![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computer Law & Security Review, Volume 46
Volume 46, September 2022
- Paulius Jurcys
, Marcelo Corrales Compagnucci
, Mark Fenwick:
The future of international data transfers: Managing legal risk with a 'user-held' data model. 105691
- Wachara Fungwacharakorn
, Ken Satoh:
Toward a practical legal rule revision in legal debugging. 105696
- Zihao Li
:
Affinity-based algorithmic pricing: A dilemma for EU data protection law. 105705 - Ot van Daalen:
In defense of offense: information security research under the right to science. 105706
- Kyle J. McKibbin
, Mahsa Shabani:
Building a better mobile app marketplace: A legal and governance toolkit for app mediated genomics research. 105707
- Beata Mäihäniemi
:
The role of behavioural economics in shaping remedies for facebook's excessive data gathering. 105709 - Massimiliano Vatiero
:
Smart contracts vs incomplete contracts: A transaction cost economics viewpoint. 105710
- Geoff Gordon
, Bernhard Rieder
, Giovanni Sileno
:
On mapping values in AI Governance. 105712
- Zhaoxia Deng
, Jyh-An Lee
:
Legalization of live game streaming through statutory licence in China. 105714 - Bart van der Sloot, Yvette Wagensveld:
Deepfakes: regulatory challenges for the synthetic society. 105716
- Maria José Schmidt-Kessen
, Helen Eenmaa
, Maya Mitre:
Machines that make and keep promises - Lessons for contract automation from algorithmic trading on financial markets. 105717
- Migle Laukyte
:
Averting enfeeblement and fostering empowerment: Algorithmic rights and the right to good administration. 105718 - David Oliver Erdos
:
Identification in personal data: Authenticating the meaning and reach of another broad concept in EU data protection law. 105721 - Max von Grafenstein
, Timo Jakobi, Gunnar Stevens:
Effective data protection by design through interdisciplinary research methods: The example of effective purpose specification by applying user-Centred UX-design methods. 105722 - Radina Stoykova
, Rune Nordvik, Munnazzar Ahmed, Katrin Franke, Stefan Axelsson
, Fergus Toolan
:
Legal and technical questions of file system reverse engineering. 105725 - Harriet Farlow
, Belinda M. Edwards:
Shining a light on 'going dark': A framework to guide the co-design and communication of decryption laws based on the passage of the Telecommunications and Other Legislation (Assistance and Access) Bill 2018. 105726 - Bart Custers
, Anne-Sophie Heijne:
The right of access in automated decision-making: The scope of article 15(1)(h) GDPR in theory and practice. 105727 - F. G. Wilman:
Two emerging principles of EU internet law: A comparative analysis of the prohibitions of general data retention and general monitoring obligations. 105728 - Wenjie Ding, Li Chen:
Regulating the use of big data: Justifications, perspectives and the Chinese way forward. 105729
- Ana Maria Corrêa
:
Regulating targeted advertising: Addressing discrimination with transparency, fairness, and auditing tests remedies. 105732 - Oles Andriychuk
:
Shifting the digital paradigm: Towards a sui generis competition policy. 105733
- Kimia Heidary
, Bart Custers
, Helen Pluut, Jean-Pierre van der Rest:
A qualitative investigation of company perspectives on online price discrimination. 105734 - Berna Akcali Gur
:
Cybersecurity, European digital sovereignty and the 5G rollout crisis. 105736 - Corinne Tan
:
The curious case of regulating false news on Google. 105738
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.