


default search action
Computer Law & Security Review, Volume 34
Volume 34, Number 1, February 2018
- Steve Saxby:

Editor's foreword. 1-2 - Steve Saxby:

New member of the CLSR professional board. 3
- W. Kuan Hon, Christopher Millard:

Banking in the cloud: Part 1 - banks' use of cloud services. 4-24 - Dan Jerker B. Svantesson

:
Enter the quagmire - the complicated relationship between data protection law and consumer protection law. 25-36 - Rajen Akalu:

Privacy, consent and vehicular ad hoc networks (VANETs). 37-46 - Joshua Yuvaraj

:
How about me? The scope of personal information under the Australian Privacy Act 1988. 47-66 - Max Parasol:

The impact of China's 2016 Cyber Security Law on foreign technology firms, and on China's big data and Smart City dreams. 67-98 - Anna Romanou:

The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise. 99-110 - Graeme Horsman:

Combatting those who intentionally access images depicting child sexual abuse on the Internet: A call for a new offence in England and Wales. 111-124 - Nishtha Madaan, Mohd Abdul Ahad, Sunil M. Sastry:

Data integration in IoT ecosystem: Information linkage as a privacy threat. 125-133 - Christina Tikkinen-Piri, Anna Rohunen, Jouni Markkula:

EU General Data Protection Regulation: Changes and implications for personal data collecting companies. 134-153 - Catherine Jasserand

:
Law enforcement access to personal data originally collected by private parties: Missing data subjects' safeguards in directive 2016/680? 154-165
- Kit Burden:

EU update. 166-174 - Nick Pantlin:

European national news. 175-177
- Gabriela Kennedy:

Asia Pacific news. 178-185
- Hector L. MacQueen:

Electronic Signatures in Law, 4th edition by Stephen Mason, Institute of Advanced Legal Studies, University of London, 2016. Pp lvii + 418 (including index). ISBN 978-1-911507000. £37.94. Also available online free of charge at http: //ials.sas.ac.uk/digital/humanities-digital-library/observing-law-ials-open-book-service-law. 186-187
Volume 34, Number 2, April 2018
- Steve Saxby:

Editor's foreword. 189-191 - Steve Saxby:

New member of the CLSR editorial board. 192
- Paul de Hert

, Vagelis Papakonstantinou
, Gianclaudio Malgieri, Laurent Beslay, Ignacio Sánchez:
The right to data portability in the GDPR: Towards user-centric interoperability of digital services. 193-203 - Mark J. Elliot

, Kieron O'Hara
, Charles D. Raab, Christine M. O'Keefe
, Elaine Mackey, Chris Dibben, Heather Gowans, Kingsley Purdam, Karen McCullagh
:
Functional anonymisation: Personal data and the data environment. 204-221 - Miranda Mourby

, Elaine Mackey, Mark J. Elliot
, Heather Gowans, Susan E. Wallace, Jessica Bell, Hannah Smith
, Stergios Aidinlis
, Jane Kaye
:
Are 'pseudonymised' data always personal data? Implications of the GDPR for administrative data research in the UK. 222-233 - Bart Custers

, Francien Dechesne
, Alan M. Sears
, Tommaso Tani, Simone van der Hof
:
A comparison of data protection legislation and policies across the EU. 234-243 - Eric Lachaud

:
The General Data Protection Regulation and the rise of certification as a regulatory instrument. 244-256 - Michael Butterworth:

The ICO and artificial intelligence: The role of fairness in the GDPR framework. 257-268 - Eva Lievens, Valerie Verdoodt

:
Looking for needles in a haystack: Key issues affecting children's rights in the General Data Protection Regulation. 269-278 - Raphaël Gellert:

Understanding the notion of risk in the General Data Protection Regulation. 279-288 - Gianclaudio Malgieri

, Bart Custers
:
Pricing privacy - the right to know the value of your personal data. 289-303 - Eduard Fosch-Villaronga

, Peter Kieseberg
, Tiffany Li:
Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten. 304-313 - Graham Greenleaf, Andrew Mowbray

, Philip Chung:
Building sustainable free legal advisory systems: Experiences from the history of AI & law. 314-326 - Paul de Hert

, Cihan Parlar, Juraj Sajfert:
The Cybercrime Convention Committee's 2017 Guidance Note on Production Orders: Unilateralist transborder access to electronic evidence promoted via soft law. 327-336 - W. Kuan Hon, Christopher Millard:

Banking in the cloud: Part 2 - regulation of cloud as 'outsourcing'. 337-357 - Cesare Bartolini, Cristiana Santos, Carsten Ullrich

:
Property and the cloud. 358-390
- Julia Hörnle:

Global social media vs local values: Private international law should protect local consumer rights by using the public policy exception? 391-397 - Michael Veale

, Lilian Edwards:
Clarity, surprises, and further questions in the Article 29 Working Party draft guidance on automated decision-making and profiling. 398-404 - Ian J. Lloyd:

Data retention. 405-408
- Kit Burden:

EU update. 409-418 - Nick Pantlin:

European national news. 419-422
- Gabriela Kennedy:

Asia Pacific news. 423-432
Volume 34, Number 3, June 2018
- Steve Saxby:

Editor's foreword. 433-435
- Sandra Wachter

:
Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR. 436-449 - Lachlan Urquhart

, Derek McAuley
:
Avoiding the internet of insecure industrial things. 450-466 - Roger Clarke

:
Guidelines for the responsible application of data analytics. 467-476 - Angela Daly

:
The introduction of data breach notification legislation in Australia: A comparative view. 477-495 - Mikhail S. Zhuravlev, Tatiana A. Brazhnik:

Russian data retention requirements: Obligation to store the content of communications. 496-507 - Uldis Kinis:

From Responsible Disclosure Policy (RDP) towards State Regulated Responsible Vulnerability Disclosure Procedure (hereinafter - RVDP): The Latvian approach. 508-522 - Els J. Kindt:

Having yes, using no? About the new legal regime for biometric data. 523-538 - Bart van der Sloot:

A new approach to the right to privacy, or how the European Court of Human Rights embraced the non-domination principle. 539-549 - Alexander Savelyev:

Copyright in the blockchain era: Promises and challenges. 550-561 - Paul Przemyslaw Polanski

:
Revisiting country of origin principle: Challenges related to regulating e-commerce in the European Union. 562-581 - Pardis Moslemzadeh Tehrani

, Johan Shamsuddin Bin Hj Sabaruddin
, Dhiviya A. P. Ramanathan:
Cross border data transfer: Complexity of adequate protection and its exceptions. 582-594 - W. Kuan Hon, Christopher Millard:

Banking in the cloud: Part 3 - contractual issues. 595-614 - David Jacobus Dalenberg:

Preventing discrimination in the automated targeting of job advertisements. 615-627 - Bernardo D. Olivares Olivares

:
Technological innovation within the Spanish tax administration and data subjects' right to access: An opportunity knocks. 628-639
- Cedric Vanleenhove:

The European Court of Justice in Bolagsupplysningen: The Brussels I Recast Regulation's jurisdictional rules for online infringement of personality rights further clarified. 640-646
- Kit Burden:

EU update. 647-652 - Nick Pantlin:

European national news. 653-656
- Gabriela Kennedy:

Asia pacific news. 657-665
Volume 34, Number 4, August 2018
- Steve Saxby:

Editor's foreword--CLSR 1985-2018. 667-670 - Katina Michael

:
Sylvia Mercado Kierkegaard (1953-2015). 671-676
- Roger Clarke

, Marcus R. Wigan
:
The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security. 677-700 - Rolf H. Weber:

"Rose is a rose is a rose is a rose" - what about code and law? 701-706 - Peggy Valcke

, Inge Graef
, Damian Clifford
:
iFairness - Constructing fairness in IT (and other areas of) law through intra- and interdisciplinarity. 707-714 - Dan Jerker B. Svantesson

:
Jurisdictional issues and the internet - a brief overview 2.0. 715-722 - Clare Sullivan:

Digital identity - From emergent legal concept to new reality. 723-731 - Vagelis Papakonstantinou

, Paul de Hert
:
Structuring modern life running on software. Recognizing (some) computer programs as new "digital persons". 732-738 - Stephen Castell:

The future decisions of RoboJudge HHJ Arthur Ian Blockchain: Dread, delight or derision? 739-753 - Alessandro Mantelero:

AI and Big Data: A blueprint for a human rights, social and ethical impact assessment. 754-772 - Yves Poullet:

Is the general data protection regulation the solution? 773-778 - Ian J. Lloyd:

From ugly duckling to Swan. The rise of data protection and its limits. 779-783 - Sophie Stalla-Bourdillon

, Henry Pearce
, Niko Tsakalakis
:
The GDPR: A game changer for electronic identification schemes? The case study of Gov.UK Verify. 784-805 - Daniel Drewer, Vesela Miladinova:

The canary in the data mine. 806-815 - Francis Aldhouse:

A reflection on the priorities of a data protection authority. 816-823 - Tamar Gidron, Uri Volovelsky:

The right to be forgotten: The Israeli version. 824-829 - Xavier Tracol:

Opinion 1/15 of the Grand Chamber dated 26 July 2017 about the agreement on Passenger Name Record data between the EU and Canada. 830-842 - Christopher Millard:

Blockchain and law: Incompatible codes? 843-846 - Gönenç Gürkaynak, Ilay Yilmaz, Burak Yesilaltay, Berk Bengi:

Intellectual property law and practice in the blockchain realm. 847-862 - Alexander Savelyev:

Some risks of tokenization and blockchainizaition of private law. 863-869 - Paul Przemyslaw Polanski

:
Rethinking the notion of hosting in the aftermath of Delfi: Shifting from liability to responsibility? 870-880 - Nick Pantlin, Claire Wiseman, Miriam Everett:

Supply chain arrangements: The ABC to GDPR compliance - A spotlight on emerging market practice in supplier contracts in light of the GDPR. 881-885 - Kit Burden:

Impact of disruptive technologies on sourcing and outsourcing transactions. 886-889 - Bert-Jaap Koops

, Eleni Kosta
:
Looking for some light through the lens of "cryptowar" history: Policy options for law enforcement authorities against "going dark". 890-900 - Ian Walden:

'The Sky is Falling!' - Responses to the 'Going Dark' problem. 901-907 - Joseph V. DeMarco:

An approach to minimizing legal and reputational risk in Red Team hacking exercises. 908-911 - Felicity Gerry

, Julia Muraszkiewicz, Olivia Iannelli:
The drive for virtual (online) courts and the failure to consider obligations to combat human trafficking - A short note of concern on identification, protection and privacy of victims. 912-919 - Corien Prins:

Digital justice. 920-923 - Kah Leng Ter:

Singapore's cybersecurity strategy. 924-927 - Richard Kemp:

Legal aspects of cloud security. 928-932 - Stephen Mason:

Documents signed or executed with electronic signatures in English law. 933-945 - Edward A. Morse

:
From Rai stones to Blockchains: The transformation of payments. 946-953 - Reinhard Steennot:

Reduced payer's liability for unauthorized payment transactions under the second Payment Services Directive (PSD2). 954-964 - Liyang Hou

:
Destructive sharing economy: A passage from status to contract. 965-976
- Kit Burden:

EU update. 977-984 - Nick Pantlin:

European national news. 985-987
- Gabriela Kennedy:

Asia Pacific news. 988-995
Volume 34, Number 5, October 2018
- Steve Saxby:

Editor's foreword. 997-998 - Steve Saxby:

New member of the CLSR professional board. 999
- Paul Quinn, Liam Quinn

:
Big genetic data and its big data protection challenges. 1000-1018 - Markus Naarttijärvi

:
Balancing data protection and privacy - The case of information security sensor systems. 1019-1038 - Vaclav Janecek

:
Ownership of personal data in the Internet of Things. 1039-1052 - David Ryan

:
European remedial coherence in the regulation of non-consensual disclosures of sexual images. 1053-1076 - Maria Grazia Porcedda

:
Patching the patchwork: appraising the EU regulatory framework on cyber security breaches. 1077-1098 - Miquel Peguera

:
Hyperlinking under the lens of the revamped right of communication to the public. 1099-1118 - Agustí Cerrillo-i-Martínez

:
How do we provide the digital footprint with eternal rest? Some criteria for legislation regulating digital wills. 1119-1130 - Thomas Hoeren, Stefan Pinelli:

Agile programming - Introduction and current legal challenges. 1131-1138
- Graeme Horsman, Angela King:

Policing and Crime Act 2017: Changes to pre-charge bail and the impact on digital forensic analysis. 1139-1143 - Simon Geiregat

:
Cryptocurrencies are (smart) contracts. 1144-1149 - Jan De Bruyne

, Jarich Werbrouck
:
Merging self-driving cars with the law. 1150-1153
- Kit Burden:

EU update. 1154-1161 - Nick Pantlin:

European national news. 1162-1165
- Gabriela Kennedy:

Asia pacific news. 1166-1174
- Nicolo Zingales

:
Data Localization Law and Policy by W. Kuan Hon, Edward Elgar Publishing (2017). ISBN Hardback 978 1 78643 196 7, Elgaronline 978-1 78643 197 4. 1175-1176
Volume 34, Number 6, December 2018
- Steve Saxby:

Editor's foreword. 1177-1179
- Stearns Broadhead

:
The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments. 1180-1196 - Luca Tosoni:

Rethinking Privacy in the Council of Europe's Convention on Cybercrime. 1197-1214 - Andrej Savin

:
Regulating internet platforms in the EU - The emergence of the 'Level playing Field'. 1215-1231 - Bernold Nieuwesteeg, Michael Faure

:
An analysis of the effectiveness of the EU data breach notification obligation. 1232-1246 - Eugenia A. Politou

, Alexandra K. Michota, Efthimios Alepis, Matthias Pocs, Constantinos Patsakis:
Backups and the right to be forgotten in the GDPR: An uneasy relationship. 1247-1257 - Eduard Fosch-Villaronga

, Michiel A. Heldeweg
:
"Regulation, I presume?" said the robot - Towards an iterative regulatory process for robot governance. 1258-1277 - Adam J. Brown, William Bradley Glisson

, Todd R. Andel, Kim-Kwang Raymond Choo
:
Cloud forecasting: Legal visibility issues in saturated environments. 1278-1290 - Vikas Kathuria, Jessica C. Lai

:
User review portability: Why and how? 1291-1299 - Anna Konstantinovna Zharova

, Ian J. Lloyd:
An examination of the experience of cryptocurrency use in Russia. In search of better practice. 1300-1313 - Tom Mackie:

Proving liability for highly and fully automated vehicle accidents in Australia. 1314-1332 - Sunilduth Baichoo, Maleika Heenaye-Mamode Khan

, Pramod Bissessur
, Narainsamy Pavaday, Nazmeen Boodoo-Jahangeer, Neel R. Purmah
:
Legal and ethical considerations of biometric identity card: Case for Mauritius. 1333-1341 - Aimin Qi, Guosong Shao

, Wentong Zheng:
Assessing China's Cybersecurity Law. 1342-1354
- Kit Burden:

EU update. 1355-1359 - Nick Pantlin:

European national news. 1360-1363
- Gabriela Kennedy:

Asia Pacific news. 1364-1376

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














