistaken identity, identity theft and problems of remote authentication in e-commerce. 396-402 - Rizal Rahman

:
Legal jurisdiction over malware-related crimes1: From theories of jurisdiction to solid practical application. 403-415 - Niels Vandezande

, Katleen Janssen:
The ITS Directive: More than a timeframe with privacy concerns and a means for access to public data for digital road maps? 416-428 - Rebecca Ong:

Data protection in Malaysia and Hong Kong: One step forward, two steps back? 429-437 - Mpakwana Annastacia Mthembu:

High road in regulating online child pornography in South Africa. 438-444 - Phillemon Makakaba:

South African regulation of online casinos licensed in a foreign jurisdiction. 445-452 - Elisabetta Rotondo:

UK government's Open Standards Consultation - A step in the wrong direction? 453-457
- Kathy Eivazi:

Is termination of internet users' accounts by an ISP a proportionate response to copyright infringement? 458-467 - Christiana Markou:

The Cyprus and other EU court rulings on data retention: The Directive as a privacy bomb. 468-475 - Dan Jerker B. Svantesson

:
Data protection in cloud computing - The Swedish perspective. 476-480
- Helen Brown, Michael Dizon, Anuj Moudgil, Laura Hastings:

EU update. 481-485 - Mark Turner:

European national news. 486-491
- Gabriela Kennedy:

Asia-Pacific news. 492-500
- Gabriela Kennedy:

Corrigendum to "Asia-Pacific news" [2012] 28 CLSR 242-248. 501
Volume 28, Number 5, October 2012
- Steve Saxby:

Editorial note. 503 - Peggy Valcke

, Jos Dumortier
:
Computer, Law & Security Review - special issue Trust in the Information Society - ICRI 20th anniversary conference - "Trust in the information society - In search of trust generating mechanisms for the network society". 504-512
- Patrick S. Ryan, Sarah Falvey:

Trust in the clouds. 513-521 - Luciana Duranti, Corinne Rogers

:
Trust in digital records: An increasingly cloudy legal area. 522-531 - Thomas J. Smedinghoff:

Solving the legal challenges of trustworthy online identity. 532-541 - Caroline Pauwels, Ike Picone:

The tussle with trust: Trust in the news media ecology. 542-550 - Brian O'Neill

:
Trust in the information society. 551-559 - Rob Frieden:

Do conduit neutrality mandates promote or hinder trust in Internet-mediated transactions? 560-567 - Jos Dumortier

, Niels Vandezande
:
Trust in the proposed EU regulation on trust services? 568-576 - Szilvia Varadi, Attila Kertész

, Michael Parkin:
The necessity of legally compliant data management in European cloud architectures. 577-586
- Ulrich Wuermeling:

Modernization of European data protection law at a turning point. 587-588
- Helen Brown, Roshni Shah, Jason Raeburn:

EU update. 589-594 - Mark Turner:

European national news. 595-599
- Gabriela Kennedy:

Asia-Pacific news. 600-610
Volume 28, Number 6, December 2012
- Steve Saxby:

Editor's foreword. 611-612
- David Wright, Charles D. Raab:

Constructing a surveillance impact assessment. 613-626 - Matthias Bäcker, Gerrit Hornung:

Data processing by police and criminal justice authorities in Europe - The influence of the Commission's draft on the national police laws and laws of criminal procedure. 627-633 - Rolf H. Weber:

Corporate social responsibility as new challenge for the IT industry. 634-640 - Matthias Pocs:

Will the European Commission be able to standardise legal technology design without a legal method? 641-650 - Hasan A. Deveci:

Can hyperlinks and digital rights management secure affordable access to information? 651-661 - Samson Yoseph Esayas

:
A walk in to the cloud and cloudy it remains: The challenges and prospects of 'processing' and 'transferring' personal data. 662-678 - Michael Mackay, Thar Baker

, Adil Al-Yasiri:
Security-oriented cloud computing platform for critical infrastructures. 679-686 - Hiroko Onishi:

Defamation in cyberspace: A Japanese perspective. 687-695 - Kamal Halili Hassan:

Personal data protection in employment: New legal challenges for Malaysia. 696-703
- Helen Brown, Anuj Moudgil, Max Harris:

EU update. 704-708 - Mark Turner:

European national news. 709-713
- Gabriela Kennedy:

Asia-Pacific news. 714-726

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














