default search action
European Journal of Law and Technology, Volume 13
Volume 13, Number 1, 2022
- Liam Sunner:
The Marrakesh VIP Treaty, Accessibility, and (E)U. - Hiroko Onishi:
"I am internet famous!": Protecting a new form of 'celebri-ties' in the law of passing off. - Ruth Flaherty:
Fair Dealing in a Fandemic: How Pastiche can be used to Clarify the Position of User-Generated Content. - Nkem Itanyi:
The Concept of Piracy in the Film Industry in Nigeria: Taking a Cue from Other Countries. - Nynke E. Vellinga, Gerard Jan Ritsema van Eck:
The New Car Safety Rules of the GSR in light of the GDPR: An Unnecessarily Tangled Web. - Rachel Allsopp, Abbe Brown, Paul Maharg:
Editorial: BILETA 2021 Special Issue. - Ethan Shattock:
Fake News in Strasbourg: Electoral Disinformation and Freedom of Expression in the European Court of Human Rights (ECtHR). - Marion Oswald:
A three-pillar approach to achieving trustworthy and accountable use of AI and emerging technology in policing in England and Wales: Lessons from the West Midlands data ethics model. - Sandra Schmitz:
Every Student Can Learn, Just not on the Same Day: An Analysis of Data Protection and Cybersecurity Challenges for E-Learning Platforms in the COVID19 Crisis. - Fernando Barrio:
Legal and Pedagogical Issues with Online Exam Proctoring.
Volume 13, Number 2, 2022
- Gianclaudio Malgieri, Gloria González Fuster:
The vulnerable data subject: A gendered data subject? - Claire Bessant:
Children, Public Sector Data-Driven Decision-Making and Article 12 UNCRC. - Bernd Justin Jütte, Guido Noto La Diega, Giulia Priora, Guido Salza:
Zooming in on Education: An Empirical Study on Digital Platforms and Copyright in the United Kingdom, Italy, and the Netherlands. - Daniel Davenport:
Book Review: European Data Protection Regulation, Journalism, and Traditional Publishers. - Abhilash Nair:
Children, vulnerable gender, and zooming: a closer look at tech law.
Volume 13, Number 3, 2022
- Stanislaw Piasecki, Jiahong Chen, Derek McAuley:
Putting the Right P in PIMS: Normative Challenges for Protecting Vulnerable People's Data through Personal Information Management Systems. - Frida Alizadeh Westerling:
Technology-related Risks to the Right to Asylum: Epistemic Vulnerability Production in Automated Credibility Assessment. - Sterre den Breeijen, Gijs van Dijck, Tobias Jonkers, Rieks Joosten, Katja Zimmermann:
Self-Sovereign Identity and Guardianship in Practice. - Paul Maharg, Angela Yenssen:
Transitioning Simulated Client Interviews from Face-to-Face to Online: Still an Entrustable Professional Activity? - Kees van Noortwijk, Richard V. de Mulder:
The Coming of Age of Legal Technology: What will be needed to take Legal Tech to a new level? - Abhilash Nair:
Technology and Regulatory Disconnect.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.