default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 49 matches
- 2012
- Zia Akhtar:
Media Celebraties, and Internet Law. Eur. J. Law Technol. 3(3) (2012) - Kim Barker:
MMORPGing - The Legalities of Game Play. Eur. J. Law Technol. 3(1) (2012) - Jonathan Barrett:
Name Suppression Orders and Web 2.0 Media: the New Zealand Experience. Eur. J. Law Technol. 3(1) (2012) - Subhajit Basu:
Stalking the Stranger in Web 2.0: A Contemporary Regulatory Analysis. Eur. J. Law Technol. 3(2) (2012) - Subhajit Basu, Argyro P. Karanasiou:
Editorial - Special Issue on Human Rights. Eur. J. Law Technol. 3(3) (2012) - Franziska Boehm, Paul de Hert:
Notification, an important safeguard against the improper use of surveillance - finally recognized in case law and EU law. Eur. J. Law Technol. 3(3) (2012) - Maurizio Borghi, Maria Lillà Montagnani, Mariateresa Maggiolino, Massimiliano Nuccio:
Determinants in the On-line Distribution of Digital Contents: An exploratory analysis. Eur. J. Law Technol. 3(2) (2012) - Helen Boyle:
Rape and the Media: Victim's Rights to Anonymity and Effects of Technology on the Standard of Rape Coverage. Eur. J. Law Technol. 3(3) (2012) - Michael C. Bromby:
Response to the consultation by the Judicial Office for England and Wales on the Use of Live, Text-Based Forms of Communications from Court for the Purposes of Fair and Accurate Reporting. Eur. J. Law Technol. 3(1) (2012) - Abbe Brown, Phoebe Hung Li:
New conversations: the BILETA and Information Technology Think Tank collaborative consultation response programme. Eur. J. Law Technol. 3(1) (2012) - Lisa Hannah Collingwood:
Privacy in Cyberworld: Why Lock the Gate After the Horse Has Bolted? Eur. J. Law Technol. 3(1) (2012) - Karen Mc Cullagh:
Response to EU Commission Public Consultation on Cloud Computing. Eur. J. Law Technol. 3(1) (2012) - Angela Daly:
The AOL Huffington Post merger and bloggers' rights. Eur. J. Law Technol. 3(3) (2012) - Luke Danagher:
An Assessment of the Draft Data Protection Regulation: Does it Effectively Protect Data? Eur. J. Law Technol. 3(3) (2012) - Estelle Derclaye:
Recent French decisions on database protection: Towards a more consistent and compliant approach with the Court of Justice's case law? Eur. J. Law Technol. 3(2) (2012) - Catherine Easton:
Editorial: BILETA Conference Edition. Eur. J. Law Technol. 3(1) (2012) - Catherine Easton:
Employing a Classroom Response System to Teach Law: A Case Study. Eur. J. Law Technol. 3(1) (2012) - Catherine Easton:
Response to the Government consultation "A Communications Review for the Digital Age". Eur. J. Law Technol. 3(1) (2012) - Michael Mc Fall:
American and English Libel Law - Which Approach is Best? Eur. J. Law Technol. 3(3) (2012) - Primavera De Filippi, Luca Belli:
Law of the Cloud v Law of the Land: Challenges and Opportunities for Innovation. Eur. J. Law Technol. 3(2) (2012) - Primavera De Filippi, Smari McCarthy:
Cloud Computing: Centralization and Data Sovereignty. Eur. J. Law Technol. 3(2) (2012) - Nicholas Gervassis:
The Dehumanisation of Law: Digital Reflections. Eur. J. Law Technol. 3(3) (2012) - Alexandra Giannopoulou:
Copyright enforcement measures: the role of the ISPs and the respect of the principle of proportionality. Eur. J. Law Technol. 3(1) (2012) - Martina Colette Gillen:
Human versus Inalienable Rights: Is there still a future for online protest in the Anonymous world? Eur. J. Law Technol. 3(1) (2012) - Indranath Gupta:
Are websites adequately communicating terms & conditions link in a browse-wrap agreement? Eur. J. Law Technol. 3(2) (2012) - Paul de Hert, Dariusz Kloza:
Internet (access) as a new fundamental right. Inflating the current rights framework? Eur. J. Law Technol. 3(3) (2012) - Mohammed Jawad, Elsa Butrous, Benjamin Faber, Chandni Gupta, Christopher Haggart, Sager Patel:
A study to define the international guidelines of ethics concerning electronic medical data. Eur. J. Law Technol. 3(1) (2012) - Argyro P. Karanasiou:
Respecting Context: A New Deal for Free Speech in the Digital Era. Eur. J. Law Technol. 3(3) (2012) - Bert-Jaap Koops, Jasper P. Sluijs:
Network Neutrality and Privacy According to Art. 8 ECHR. Eur. J. Law Technol. 3(2) (2012) - Philip Leith:
Editorial. Eur. J. Law Technol. 3(2) (2012)
skipping 19 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-30 04:15 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint