Search dblp for Publications

export results for "toc:db/journals/clsr/clsr44.bht:"

 download as .bib file

@article{DBLP:journals/clsr/BosuaCCCCCLR22,
  author       = {Rachelle Bosua and
                  Marc Cheong and
                  Karin Clark and
                  Damian Clifford and
                  Simon Coghlan and
                  Chris Culnane and
                  Kobi Leins and
                  Megan Richardson},
  title        = {Using public data to measure diversity in computer science research
                  communities: {A} critical data governance perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105655},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2022.105655},
  doi          = {10.1016/J.CLSR.2022.105655},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/BosuaCCCCCLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Custers22,
  author       = {Bart Custers},
  title        = {New digital rights: Imagining additional fundamental rights for the
                  digital era},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105636},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2021.105636},
  doi          = {10.1016/J.CLSR.2021.105636},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Custers22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davis22,
  author       = {Peter Alexander Earls Davis},
  title        = {Decrypting Australia's 'Anti-Encryption' legislation: The meaning
                  and effect of the 'systemic weakness' limitation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105659},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2022.105659},
  doi          = {10.1016/J.CLSR.2022.105659},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davis22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Erdos22,
  author       = {David Oliver Erdos},
  title        = {The {UK} and the {EU} personal data framework after Brexit: {A} new
                  trade and cooperation partnership grounded in Council of Europe Convention
                  108+?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105639},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2021.105639},
  doi          = {10.1016/J.CLSR.2021.105639},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Erdos22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/GarrettSPBD22,
  author       = {Thiago Garrett and
                  Ligia Eliana Setenareski and
                  Let{\'{\i}}cia M. Peres and
                  Luis C. E. Bona and
                  Elias P. Duarte Jr.},
  title        = {A survey of Network Neutrality regulations worldwide},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105654},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2022.105654},
  doi          = {10.1016/J.CLSR.2022.105654},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/GarrettSPBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/GeorgiadisP22,
  author       = {Georgios Georgiadis and
                  Geert Poels},
  title        = {Towards a privacy impact assessment methodology to support the requirements
                  of the general data protection regulation in a big data analytics
                  context: {A} systematic literature review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105640},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2021.105640},
  doi          = {10.1016/J.CLSR.2021.105640},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/GeorgiadisP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/GreenleafC22,
  author       = {Graham Greenleaf and
                  Bertil Cottier},
  title        = {International and regional commitments in African data privacy laws:
                  {A} comparative analysis},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105638},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2021.105638},
  doi          = {10.1016/J.CLSR.2021.105638},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/GreenleafC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HoffmannVHZ22,
  author       = {Hanna Hoffmann and
                  Verena Vogt and
                  Marc P. Hauer and
                  Katharina Anna Zweig},
  title        = {Fairness by awareness? On the inclusion of protected features in algorithmic
                  decisions},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105658},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2022.105658},
  doi          = {10.1016/J.CLSR.2022.105658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HoffmannVHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/LudvigsenN22,
  author       = {Kaspar Rosager Ludvigsen and
                  Shishir Nagaraja},
  title        = {Dissecting liabilities in adversarial surgical robot failures: {A}
                  national (Danish) and {EU} law perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105656},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2022.105656},
  doi          = {10.1016/J.CLSR.2022.105656},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/LudvigsenN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Papakonstantinou22,
  author       = {Vagelis Papakonstantinou},
  title        = {Cybersecurity as \emph{praxis} and as a \emph{state}: The {EU} law
                  path towards acknowledgement of a new right to cybersecurity?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105653},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2022.105653},
  doi          = {10.1016/J.CLSR.2022.105653},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Papakonstantinou22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/StuurmanL22,
  author       = {Kees Stuurman and
                  Eric Lachaud},
  title        = {Regulating {AI.} {A} label to complete the proposed Act on Artificial
                  Intelligence},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {44},
  pages        = {105657},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.clsr.2022.105657},
  doi          = {10.1016/J.CLSR.2022.105657},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/StuurmanL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}