default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 54 matches
- 2024
- Hilary J. Allen:
Regulating fintech: A harm focused approach. Comput. Law Secur. Rev. 52: 105910 (2024) - Olumide Babalola:
Transborder flow of personal data (TDF) in Africa: Stocktaking the ills and gains of a divergently regulated business mechanism. Comput. Law Secur. Rev. 52: 105940 (2024) - Valerio Bellandi, Christian Bernasconi, Fausto Lodi, Matteo Palmonari, Riccardo Pozzi, Marco Ripamonti, Stefano Siccardi:
An entity-centric approach to manage court judgments based on Natural Language Processing. Comput. Law Secur. Rev. 52: 105904 (2024) - Jasmijn Boeken:
From compliance to security, responsibility beyond law. Comput. Law Secur. Rev. 52: 105926 (2024) - Christopher Boniface, Lachlan Urquhart, Melissa Terras:
Towards a right to repair for the Internet of Things: A review of legal and policy aspects. Comput. Law Secur. Rev. 52: 105934 (2024) - Nils Brinker:
Identification and demarcation - A general definition and method to address information technology in European IT security law. Comput. Law Secur. Rev. 52: 105927 (2024) - Silvana Castano, Alfio Ferrara, Emanuela Furiosi, Stefano Montanelli, Sergio Picascia, Davide Riva, Carolina Stefanetti:
Enforcing legal information extraction through context-aware techniques: The ASKE approach. Comput. Law Secur. Rev. 52: 105903 (2024) - Kuo-Chun Chien, Chia-Hui Chang, Ren-Der Sun:
Legal knowledge management for prosecutors based on judgment prediction and error analysis from indictments. Comput. Law Secur. Rev. 52: 105902 (2024) - Mateusz Cholodecki:
The future EU postal regulation. What can be learnt from the telecommunication regulations. Comput. Law Secur. Rev. 52: 105938 (2024) - Bart Custers:
A fair trial in complex technology cases: Why courts and judges need a basic understanding of complex technologies. Comput. Law Secur. Rev. 52: 105935 (2024) - Bart Custers, Helena Vrabec:
Tell me something new: data subject rights applied to inferred data and profiles. Comput. Law Secur. Rev. 52: 105956 (2024) - Cristina Del-Real, Els De Busser, Bibi van den Berg:
Shielding software systems: A comparison of security by design and privacy by design based on a systematic literature review. Comput. Law Secur. Rev. 52: 105933 (2024) - Michael Anthony C. Dizon:
Socio-legal study of technology: A norms and values approach to hacking and encryption law and policy. Comput. Law Secur. Rev. 52: 105958 (2024) - M. Z. van Drunen, Arman Noroozian:
How to design data access for researchers: A legal and software development perspective. Comput. Law Secur. Rev. 52: 105946 (2024) - Amy Dunphy:
Is the regulation of connected and automated vehicles (CAVs) a wicked problem and why does it matter? Comput. Law Secur. Rev. 52: 105944 (2024) - Victor Oliveira Fernandes:
Lost in translation? Critically assessing the promises and perils of Brazil's Digital Markets Act proposal in the light of international experiments. Comput. Law Secur. Rev. 52: 105937 (2024) - Mauricio Figueroa-Torres:
Affection as a service: Ghostbots and the changing nature of mourning. Comput. Law Secur. Rev. 52: 105943 (2024) - Christophe Geiger, Vincenzo Iaia:
The forgotten creator: Towards a statutory remuneration right for machine learning of generative AI. Comput. Law Secur. Rev. 52: 105925 (2024) - Max von Grafenstein, Isabel Kiefaber, Julie Heumüller, Valentin Rupp, Paul Graßl, Otto Kolless, Zsófia Puzst:
Privacy icons as a component of effective transparency and controls under the GDPR: effective data protection by design based on art. 25 GDPR. Comput. Law Secur. Rev. 52: 105924 (2024) - Zhilong Guo, Jie Hao, Lewis Kennedy:
Protection path of personal data and privacy in China: Moving from monism to dualism in civil law and then in criminal law. Comput. Law Secur. Rev. 52: 105928 (2024) - Andreas Häuselmann, Bart Custers:
Substantive fairness in the GDPR: Fairness Elements for Article 5.1a GDPR. Comput. Law Secur. Rev. 52: 105942 (2024) - Natali Helberger:
FutureNewsCorp, or how the AI Act changed the future of news. Comput. Law Secur. Rev. 52: 105915 (2024) - Maarten Herbosch:
Fraud by generative AI chatbots: On the thin line between deception and negligence. Comput. Law Secur. Rev. 52: 105941 (2024) - Holly Hoch, Corinna Hertweck, Michele Loi, Aurelia Tamò-Larrieux:
Discrimination for the sake of fairness by design and its legal framework. Comput. Law Secur. Rev. 52: 105916 (2024) - Anna Huggins, Alice Witt, Mark Burdon:
Digital distortions and interpretive choices: A cartographic perspective on encoding regulation. Comput. Law Secur. Rev. 52: 105895 (2024) - Gabriela Kennedy:
Asia-Pacific developments. Comput. Law Secur. Rev. 52: 105953 (2024) - Dariusz Kloza:
The right not to use the internet. Comput. Law Secur. Rev. 52: 105907 (2024) - Christof Koolen, Kim Wuyts, Wouter Joosen, Peggy Valcke:
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models. Comput. Law Secur. Rev. 52: 105914 (2024) - Eyup Kun:
Challenges in regulating cloud service providers in EU financial regulation: From operational to systemic risks, and examining challenges of the new oversight regime for critical cloud service providers under the Digital Operational Resilience Act. Comput. Law Secur. Rev. 52: 105931 (2024) - Kai von Lewinski, Michael Beurskens, Stefanie Scherzinger:
Data modelling as a means of power: At the legal and computer science crossroads. Comput. Law Secur. Rev. 52: 105865 (2024)
skipping 24 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-12 15:59 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint