default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr53.bht:"
@article{DBLP:journals/clsr/ArnerZBK24, author = {Douglas W. Arner and Dirk A Zetzsche and Ross P. Buckley and Jamieson M. Kirkwood}, title = {The financialisation of Crypto: Designing an international regulatory consensus}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105970}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105970}, doi = {10.1016/J.CLSR.2024.105970}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/ArnerZBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Boggini24, author = {Clara Boggini}, title = {Reporting cybersecurity to stakeholders: {A} review of {CSRD} and the {EU} cyber legal framework}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105987}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105987}, doi = {10.1016/J.CLSR.2024.105987}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Boggini24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/BorgognoPC24, author = {Oscar Borgogno and Cristina Poncib{\`{o}} and Giuseppe Colangelo}, title = {Editorial to the special issue on financial technology and the law: {A} reality check}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105983}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105983}, doi = {10.1016/J.CLSR.2024.105983}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/BorgognoPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Calvi24, author = {Alessandra Calvi}, title = {Data Protection Impact Assessment under the {EU} General Data Protection Regulation: {A} feminist reflection}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105950}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105950}, doi = {10.1016/J.CLSR.2024.105950}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Calvi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Casarosa24, author = {Federica Casarosa}, title = {Cybersecurity of Internet of Things in the health sector: Understanding the applicable legal framework}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105982}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105982}, doi = {10.1016/J.CLSR.2024.105982}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Casarosa24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Chelioudakis24, author = {Eleftherios Chelioudakis}, title = {Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105967}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105967}, doi = {10.1016/J.CLSR.2024.105967}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Chelioudakis24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Chiara24, author = {Pier Giorgio Chiara}, title = {Towards a right to cybersecurity in {EU} law? The challenges ahead}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105961}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105961}, doi = {10.1016/J.CLSR.2024.105961}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Chiara24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Christensen24, author = {Tanja Kammersgaard Christensen}, title = {Pre-installed cameras in vehicles - New technology from a data protection law perspective}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105980}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105980}, doi = {10.1016/J.CLSR.2024.105980}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Christensen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/FedelePT24, author = {Andrea Fedele and Clara Punzi and Stefano Tramacere}, title = {The {ALTAI} checklist as a tool to assess ethical and legal implications for a trustworthy {AI} development in education}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105986}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105986}, doi = {10.1016/J.CLSR.2024.105986}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/FedelePT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Fernandez24, author = {Ra{\"{u}}l Ramos Fern{\'{a}}ndez}, title = {Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.0}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105968}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105968}, doi = {10.1016/J.CLSR.2024.105968}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Fernandez24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Gandhi24, author = {Shrutika Gandhi}, title = {Frontex as a hub for surveillance and data sharing: Challenges for data protection and privacy rights}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105963}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105963}, doi = {10.1016/J.CLSR.2024.105963}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Gandhi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Haataja24, author = {Samuli Haataja}, title = {Cyber operations and automatic hack backs under international law on necessity}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105992}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105992}, doi = {10.1016/J.CLSR.2024.105992}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Haataja24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Jacobs24, author = {Bart Jacobs}, title = {The authenticity crisis}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105962}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105962}, doi = {10.1016/J.CLSR.2024.105962}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Jacobs24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kennedy24a, author = {Gabriela Kennedy}, title = {Asia-Pacific developments}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105991}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105991}, doi = {10.1016/J.CLSR.2024.105991}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kennedy24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/LauxWM24, author = {Johann Laux and Sandra Wachter and Brent D. Mittelstadt}, title = {Three pathways for standardisation and ethical disclosure by default under the European Union Artificial Intelligence Act}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105957}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105957}, doi = {10.1016/J.CLSR.2024.105957}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/LauxWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Migliorini24, author = {Sara Migliorini}, title = {China's Interim Measures on generative {AI:} Origin, content and significance}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105985}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105985}, doi = {10.1016/J.CLSR.2024.105985}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Migliorini24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MontagnaniND24, author = {Maria Lill{\`{a}} Montagnani and Marie{-}Claire Najjar and Antonio Davola}, title = {The {EU} Regulatory approach(es) to {AI} liability, and its Application to the financial services market}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105984}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105984}, doi = {10.1016/J.CLSR.2024.105984}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/MontagnaniND24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Pantlin24b, author = {Nick Pantlin}, title = {European National News}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105998}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105998}, doi = {10.1016/J.CLSR.2024.105998}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Pantlin24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Pisani24, author = {Giacomo Pisani}, title = {The right to self-determination in the digital platform economy}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105964}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105964}, doi = {10.1016/J.CLSR.2024.105964}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Pisani24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/RigottiF24, author = {Carlotta Rigotti and Eduard Fosch{-}Villaronga}, title = {Fairness, {AI} {\&} recruitment}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105966}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105966}, doi = {10.1016/J.CLSR.2024.105966}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/RigottiF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Shen24, author = {Taixia Shen}, title = {Right to learn in the digital age: Challenges and protection in China}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105989}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105989}, doi = {10.1016/J.CLSR.2024.105989}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Shen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Teo24, author = {Sue Anne Teo}, title = {How to think about freedom of thought (and opinion) in the age of {AI}}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105969}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105969}, doi = {10.1016/J.CLSR.2024.105969}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Teo24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/VostoupalSHKLM24, author = {Jakub Vostoupal and V{\'{a}}clav Stupka and Jakub Harasta and Frantisek Kasl and Pavel Loutock{\'{y}} and Kamil Malinka}, title = {The legal aspects of cybersecurity vulnerability disclosure: To the {NIS} 2 and beyond}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105988}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105988}, doi = {10.1016/J.CLSR.2024.105988}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/VostoupalSHKLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wang24a, author = {Yan Wang}, title = {Do not go gentle into that good night: The European Union's and China's different approaches to the extraterritorial application of artificial intelligence laws and regulations}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105965}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105965}, doi = {10.1016/J.CLSR.2024.105965}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wang24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wei24, author = {Xingxing Wei}, title = {Rule of law or not? {A} critical evaluation of legal responses to cyberterrorism in the {UK}}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105951}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105951}, doi = {10.1016/J.CLSR.2024.105951}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wei24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/ZhengS24, author = {Guan Zheng and Jinchun Shu}, title = {In the name of protection - {A} critical analysis of China's legal framework of children's personal information protection in the digital era}, journal = {Comput. Law Secur. Rev.}, volume = {53}, pages = {105979}, year = {2024}, url = {https://doi.org/10.1016/j.clsr.2024.105979}, doi = {10.1016/J.CLSR.2024.105979}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/ZhengS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.