default search action
Search dblp for Publications
export results for "toc:db/journals/ijlit/ijlit20.bht:"
@article{DBLP:journals/ijlit/Barker12, author = {Kim Barker}, title = {\emph{Cyber Criminals on Trial}, by Russell {G} Smith, Peter Grabosky and Gregor Urbas}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {3}, pages = {242--245}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas010}, doi = {10.1093/IJLIT/EAS010}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Barker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Brownsword12, author = {Roger Brownsword}, title = {The shaping of our on-line worlds: getting the regulatory environment right}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {4}, pages = {249--272}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas019}, doi = {10.1093/IJLIT/EAS019}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Brownsword12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Cerrillo-i-Martinez12, author = {Agust{\'{\i}} Cerrillo{-}i{-}Mart{\'{\i}}nez}, title = {Fundamental interests and open data for re-use}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {3}, pages = {203--222}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas014}, doi = {10.1093/IJLIT/EAS014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Cerrillo-i-Martinez12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Chatterjee12, author = {Bela Chatterjee}, title = {\emph{Child Pornography: Law and Policy}, by Alisdair {A} Gillespie,}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {3}, pages = {245--248}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas011}, doi = {10.1093/IJLIT/EAS011}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Chatterjee12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/ColangeloL12, author = {Giuseppe Colangelo and Irene Lincesso}, title = {Law versus technology: looking for a solution to the orphan works' problem}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {3}, pages = {178--202}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas012}, doi = {10.1093/IJLIT/EAS012}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/ColangeloL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Easton12, author = {Catherine Easton}, title = {Revisiting the law on website accessibility in the light of the UK's Equality Act 2010 and the United Nations Convention on the Rights of Persons with Disabilities}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {1}, pages = {19--47}, year = {2012}, url = {https://doi.org/10.1093/ijlit/ear015}, doi = {10.1093/IJLIT/EAR015}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Easton12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Easton12a, author = {Catherine Easton}, title = {ICANN's core principles and the expansion of generic top-level domain names}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {4}, pages = {273--290}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas013}, doi = {10.1093/IJLIT/EAS013}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Easton12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Gillen12, author = {Martina Gillen}, title = {Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {2}, pages = {147--149}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas006}, doi = {10.1093/IJLIT/EAS006}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Gillen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Gillespie12, author = {Alisdair A. Gillespie}, title = {Jurisdictional issues concerning online child pornography}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {3}, pages = {151--177}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas007}, doi = {10.1093/IJLIT/EAS007}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Gillespie12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Hornle12, author = {Julia H{\"{o}}rnle}, title = {\emph{Making Laws for Cyberspace}, by Chris Reed}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {4}, pages = {370--382}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas008}, doi = {10.1093/IJLIT/EAS008}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Hornle12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Laidlaw12, author = {Emily B. Laidlaw}, title = {The responsibilities of free speech regulators: an analysis of the Internet Watch Foundation}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {4}, pages = {312--345}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas018}, doi = {10.1093/IJLIT/EAS018}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Laidlaw12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Leith12, author = {Philip Leith}, title = {Europe's Information Society project and digital inclusion: universal service obligations or social solidarity?}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {2}, pages = {102--123}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas004}, doi = {10.1093/IJLIT/EAS004}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Leith12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Marsoof12, author = {Althaf Marsoof}, title = {A case for \emph{sui generis} treatment of software under the {WTO} regime}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {4}, pages = {291--311}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas016}, doi = {10.1093/IJLIT/EAS016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Marsoof12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Rahman12, author = {Rizal Rahman}, title = {The legal measure against Denial of Service (DoS) attacks adopted by the United Kingdom legislature: should Malaysia follow suit?}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {2}, pages = {85--101}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas003}, doi = {10.1093/IJLIT/EAS003}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Rahman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Read12, author = {Darren Read}, title = {Net neutrality and the {EU} electronic communications regulatory framework}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {1}, pages = {48--72}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas001}, doi = {10.1093/IJLIT/EAS001}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Read12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Savirimuthu12, author = {Joseph Savirimuthu}, title = {\emph{Complex Copyright: Mapping the Information Ecosystem}, by Joseph Savirimuthu}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {4}, pages = {382--384}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas009}, doi = {10.1093/IJLIT/EAS009}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Savirimuthu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Sciaudone12, author = {Riccardo Sciaudone}, title = {Competition Law and Regulation of Technology Markets}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {1}, pages = {82--84}, year = {2012}, url = {https://doi.org/10.1093/ijlit/ear016}, doi = {10.1093/IJLIT/EAR016}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Sciaudone12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Scott12, author = {Michael D. Scott}, title = {Would a "right of reply" f ix Section 230 of the Communications Decency Act?}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {1}, pages = {73--81}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas002}, doi = {10.1093/IJLIT/EAS002}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Scott12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Sullivan12, author = {Clare Sullivan}, title = {Digital identity and mistake}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {3}, pages = {223--241}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas015}, doi = {10.1093/IJLIT/EAS015}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Sullivan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Suquet-Capdevila12, author = {Josep Suquet{-}Capdevila}, title = {Exploring online consumer mediation in Catalonia: principles and technological uses}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {2}, pages = {124--146}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas005}, doi = {10.1093/IJLIT/EAS005}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Suquet-Capdevila12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Tao12, author = {Qian Tao}, title = {The knowledge standard for the Internet Intermediary Liability in China}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {1}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1093/ijlit/ear014}, doi = {10.1093/IJLIT/EAR014}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Tao12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Themelis12, author = {Andreas Themelis}, title = {After \emph{Pierre Fabre}: the future of online distribution under competition policy}, journal = {Int. J. Law Inf. Technol.}, volume = {20}, number = {4}, pages = {346--369}, year = {2012}, url = {https://doi.org/10.1093/ijlit/eas017}, doi = {10.1093/IJLIT/EAS017}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Themelis12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.