Search dblp for Publications

export results for "toc:db/journals/clsr/clsr53.bht:"

 download as .bib file

@article{DBLP:journals/clsr/ArnerZBK24,
  author       = {Douglas W. Arner and
                  Dirk A Zetzsche and
                  Ross P. Buckley and
                  Jamieson M. Kirkwood},
  title        = {The financialisation of Crypto: Designing an international regulatory
                  consensus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105970},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105970},
  doi          = {10.1016/J.CLSR.2024.105970},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/ArnerZBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Boggini24,
  author       = {Clara Boggini},
  title        = {Reporting cybersecurity to stakeholders: {A} review of {CSRD} and
                  the {EU} cyber legal framework},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105987},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105987},
  doi          = {10.1016/J.CLSR.2024.105987},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Boggini24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/BorgognoPC24,
  author       = {Oscar Borgogno and
                  Cristina Poncib{\`{o}} and
                  Giuseppe Colangelo},
  title        = {Editorial to the special issue on financial technology and the law:
                  {A} reality check},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105983},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105983},
  doi          = {10.1016/J.CLSR.2024.105983},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/BorgognoPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Calvi24,
  author       = {Alessandra Calvi},
  title        = {Data Protection Impact Assessment under the {EU} General Data Protection
                  Regulation: {A} feminist reflection},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105950},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105950},
  doi          = {10.1016/J.CLSR.2024.105950},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Calvi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Casarosa24,
  author       = {Federica Casarosa},
  title        = {Cybersecurity of Internet of Things in the health sector: Understanding
                  the applicable legal framework},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105982},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105982},
  doi          = {10.1016/J.CLSR.2024.105982},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Casarosa24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Chelioudakis24,
  author       = {Eleftherios Chelioudakis},
  title        = {Unpacking AI-enabled border management technologies in Greece: To
                  what extent their development and deployment are transparent and respect
                  data protection rules?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105967},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105967},
  doi          = {10.1016/J.CLSR.2024.105967},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Chelioudakis24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Chiara24,
  author       = {Pier Giorgio Chiara},
  title        = {Towards a right to cybersecurity in {EU} law? The challenges ahead},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105961},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105961},
  doi          = {10.1016/J.CLSR.2024.105961},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Chiara24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Christensen24,
  author       = {Tanja Kammersgaard Christensen},
  title        = {Pre-installed cameras in vehicles - New technology from a data protection
                  law perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105980},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105980},
  doi          = {10.1016/J.CLSR.2024.105980},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Christensen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/FedelePT24,
  author       = {Andrea Fedele and
                  Clara Punzi and
                  Stefano Tramacere},
  title        = {The {ALTAI} checklist as a tool to assess ethical and legal implications
                  for a trustworthy {AI} development in education},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105986},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105986},
  doi          = {10.1016/J.CLSR.2024.105986},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/FedelePT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Fernandez24,
  author       = {Ra{\"{u}}l Ramos Fern{\'{a}}ndez},
  title        = {Evaluation of trust service and software product regimes for zero-knowledge
                  proof development under eIDAS 2.0},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105968},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105968},
  doi          = {10.1016/J.CLSR.2024.105968},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Fernandez24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Gandhi24,
  author       = {Shrutika Gandhi},
  title        = {Frontex as a hub for surveillance and data sharing: Challenges for
                  data protection and privacy rights},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105963},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105963},
  doi          = {10.1016/J.CLSR.2024.105963},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Gandhi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Haataja24,
  author       = {Samuli Haataja},
  title        = {Cyber operations and automatic hack backs under international law
                  on necessity},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105992},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105992},
  doi          = {10.1016/J.CLSR.2024.105992},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Haataja24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Jacobs24,
  author       = {Bart Jacobs},
  title        = {The authenticity crisis},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105962},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105962},
  doi          = {10.1016/J.CLSR.2024.105962},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Jacobs24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kennedy24a,
  author       = {Gabriela Kennedy},
  title        = {Asia-Pacific developments},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105991},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105991},
  doi          = {10.1016/J.CLSR.2024.105991},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kennedy24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/LauxWM24,
  author       = {Johann Laux and
                  Sandra Wachter and
                  Brent D. Mittelstadt},
  title        = {Three pathways for standardisation and ethical disclosure by default
                  under the European Union Artificial Intelligence Act},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105957},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105957},
  doi          = {10.1016/J.CLSR.2024.105957},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/LauxWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Migliorini24,
  author       = {Sara Migliorini},
  title        = {China's Interim Measures on generative {AI:} Origin, content and significance},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105985},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105985},
  doi          = {10.1016/J.CLSR.2024.105985},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Migliorini24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MontagnaniND24,
  author       = {Maria Lill{\`{a}} Montagnani and
                  Marie{-}Claire Najjar and
                  Antonio Davola},
  title        = {The {EU} Regulatory approach(es) to {AI} liability, and its Application
                  to the financial services market},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105984},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105984},
  doi          = {10.1016/J.CLSR.2024.105984},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/MontagnaniND24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Pantlin24b,
  author       = {Nick Pantlin},
  title        = {European National News},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105998},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105998},
  doi          = {10.1016/J.CLSR.2024.105998},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Pantlin24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Pisani24,
  author       = {Giacomo Pisani},
  title        = {The right to self-determination in the digital platform economy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105964},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105964},
  doi          = {10.1016/J.CLSR.2024.105964},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Pisani24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/RigottiF24,
  author       = {Carlotta Rigotti and
                  Eduard Fosch{-}Villaronga},
  title        = {Fairness, {AI} {\&} recruitment},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105966},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105966},
  doi          = {10.1016/J.CLSR.2024.105966},
  timestamp    = {Tue, 02 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/RigottiF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Shen24,
  author       = {Taixia Shen},
  title        = {Right to learn in the digital age: Challenges and protection in China},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105989},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105989},
  doi          = {10.1016/J.CLSR.2024.105989},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Shen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Teo24,
  author       = {Sue Anne Teo},
  title        = {How to think about freedom of thought (and opinion) in the age of
                  {AI}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105969},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105969},
  doi          = {10.1016/J.CLSR.2024.105969},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Teo24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/VostoupalSHKLM24,
  author       = {Jakub Vostoupal and
                  V{\'{a}}clav Stupka and
                  Jakub Harasta and
                  Frantisek Kasl and
                  Pavel Loutock{\'{y}} and
                  Kamil Malinka},
  title        = {The legal aspects of cybersecurity vulnerability disclosure: To the
                  {NIS} 2 and beyond},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105988},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105988},
  doi          = {10.1016/J.CLSR.2024.105988},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/VostoupalSHKLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wang24a,
  author       = {Yan Wang},
  title        = {Do not go gentle into that good night: The European Union's and China's
                  different approaches to the extraterritorial application of artificial
                  intelligence laws and regulations},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105965},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105965},
  doi          = {10.1016/J.CLSR.2024.105965},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wang24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wei24,
  author       = {Xingxing Wei},
  title        = {Rule of law or not? {A} critical evaluation of legal responses to
                  cyberterrorism in the {UK}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105951},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105951},
  doi          = {10.1016/J.CLSR.2024.105951},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wei24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/ZhengS24,
  author       = {Guan Zheng and
                  Jinchun Shu},
  title        = {In the name of protection - {A} critical analysis of China's legal
                  framework of children's personal information protection in the digital
                  era},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {53},
  pages        = {105979},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.clsr.2024.105979},
  doi          = {10.1016/J.CLSR.2024.105979},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/ZhengS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}