default search action
Computer Law & Security Review, Volume 46
Volume 46, September 2022
- Paulius Jurcys, Marcelo Corrales Compagnucci, Mark Fenwick:
The future of international data transfers: Managing legal risk with a 'user-held' data model. 105691
- Wachara Fungwacharakorn, Ken Satoh:
Toward a practical legal rule revision in legal debugging. 105696
- Zihao Li:
Affinity-based algorithmic pricing: A dilemma for EU data protection law. 105705 - Ot van Daalen:
In defense of offense: information security research under the right to science. 105706
- Kyle J. McKibbin, Mahsa Shabani:
Building a better mobile app marketplace: A legal and governance toolkit for app mediated genomics research. 105707
- Beata Mäihäniemi:
The role of behavioural economics in shaping remedies for facebook's excessive data gathering. 105709 - Massimiliano Vatiero:
Smart contracts vs incomplete contracts: A transaction cost economics viewpoint. 105710
- Geoff Gordon, Bernhard Rieder, Giovanni Sileno:
On mapping values in AI Governance. 105712
- Zhaoxia Deng, Jyh-An Lee:
Legalization of live game streaming through statutory licence in China. 105714 - Bart van der Sloot, Yvette Wagensveld:
Deepfakes: regulatory challenges for the synthetic society. 105716
- Maria José Schmidt-Kessen, Helen Eenmaa, Maya Mitre:
Machines that make and keep promises - Lessons for contract automation from algorithmic trading on financial markets. 105717
- Migle Laukyte:
Averting enfeeblement and fostering empowerment: Algorithmic rights and the right to good administration. 105718 - David Oliver Erdos:
Identification in personal data: Authenticating the meaning and reach of another broad concept in EU data protection law. 105721 - Max von Grafenstein, Timo Jakobi, Gunnar Stevens:
Effective data protection by design through interdisciplinary research methods: The example of effective purpose specification by applying user-Centred UX-design methods. 105722 - Radina Stoykova, Rune Nordvik, Munnazzar Ahmed, Katrin Franke, Stefan Axelsson, Fergus Toolan:
Legal and technical questions of file system reverse engineering. 105725 - Harriet Farlow, Belinda M. Edwards:
Shining a light on 'going dark': A framework to guide the co-design and communication of decryption laws based on the passage of the Telecommunications and Other Legislation (Assistance and Access) Bill 2018. 105726 - Bart Custers, Anne-Sophie Heijne:
The right of access in automated decision-making: The scope of article 15(1)(h) GDPR in theory and practice. 105727 - F. G. Wilman:
Two emerging principles of EU internet law: A comparative analysis of the prohibitions of general data retention and general monitoring obligations. 105728 - Wenjie Ding, Li Chen:
Regulating the use of big data: Justifications, perspectives and the Chinese way forward. 105729
- Ana Maria Corrêa:
Regulating targeted advertising: Addressing discrimination with transparency, fairness, and auditing tests remedies. 105732 - Oles Andriychuk:
Shifting the digital paradigm: Towards a sui generis competition policy. 105733
- Kimia Heidary, Bart Custers, Helen Pluut, Jean-Pierre van der Rest:
A qualitative investigation of company perspectives on online price discrimination. 105734 - Berna Akcali Gur:
Cybersecurity, European digital sovereignty and the 5G rollout crisis. 105736 - Corinne Tan:
The curious case of regulating false news on Google. 105738
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.