default search action
Search dblp for Publications
export results for "toc:db/journals/ijlit/ijlit25.bht:"
@article{DBLP:journals/ijlit/Chen17, author = {Jiahong Chen}, title = {African Data Privacy Laws, Edited by Alex B. MakuliloData Protection Law in Ireland: Sources and Issues (2nd edn), by Paul Lambert}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {233--236}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax004}, doi = {10.1093/IJLIT/EAX004}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Chen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Clark17, author = {Alistair Clark}, title = {E-Voting Case Law: {A} Comparative Analysis, Edited by Ardita Driza Maurer and Jordi Barrat}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {242--244}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax005}, doi = {10.1093/IJLIT/EAX005}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Clark17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Cofone17, author = {Ignacio Cofone}, title = {The way the cookie crumbles: online tracking meets behavioural economics}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {1}, pages = {38--62}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eaw013}, doi = {10.1093/IJLIT/EAW013}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Cofone17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Cuccuru17, author = {Pierluigi Cuccuru}, title = {Beyond bitcoin: an early overview on smart contracts}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {179--195}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax003}, doi = {10.1093/IJLIT/EAX003}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Cuccuru17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Esayas17, author = {Samson Yoseph Esayas}, title = {The idea of 'emergent properties' in data privacy: towards a holistic approach}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {2}, pages = {139--178}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eaw015}, doi = {10.1093/IJLIT/EAW015}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Esayas17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Fong17, author = {Adrian Fong}, title = {The role of app intermediaries in protecting data privacy}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {2}, pages = {85--114}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax002}, doi = {10.1093/IJLIT/EAX002}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Fong17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Hoeren17, author = {Thomas Hoeren}, title = {Big data and the legal framework for data quality}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {1}, pages = {26--37}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eaw014}, doi = {10.1093/IJLIT/EAW014}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Hoeren17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Hojnik17, author = {Janja Hojnik}, title = {Technology neutral {EU} law: digital goods within the traditional goods/services distinction}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {1}, pages = {63--84}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eaw009}, doi = {10.1093/IJLIT/EAW009}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Hojnik17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Kalule17, author = {Michael Peter Kalule}, title = {Hacked: {A} Radical Approach to Hacker Culture and Crime, by Kevin F. Steinmetz}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {236--239}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax008}, doi = {10.1093/IJLIT/EAX008}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Kalule17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Keenan17, author = {Bernard Keenan}, title = {Surveillance, Privacy and Trans-Atlantic Relations, by David D. Cole, Federico Fabbrini and Stephen Schulhofer}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {245--248}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax006}, doi = {10.1093/IJLIT/EAX006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijlit/Keenan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Kuskonmaz17, author = {Elif Mendos Kuskonmaz}, title = {Data Protection on the Move: Current Developments in {ICT} and Privacy/Data Protection, Edited by Serge Gutwirth, Ronald Leenes and Paul de Hert}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {341--344}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax014}, doi = {10.1093/IJLIT/EAX014}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Kuskonmaz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/MacDonald17, author = {Michaela MacDonald}, title = {Digital Revolution: Challenges for Contract Law in Practice, Edited by Reiner Schulze and Dirk Staudenmayer}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {344--346}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax011}, doi = {10.1093/IJLIT/EAX011}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/MacDonald17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Matulionyte17, author = {Rita Matulionyte}, title = {Lending e-books in libraries: is a technologically neutral approach the solution?}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {259--282}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax016}, doi = {10.1093/IJLIT/EAX016}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijlit/Matulionyte17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/McGillivray17, author = {Kevin McGillivray}, title = {A right too far? Requiring cloud service providers to deliver adequate data security to consumers}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {1}, pages = {1--25}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eaw011}, doi = {10.1093/IJLIT/EAW011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/McGillivray17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/MontagnaniZ17, author = {Maria Lill{\`{a}} Montagnani and Laura Zoboli}, title = {The making of an 'orphan': cultural heritage digitization in the {EU}}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {196--212}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax007}, doi = {10.1093/IJLIT/EAX007}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/MontagnaniZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/OCallaghan17, author = {Patrick O'Callaghan}, title = {Enforcing Privacy: Regulatory, Legal and Technological Approaches, Edited by David Wright and Paul de Hert}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {336--338}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax013}, doi = {10.1093/IJLIT/EAX013}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/OCallaghan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/OSullivan17, author = {Kevin T. O'Sullivan}, title = {The European Union as Guardian of Internet Privacy: The Story of Article 16 TFEU, by Hielke Hijmans}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {338--341}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax015}, doi = {10.1093/IJLIT/EAX015}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/OSullivan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Post17, author = {David G. Post}, title = {How the Internet is making jurisdiction sexy (again)}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {249--258}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax019}, doi = {10.1093/IJLIT/EAX019}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Post17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Richter17, author = {Heiko Richter}, title = {Private Power, Online Information Flows and {EU} Law: Mind the Gap, by Angela Daly}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {239--241}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax009}, doi = {10.1093/IJLIT/EAX009}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Richter17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Selby17, author = {John Selby}, title = {Data localization laws: trade barriers or legitimate responses to cybersecurity risks, or both?}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {3}, pages = {213--232}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax010}, doi = {10.1093/IJLIT/EAX010}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Selby17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Sergeev17, author = {Artem Sergeev}, title = {The right to internet access: assessing the impact and the merits of compliance through an example of modern China}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {309--335}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax018}, doi = {10.1093/IJLIT/EAX018}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Sergeev17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Shaw17, author = {Saxon R. Shaw}, title = {There is no silver bullet: solutions to Internet jurisdiction}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {283--308}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax017}, doi = {10.1093/IJLIT/EAX017}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Shaw17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Yilma17, author = {Kinfe Micheal Yilma}, title = {Digital privacy and virtues of multilateral digital constitutionalism - preliminary thoughts}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {2}, pages = {115--138}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax001}, doi = {10.1093/IJLIT/EAX001}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Yilma17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Zatarain17, author = {Jesus Manuel Niebla Zatarain}, title = {Virtuality and Capabilities in a World of Ambient Intelligence, by Luiz Costa}, journal = {Int. J. Law Inf. Technol.}, volume = {25}, number = {4}, pages = {346--348}, year = {2017}, url = {https://doi.org/10.1093/ijlit/eax012}, doi = {10.1093/IJLIT/EAX012}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Zatarain17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.