Search dblp for Publications

export results for "toc:db/journals/ijlit/ijlit16.bht:"

 download as .bib file

@article{DBLP:journals/ijlit/Chang08,
  author       = {Yu{-}Lin Chang},
  title        = {Looking for zero-sum or win-win outcomes: {A} game-theoretical analysis
                  of the fair use debate},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {176--204},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/eam009},
  doi          = {10.1093/IJLIT/EAM009},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Chang08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Chik08,
  author       = {Warren B. Chik},
  title        = {Lord of Your Domain, But Master of None: The Need to Harmonize and
                  Recalibrate the Domain Name Regime of Ownership and Control},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {8--72},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/eam005},
  doi          = {10.1093/IJLIT/EAM005},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Chik08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/CradduckM08,
  author       = {Lucy Cradduck and
                  Adrian McCullagh},
  title        = {Identifying the Identity Thief: Is it time for a (smart) Australia
                  Card?},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {125--158},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/eam008},
  doi          = {10.1093/IJLIT/EAM008},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/CradduckM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Gadzheva08,
  author       = {Maya Gadzheva},
  title        = {Legal Issues in Wireless Building Automation: an {EU} Perspective},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {2},
  pages        = {159--175},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/ean001},
  doi          = {10.1093/IJLIT/EAN001},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Gadzheva08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Gillies08,
  author       = {Lorna E. Gillies},
  title        = {Addressing the "Cyberspace Fallacy": Targeting the Jurisdiction of
                  an Electronic Consumer Contract},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {242--269},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/ean002},
  doi          = {10.1093/IJLIT/EAN002},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Gillies08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/KaramouzisH08,
  author       = {Stamos T. Karamouzis and
                  Dee Wood Harper},
  title        = {An Artificial Intelligence System Suggests Arbitrariness of Death
                  Penalty},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {1--7},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/eam006},
  doi          = {10.1093/IJLIT/EAM006},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/KaramouzisH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/McNamaraC08,
  author       = {Judith McNamara and
                  Lucy Cradduck},
  title        = {Can We Protect How We Do What We Do? {A} Consideration of Business
                  Method Patents in Australia and Europe},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {96--124},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/eam010},
  doi          = {10.1093/IJLIT/EAM010},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/McNamaraC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Ntouvas08,
  author       = {Ioannis Ntouvas},
  title        = {Air Passenger Data Transfer to the {USA:} the Decision of the {ECJ}
                  and latest developments},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {1},
  pages        = {73--95},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/eam003},
  doi          = {10.1093/IJLIT/EAM003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Ntouvas08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Quirk08,
  author       = {Patrick Quirk},
  title        = {Curriculum Themes: Teaching Global Cyberlaw},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {297--308},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/ean006},
  doi          = {10.1093/IJLIT/EAN006},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Quirk08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/RobertMVLJKKDPBQ08,
  author       = {Romain Robert and
                  Mark Manulis and
                  Florence De Villenfagne and
                  Damien Leroy and
                  Julien Jost and
                  Fran{\c{c}}ois Koeune and
                  Caroline Ker and
                  Jean{-}Marc Dinant and
                  Yves Poullet and
                  Olivier Bonaventure and
                  Jean{-}Jacques Quisquater},
  title        = {WiFi Roaming: Legal Implications and Security Constraints},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {205--241},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/ean016},
  doi          = {10.1093/IJLIT/EAN016},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/RobertMVLJKKDPBQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijlit/Vincents08,
  author       = {Okechukwu Benjamin Vincents},
  title        = {When Rights Clash Online: The Tracking of P2p Copyright Infringements
                  Vs. the {EC} Personal Data Directive},
  journal      = {Int. J. Law Inf. Technol.},
  volume       = {16},
  number       = {3},
  pages        = {270--296},
  year         = {2008},
  url          = {https://doi.org/10.1093/ijlit/eam007},
  doi          = {10.1093/IJLIT/EAM007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijlit/Vincents08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}