default search action
Search dblp for Publications
export results for "toc:db/journals/ijlit/ijlit16.bht:"
@article{DBLP:journals/ijlit/Chang08, author = {Yu{-}Lin Chang}, title = {Looking for zero-sum or win-win outcomes: {A} game-theoretical analysis of the fair use debate}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {2}, pages = {176--204}, year = {2008}, url = {https://doi.org/10.1093/ijlit/eam009}, doi = {10.1093/IJLIT/EAM009}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Chang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Chik08, author = {Warren B. Chik}, title = {Lord of Your Domain, But Master of None: The Need to Harmonize and Recalibrate the Domain Name Regime of Ownership and Control}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {1}, pages = {8--72}, year = {2008}, url = {https://doi.org/10.1093/ijlit/eam005}, doi = {10.1093/IJLIT/EAM005}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Chik08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/CradduckM08, author = {Lucy Cradduck and Adrian McCullagh}, title = {Identifying the Identity Thief: Is it time for a (smart) Australia Card?}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {2}, pages = {125--158}, year = {2008}, url = {https://doi.org/10.1093/ijlit/eam008}, doi = {10.1093/IJLIT/EAM008}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/CradduckM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Gadzheva08, author = {Maya Gadzheva}, title = {Legal Issues in Wireless Building Automation: an {EU} Perspective}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {2}, pages = {159--175}, year = {2008}, url = {https://doi.org/10.1093/ijlit/ean001}, doi = {10.1093/IJLIT/EAN001}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Gadzheva08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Gillies08, author = {Lorna E. Gillies}, title = {Addressing the "Cyberspace Fallacy": Targeting the Jurisdiction of an Electronic Consumer Contract}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {3}, pages = {242--269}, year = {2008}, url = {https://doi.org/10.1093/ijlit/ean002}, doi = {10.1093/IJLIT/EAN002}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Gillies08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/KaramouzisH08, author = {Stamos T. Karamouzis and Dee Wood Harper}, title = {An Artificial Intelligence System Suggests Arbitrariness of Death Penalty}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {1}, pages = {1--7}, year = {2008}, url = {https://doi.org/10.1093/ijlit/eam006}, doi = {10.1093/IJLIT/EAM006}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/KaramouzisH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/McNamaraC08, author = {Judith McNamara and Lucy Cradduck}, title = {Can We Protect How We Do What We Do? {A} Consideration of Business Method Patents in Australia and Europe}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {1}, pages = {96--124}, year = {2008}, url = {https://doi.org/10.1093/ijlit/eam010}, doi = {10.1093/IJLIT/EAM010}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/McNamaraC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Ntouvas08, author = {Ioannis Ntouvas}, title = {Air Passenger Data Transfer to the {USA:} the Decision of the {ECJ} and latest developments}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {1}, pages = {73--95}, year = {2008}, url = {https://doi.org/10.1093/ijlit/eam003}, doi = {10.1093/IJLIT/EAM003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Ntouvas08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Quirk08, author = {Patrick Quirk}, title = {Curriculum Themes: Teaching Global Cyberlaw}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {3}, pages = {297--308}, year = {2008}, url = {https://doi.org/10.1093/ijlit/ean006}, doi = {10.1093/IJLIT/EAN006}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Quirk08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/RobertMVLJKKDPBQ08, author = {Romain Robert and Mark Manulis and Florence De Villenfagne and Damien Leroy and Julien Jost and Fran{\c{c}}ois Koeune and Caroline Ker and Jean{-}Marc Dinant and Yves Poullet and Olivier Bonaventure and Jean{-}Jacques Quisquater}, title = {WiFi Roaming: Legal Implications and Security Constraints}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {3}, pages = {205--241}, year = {2008}, url = {https://doi.org/10.1093/ijlit/ean016}, doi = {10.1093/IJLIT/EAN016}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/RobertMVLJKKDPBQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Vincents08, author = {Okechukwu Benjamin Vincents}, title = {When Rights Clash Online: The Tracking of P2p Copyright Infringements Vs. the {EC} Personal Data Directive}, journal = {Int. J. Law Inf. Technol.}, volume = {16}, number = {3}, pages = {270--296}, year = {2008}, url = {https://doi.org/10.1093/ijlit/eam007}, doi = {10.1093/IJLIT/EAM007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Vincents08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.