default search action
Computer Law & Security Review, Volume 26
Volume 26, Number 1, January 2010
- Steve Saxby:
Editorial foreword. 1-2
- Warren B. Chik:
'Customary internet-ional law': Creating a body of customary law for cyberspace. Part 1: Developing rules for transitioning custom into law. 3-22 - Rolf H. Weber:
Internet of Things - New security and privacy challenges. 23-30 - Dan Svantesson, Roger Clarke:
A best practice model for e-consumer protection. 31-37 - Abida Chaudri:
Internet domain names and the interaction with intellectual property. 38-42 - Nicholas Bohm, Stephen Mason:
Identity and its verification. 43-51 - Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases. 52-60 - Ida Madieha Azmi:
Legal and ethical issues in knowledge management in Malaysia. 61-71 - Mark Taylor, John Haggerty, David Gresty:
The legal aspects of corporate computer usage policies. 72-76
- (Withdrawn) RETRACTED: Google's use of Rescuecom's trademark as an advertising keyword and the U.S. Federal Trademarks Act. 77-89
- Steven Baker, Taryn Johnson:
Skype Technologies SA v Joltid Limited and others [2009] EWHC 2783 (Ch). Anti-suit injunction: Clarification of effect of English exclusive jurisdiction clause in worldwide technology licensing contract. 90-93
- Helen Kemmitt, Michael Dizon:
EU update. 94-98 - Mark Turner:
European national news. 99-104
- Gabriela Kennedy, Sarah Doyle:
Asia-pacific news. 105-112
Volume 26, Number 2, March 2010
- Steve Saxby:
Editor's foreword - CLSR 1985-2010. 113-114
- Mark Burdon, Bill Lane, Paul von Nessen:
The mandatory notification of data breaches: Issues arising for Australian and EU legal developments. 115-129 - Kevin Aquilina:
Public security versus privacy in technology law: A balancing act? 130-143 - Thomas Dreier:
"Opt in" and "opt out" mechanisms in the internet era - towards a common theory. 144-150 - Gerrit Hornung, Alexander Roßnagel:
An ID card for the Internet - The new German ID card with "electronic proof of identity". 151-157 - Evelyne Beatrix Cleff:
Effective approaches to regulate mobile advertising: Moving towards a coordinated legal, self-regulatory and technical response. 158-169 - Mark Turner, Ruth Wilson:
Smart and integrated ticketing in the UK: Piecing together the jigsaw. 170-177 - Marcus Turle:
Shared services: An outline of key contractual issues. 178-184 - Warren B. Chik:
'Customary internet-ional law': Creating a body of customary law for cyberspace. Part 2: Applying custom as law to the Internet infrastructure. 185-202 - Ian Walden:
Mine host is searching for a 'neutrality' principle! 203-209 - Kah Leng Ter:
Internet domain name disputes: From the Singapore perspective. 210-218
- Corien Prins:
The online dimension of recognised victims' rights. 219-221
- Richard Cumbley:
British Gas v Accenture: Round one. 222-226
- Helen Kemmitt, Karen Roberts, Benjamin Slinn, Marianna Rybynok:
Baker & McKenzie's annual review of developments in EU law relating to IP, IT & telecommunications. 227-236 - Mark Turner:
European national news. 237-242
- Gabriela Kennedy, Sarah Doyle:
Asia-Pacific news. 243-248
Volume 26, Number 3, May 2010
- Steve Saxby:
Editor's foreword. 249-250
- Xiaolu Zhang:
Charging children with child pornography - Using the legal system to handle the problem of "sexting". 251-259 - Yaman Akdeniz:
To block or not to block: European approaches to content regulation, and implications for freedom of expression. 260-272 - Liam Curren, Jane Kaye:
Revoking consent: A 'blind spot' in data protection law? 273-283 - Hong Xue:
Privacy and personal data protection in China: An update for the year end 2009. 284-289 - Sophie Stalla-Bourdillon:
Chilling ISPs... when private regulators act without adequate public framework... 290-297 - Kenneth Geers:
The challenge of cyber attack deterrence. 298-303 - Mark Taylor, John Haggerty, David Gresty, Robert Hegarty:
Digital evidence in cloud computing systems. 304-308 - Richard Kemp:
Open source software (OSS) governance in the organisation. 309-316
- Helen Rose:
Case comment: BSkyB v. EDS [2010] EWHC 86 (TCC) case no: HT-06-311 26.01.2010. 317-319
- Helen Kemmitt, Michael Dizon, Peter O'Byrne, Alex Clayton, Sarah Philpott:
EU update. 320-325 - Mark Turner:
European national news. 326-330
- Gabriela Kennedy, Sarah Doyle:
Asia-Pacific news. 331-340
Volume 26, Number 4, July 2010
- Steve Saxby:
Editor's foreword. 341-342
- David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul de Hert, Kush Wadhwa, Didier Bigo:
Sorting out smart surveillance. 343-354 - Yue Liu:
Privacy regulations on biometrics in Australia. 355-367 - Paul de Hert, Vagelis Papakonstantinou:
The EU PNR framework decision proposal: Towards completion of the PNR processing scene in Europe. 368-376 - Fanny Coudert:
When video cameras watch and screen: Privacy implications of pattern recognition technologies. 377-384 - Christophe Geuens, Jos Dumortier:
Mandatory implementation for in-vehicle eCall: Privacy compatible? 385-390 - Dan Svantesson, Roger Clarke:
Privacy and consumer risks in cloud computing. 391-397 - Delphine Goens:
The exploitation of Business Register data from a public sector information and data protection perspective: A case study. 398-405 - Guan Hong Tang:
Is administrative enforcement the answer? Copyright protection in the digital era. 406-417 - Jay Forder:
The inadequate legislative response to e-signatures. 418-426 - Roksana Moore:
Principles of the law of software contracts - The way forward? 427-431
- Helen Kemmitt, Michael Dizon, Karen Roberts, Liz Grimwood-Taylor, Peter O'Byrne, Paul Rawlinson:
EU update. 432-436 - Mark Turner:
European national news. 437-442
- Gabriela Kennedy, Sarah Doyle:
Asia-Pacific news. 443-451
Volume 26, Number 5, September 2010
- Steve Saxby:
Editor's foreword. 453-454
- Nancy J. King, Pernille W. Jessen:
Profiling the mobile customer - Privacy concerns when behavioural advertisers target mobile phones - Part I. 455-478 - Graham Greenleaf:
India's national ID system: Danger grows in a privacy vacuum. 479-491 - Sophie Stalla-Bourdillon:
The flip side of ISP's liability regimes: The ambiguous protection of fundamental rights and liberties in private digital spaces. 492-501 - Patrick Kierkegaard, Angela Adrian:
Wikitopia: Balancing intellectual property rights within open source research databases. 502-519 - Mark Burdon, Jason Reid, Rouhshi Low:
Encryption safe harbours and data breach notification laws. 520-534 - Patrick Van Eecke, Maarten Truyens:
Privacy and social networks. 535-546 - Kenneth Geers:
Cyber Weapons Convention. 547-551
- Helen Kemmitt, Michael Dizon, Karen Roberts, Alex Clayton, Elizabeth Grimwood-Taylor:
EU update. 552-557 - Mark Turner:
European national news. 558-563
- Gabriela Kennedy:
Asia-Pacific news. 564-571
- Ian J. Lloyd:
Communications Law Handbook. 572
- Retraction notice to "Google's use of Rescuecom's trademark as an advertising keyword and the U.S. federal trademarks Act" (Computer Law and Security Review - The International Journal of Technology Law and Practice [2010] 26 CLSR 77-89). 573
Volume 26, Number 6, November 2010
- Steve Saxby:
Editor's foreword. 575-576
- Sylvia Kierkegaard:
Twitter thou doeth? 577-594 - Nancy J. King, Pernille Wegener Jessen:
Profiling the mobile customer - Is industry self-regulation adequate to protect consumer privacy when behavioural advertisers target mobile phones? - Part II. 595-612 - Richard Jones, Dalal Tahri:
EU law requirements to provide information to website visitors. 613-620 - Mark Perry, Thomas Margoni:
From music tracks to Google maps: Who owns computer-generated works? 621-629 - Kayleen Manwaring:
Network neutrality: Issues for Australia. 630-639 - Angela Adrian:
Beyond griefing: Virtual crime. 640-648 - Julia Hörnle:
How to control interception-does the UK strike the right balance? 649-654
- Helen Kemmitt, Michael Dizon, Karen Roberts, Bianca Chouls:
EU update. 655-658 - Mark Turner:
European national news. 659-664
- Gabriela Kennedy:
Asia-Pacific news. 665-672
- T. J. McIntyre:
Reinventing data protection? 673-676
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.