Login / Signup
Comput. Law Secur. Rev.
1985
1995
2010
2024
1985
2024
Keyphrases
Publications
volume 55, 2024
Eliza Hammond
,
Mark Burdon
Intimate harms and menstrual cycle tracking apps.
Comput. Law Secur. Rev.
55 (2024)
Parto Mirzaei
,
Els De Busser
The new F-word: The case of fragmentation in Dutch cybersecurity governance.
Comput. Law Secur. Rev.
55 (2024)
volume 54, 2024
Luca Belli
,
Water B. Gaspar
,
Shilpa Singh Jaswant
Data sovereignty and data transfers as fundamental elements of digital transformation: Lessons from the BRICS countries.
Comput. Law Secur. Rev.
54 (2024)
Xi Chen
Algorithmic proxy discrimination and its regulations.
Comput. Law Secur. Rev.
54 (2024)
Abhilash Nair
,
James G. H. Griffin
Pornography, sexual privacy and copyright.
Comput. Law Secur. Rev.
54 (2024)
Christian Bergqvist
The blocking of Booking/Etraveli - When the first victim of EU's anti-US tech stand was a European.
Comput. Law Secur. Rev.
54 (2024)
Huijuan Dong
,
Junkai Chen
Meta-Regulation: An ideal alternative to the primary responsibility as the regulatory model of generative AI in China.
Comput. Law Secur. Rev.
54 (2024)
Sebastian Zielinski
Evolving Threats, Emerging Laws: Poland's 2023 Answer to the Smishing Challenge.
Comput. Law Secur. Rev.
54 (2024)
Mohammed Raiz Shaffique
Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark?
Comput. Law Secur. Rev.
54 (2024)
Diego Machado
The protection of vulnerable algorithmic groups through collective data protection in the onlife world: A Brazilian perspective.
Comput. Law Secur. Rev.
54 (2024)
Wenlong Li
,
Jiahong Chen
From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China.
Comput. Law Secur. Rev.
54 (2024)
Ningyao Ye
,
Zeyu Zhao
The reform of consumer protection in mobile payment services in China: Legislation, regulation, and dispute resolution.
Comput. Law Secur. Rev.
54 (2024)
Mattia Falduti
,
Cristine Griffo
Ontological models for representing image-based sexual abuses.
Comput. Law Secur. Rev.
54 (2024)
Janne Kaisto
,
Teemu Juutilainen
,
Joona Kauranen
Non-fungible tokens, tokenization, and ownership.
Comput. Law Secur. Rev.
54 (2024)
Giovanni Comandè
,
Margaret Varilek
The many features which make the eIDAS 2 Digital Wallet either risky or the ideal vehicle for the transition to post-quantum encryption.
Comput. Law Secur. Rev.
54 (2024)
Pierre Dewitte
Better alone than in bad company: Addressing the risks of companion chatbots through data protection by design.
Comput. Law Secur. Rev.
54 (2024)
Paul Quinn
,
Erika Ellyne
,
Cong Yao
Will the GDPR Restrain Health Data Access Bodies Under the European Health Data Space (EHDS)?
Comput. Law Secur. Rev.
54 (2024)
Giuseppe Colangelo
Open Banking goes to Washington: Lessons from the EU on regulatory-driven data sharing regimes.
Comput. Law Secur. Rev.
54 (2024)
Beatriz Botero Arcila
AI liability in Europe: How does it complement risk regulation and deal with the problem of human oversight?
Comput. Law Secur. Rev.
54 (2024)
Jakub Vostoupal
Stuxnet vs WannaCry and Albania: Cyber-attribution on trial.
Comput. Law Secur. Rev.
54 (2024)
Qiang Ren
,
Jing Du
Harmonizing innovation and regulation: The EU Artificial Intelligence Act in the international trade context.
Comput. Law Secur. Rev.
54 (2024)
Øyvind Anders Arntzen Toftegaard
,
Guro Grøtterud
,
Bernhard M. Hämmerli
Operational Technology resilience in the 2023 draft delegated act on cybersecurity for the power sector - An EU policy process analysis.
Comput. Law Secur. Rev.
54 (2024)
Erzsébet Csatlós
Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions.
Comput. Law Secur. Rev.
54 (2024)
Beatriz Kira
When non-consensual intimate deepfakes go viral: The insufficiency of the UK Online Safety Act.
Comput. Law Secur. Rev.
54 (2024)
Alessandro Mantelero
The Fundamental Rights Impact Assessment (FRIA) in the AI Act: Roots, legal obligations and key elements for a model template.
Comput. Law Secur. Rev.
54 (2024)
Meng Chen
Developing China's Approaches to Regulate Cross-border Data Transfer:Relaxation and Integration.
Comput. Law Secur. Rev.
54 (2024)
Núbia Augusto de Sousa Rocha
,
Alexandre Nascimento de Almeida
,
André Nunes
,
Humberto Angelo
Critical points for the processing of personal data by the government: An empirical study in Brazil.
Comput. Law Secur. Rev.
54 (2024)
Clara Isabel Velasco Rico
,
Migle Laukyte
ETIAS system and new proposals to advance the use of AI in public services.
Comput. Law Secur. Rev.
54 (2024)
Gerard Buckley
,
Tristan Caulfield
,
Ingolf Becker
How might the GDPR evolve? A question of politics, pace and punishment.
Comput. Law Secur. Rev.
54 (2024)
Larissa Galdino de Magalhães Santos
Open government data in the Brazilian digital government: Enabling an SDG acceleration agenda.
Comput. Law Secur. Rev.
54 (2024)
Yuliya Miadzvetskaya
EU sanctions in response to cyber-attacks as crime-based emergency measures.
Comput. Law Secur. Rev.
54 (2024)
volume 53, 2024
Nick Pantlin
European National News.
Comput. Law Secur. Rev.
53 (2024)
Samuli Haataja
Cyber operations and automatic hack backs under international law on necessity.
Comput. Law Secur. Rev.
53 (2024)
Xingxing Wei
Rule of law or not? A critical evaluation of legal responses to cyberterrorism in the UK.
Comput. Law Secur. Rev.
53 (2024)
Federica Casarosa
Cybersecurity of Internet of Things in the health sector: Understanding the applicable legal framework.
Comput. Law Secur. Rev.
53 (2024)
Giacomo Pisani
The right to self-determination in the digital platform economy.
Comput. Law Secur. Rev.
53 (2024)
Carlotta Rigotti
,
Eduard Fosch-Villaronga
Fairness, AI & recruitment.
Comput. Law Secur. Rev.
53 (2024)
Bart Jacobs
The authenticity crisis.
Comput. Law Secur. Rev.
53 (2024)
Oscar Borgogno
,
Cristina Poncibò
,
Giuseppe Colangelo
Editorial to the special issue on financial technology and the law: A reality check.
Comput. Law Secur. Rev.
53 (2024)
Jakub Vostoupal
,
Václav Stupka
,
Jakub Harasta
,
Frantisek Kasl
,
Pavel Loutocký
,
Kamil Malinka
The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond.
Comput. Law Secur. Rev.
53 (2024)
Andrea Fedele
,
Clara Punzi
,
Stefano Tramacere
The ALTAI checklist as a tool to assess ethical and legal implications for a trustworthy AI development in education.
Comput. Law Secur. Rev.
53 (2024)
Alessandra Calvi
Data Protection Impact Assessment under the EU General Data Protection Regulation: A feminist reflection.
Comput. Law Secur. Rev.
53 (2024)
Sara Migliorini
China's Interim Measures on generative AI: Origin, content and significance.
Comput. Law Secur. Rev.
53 (2024)
Guan Zheng
,
Jinchun Shu
In the name of protection - A critical analysis of China's legal framework of children's personal information protection in the digital era.
Comput. Law Secur. Rev.
53 (2024)
Shrutika Gandhi
Frontex as a hub for surveillance and data sharing: Challenges for data protection and privacy rights.
Comput. Law Secur. Rev.
53 (2024)
Douglas W. Arner
,
Dirk A Zetzsche
,
Ross P. Buckley
,
Jamieson M. Kirkwood
The financialisation of Crypto: Designing an international regulatory consensus.
Comput. Law Secur. Rev.
53 (2024)
Raül Ramos Fernández
Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.0.
Comput. Law Secur. Rev.
53 (2024)
Sue Anne Teo
How to think about freedom of thought (and opinion) in the age of AI.
Comput. Law Secur. Rev.
53 (2024)
Pier Giorgio Chiara
Towards a right to cybersecurity in EU law? The challenges ahead.
Comput. Law Secur. Rev.
53 (2024)
Maria Lillà Montagnani
,
Marie-Claire Najjar
,
Antonio Davola
The EU Regulatory approach(es) to AI liability, and its Application to the financial services market.
Comput. Law Secur. Rev.
53 (2024)