Search dblp for Publications

export results for "toc:db/journals/ijlit/ijlit23.bht:"

 download as .bib file

@article{DBLP:journals/ijlit/Brown15,
  author       = {Ian Brown},
  title        = {The feasibility of transatlantic privacy-protective standards for
                  surveillance},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {23--40},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eau007},
  doi          = {10.1093/IJLIT/EAU007},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Brown15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/FilippiM15,
  author       = {Primavera De Filippi and
                  Lionel Maurel},
  title        = {The paradoxes of open data and how to get rid of it? Analysing the
                  interplay between open data and sui-generis rights on databases},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {1--22},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eau008},
  doi          = {10.1093/IJLIT/EAU008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/FilippiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Irion15,
  author       = {Kristina Irion},
  title        = {Your digital home is no longer your castle: how cloud computing transforms
                  the (legal) relationship between individuals and their personal records},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {348--371},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav015},
  doi          = {10.1093/IJLIT/EAV015},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Irion15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/KarapapaB15,
  author       = {Stavroula Karapapa and
                  Maurizio Borghi},
  title        = {Search engine liability for autocomplete suggestions: personality,
                  privacy and the power of the algorithm},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {261--289},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav009},
  doi          = {10.1093/IJLIT/EAV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/KarapapaB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Katsirea15,
  author       = {Irini Katsirea},
  title        = {Electronic press: 'Press-like' or 'television-like'?},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {134--156},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav004},
  doi          = {10.1093/IJLIT/EAV004},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Katsirea15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Kotsios15,
  author       = {Andreas Kotsios},
  title        = {Privacy in an augmented reality},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {157--185},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav003},
  doi          = {10.1093/IJLIT/EAV003},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Kotsios15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/LimC15,
  author       = {Cheng Lim Saw and
                  Warren B. Chik},
  title        = {Whither the future of internet streaming and time-shifting? Revisiting
                  the rights of reproduction and communication to the public in copyright
                  law after \emph{Aereo}},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {53--88},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav001},
  doi          = {10.1093/IJLIT/EAV001},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/LimC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Lu15,
  author       = {Shan Lu},
  title        = {Conditional access to music: reducing copyright infringement without
                  restricting cloud sharing},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {235--260},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav008},
  doi          = {10.1093/IJLIT/EAV008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Lu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Makulilo15,
  author       = {Alex B. Makulilo},
  title        = {\emph{Asian Data Privacy Laws, Trade and Human Rights Perspective},
                  by Graham Greenleaf},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {322--324},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav012},
  doi          = {10.1093/IJLIT/EAV012},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Makulilo15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Makulilo15a,
  author       = {Alex B. Makulilo},
  title        = {Privacy in mobile money: central banks in Africa and their regulatory
                  limits},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {372--391},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav014},
  doi          = {10.1093/IJLIT/EAV014},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Makulilo15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Moreno15,
  author       = {Felipe Romero Moreno},
  title        = {\emph{From Gutenberg to the Internet Free Speech, Advancing Technology,
                  and the Implications for Democracy}, by Russell L. Weaver\emph{Free
                  Speech in an Internet Era Papers from the Free Speech Discussion Forum},
                  Edited by Clive Walker and Russell L. Weaver},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {89--97},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eau009},
  doi          = {10.1093/IJLIT/EAU009},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Moreno15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Peguera15,
  author       = {Miquel Peguera},
  title        = {In the aftermath of \emph{Google Spain}: how the 'right to be forgotten'
                  is being shaped in Spain by courts and the Data Protection Authority},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {325--347},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav016},
  doi          = {10.1093/IJLIT/EAV016},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijlit/Peguera15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Schellekens15,
  author       = {Maurice Schellekens},
  title        = {The Internet access provider: unwilling or unable?},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {310--321},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav011},
  doi          = {10.1093/IJLIT/EAV011},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Schellekens15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Selvadurai15,
  author       = {Niloufer Selvadurai},
  title        = {Not just a face in the crowd: addressing the intrusive potential of
                  the online application of face recognition technologies},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {187--218},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav006},
  doi          = {10.1093/IJLIT/EAV006},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Selvadurai15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Speth15,
  author       = {Stefanie Speth},
  title        = {The relationship of {VULA} and {LLU/SLU} from a European regulatory
                  policy perspective},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {41--52},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eau010},
  doi          = {10.1093/IJLIT/EAU010},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Speth15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Svantesson15,
  author       = {Dan Svantesson},
  title        = {The holy trinity of legal fictions undermining the application of
                  law to the global Internet},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {219--234},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav007},
  doi          = {10.1093/IJLIT/EAV007},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijlit/Svantesson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/VainioM15,
  author       = {Niklas Vainio and
                  Samuli Miettinen},
  title        = {Telecommunications data retention after \emph{Digital Rights Ireland}:
                  legislative and judicial reactions in the Member States},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {290--309},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav010},
  doi          = {10.1093/IJLIT/EAV010},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/VainioM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Zalnieriute15,
  author       = {Monika Zalnieriute},
  title        = {An international constitutional moment for data privacy in the times
                  of mass-surveillance},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {99--133},
  year         = {2015},
  url          = {https://doi.org/10.1093/ijlit/eav005},
  doi          = {10.1093/IJLIT/EAV005},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Zalnieriute15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}