default search action
Computer Law & Security Review, Volume 28
Volume 28, Number 1, February 2012
- Steve Saxby:
Editor's foreword. 1-2
- Graham Greenleaf:
Independence of data privacy authorities (Part I): International standards. 3-13 - Luiz Costa:
Privacy and the precautionary principle. 14-24 - Brendan Van Alsenoy:
Allocating responsibility among controllers, processors, and "everything in between": the definition of actors and roles in Directive 95/46/EC. 25-43 - Mònica Vilasau:
Legal grounds to process personal data under Spanish legislation after the ECJ Judgment of 24 November 2011 (the ASNEF and FECEMD case). 44-53 - David Wright:
The state of the art in privacy impact assessment. 54-61 - Bart Custers:
Technology in policing: Experiences, obstacles and police needs. 62-68 - Amita Verma:
Cyber pornography in India and its implication on cyber café operators. 69-76 - M. Sakthivel:
Indian Copyright Act and new communication technologies: A special focus on webcasting. 77-82 - Julia Hörnle:
Premature or stillborn? - The recent challenge to the Digital Economy Act. 83-89 - Roger Clarke:
How reliable is cloudsourcing? A review of articles in the technical media 2005-11. 90-95
- Helen Brown, Michael Dizon, Amy Trotter, Viktoria Hoof:
EU update. 96-101 - Mark Turner:
European national news. 102-107
- Gabriela Kennedy:
Asia-Pacific news. 108-115
- Kevin Aquilina, Achilles Emilianides, Tamar Gidron, Nicolas Ktenas, Tatiana-Eleni Synodinou:
The CLSR-LSPI Seminar - 'The future of privacy regulation in the online world'. 116-118
Volume 28, Number 2, April 2012
- Steve Saxby:
Editor's foreword. 119-120
- Graham Greenleaf:
Independence of data privacy authorities (Part II): Asia-Pacific experience. 121-129 - Paul de Hert, Vagelis Papakonstantinou:
The proposed data protection Regulation replacing Directive 95/46/EC: A sound system for the protection of individuals. 130-142 - Jef Ausloos:
The 'Right to be Forgotten' - Worth remembering? 143-152 - Norberto Nuno Gomes de Andrade:
Regulating electronic identity in the European Union: An analysis of the Lisbon Treaty's competences and legal basis for eID. 153-162 - Patrick Kierkegaard:
Medical data breaches: Notification delayed is notification denied. 163-183 - Rachel L. Finn, David Wright:
Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. 184-194 - Stephen Mason:
Vehicle remote keyless entry systems and engine immobilisers: Do not believe the insurer that this technology is perfect. 195-200 - Paul Hunton:
Data attack of the cybercriminal: Investigating the digital currency of cybercrime. 201-207 - Tatiana-Eleni Synodinou:
The media coverage of court proceedings in Europe: Striking a balance between freedom of expression and fair process. 208-219 - Grace Li:
The return of public investment in telecommunications: Assessing the early challenges of the national broadband network policy in Australia. 220-230
- Helen Brown, Michael Dizon, Georgina McAdam, Viktoria Hoof:
EU update. 231-236 - Mark Turner:
European national news. 237-241
- Gabriela Kennedy:
Asia-Pacific news. 242-248
- Joseph V. DeMarco:
U.S Federal Trade Commission hosts public forum on facial recognition technology. 249-250
Volume 28, Number 3, June 2012
- Steve Saxby:
Editor's foreword. 251-253
- Luiz Costa, Yves Poullet:
Privacy and the regulation of 2012. 254-262 - Dara Hallinan, Michael Friedewald, Paul McCarthy:
Citizens' perceptions of data protection and privacy in Europe. 263-272 - J. E. J. Prins, Dennis Broeders, H. M. Griffioen:
iGovernment: A new perspective on the future of government digitisation. 273-282 - Tamar Gidron:
Privacy protection as a case study in personal rights protection in Israeli law. 283-295 - Mark Burdon, Bill Lane, Paul von Nessen:
Data breach notification law in the EU and Australia - Where to now? 296-307 - Nancy J. King, V. T. Raja:
Protecting the privacy and security of sensitive customer data in the cloud. 308-319 - Maria Eduarda Barroso Gonçalves, Maria Inês Gameiro:
Security, privacy and freedom and the EU legal and policy framework for biometrics. 320-327 - Lisa Collingwood:
Privacy, anonymity and liability: Will anonymous communicators have the last laugh? 328-334 - Mark Taylor, Glyn Hughes, John Haggerty, David Gresty, Peter Almond:
Digital evidence from mobile telephone applications. 335-339 - Paul Hinton, Edwin Baker, Chris Hill:
Latency - Time for lawyers to get up to speed? 340-346
- Patrick Charnley:
European Court of Justice rules on the protection of databases under the Database Directive (96/9/EC). 347-349
- Helen Brown, Michael Dizon, Carinne Maisel, Jason Raeburn:
EU update. 350-354 - Mark Turner:
European national news. 355-359
- Gabriela Kennedy:
Asia-Pacific news. 360-367
- Sylvia Mercado Kierkegaard, Nigel Waters, Graham Greenleaf, Elisabeth Thole, Willem Grosheide, Joseph V. DeMarco:
Comments to the CoE Convention 108 draft proposal on data protection. 368-377
Volume 28, Number 4, August 2012
- Steve Saxby:
Editor's foreword. 379-380
- Rodger Jamieson, Lesley Pek Wee Land, Donald Winchester, Greg Stephens, Alex Steel, Alana Maurushat, Rick Sarre:
Addressing identity crime in crime management information systems: Definitions, classification, and empirics. 381-395 - Eliza Mik:
Mistaken identity, identity theft and problems of remote authentication in e-commerce. 396-402 - Rizal Rahman:
Legal jurisdiction over malware-related crimes1: From theories of jurisdiction to solid practical application. 403-415 - Niels Vandezande, Katleen Janssen:
The ITS Directive: More than a timeframe with privacy concerns and a means for access to public data for digital road maps? 416-428 - Rebecca Ong:
Data protection in Malaysia and Hong Kong: One step forward, two steps back? 429-437 - Mpakwana Annastacia Mthembu:
High road in regulating online child pornography in South Africa. 438-444 - Phillemon Makakaba:
South African regulation of online casinos licensed in a foreign jurisdiction. 445-452 - Elisabetta Rotondo:
UK government's Open Standards Consultation - A step in the wrong direction? 453-457
- Kathy Eivazi:
Is termination of internet users' accounts by an ISP a proportionate response to copyright infringement? 458-467 - Christiana Markou:
The Cyprus and other EU court rulings on data retention: The Directive as a privacy bomb. 468-475 - Dan Jerker B. Svantesson:
Data protection in cloud computing - The Swedish perspective. 476-480
- Helen Brown, Michael Dizon, Anuj Moudgil, Laura Hastings:
EU update. 481-485 - Mark Turner:
European national news. 486-491
- Gabriela Kennedy:
Asia-Pacific news. 492-500
- Gabriela Kennedy:
Corrigendum to "Asia-Pacific news" [2012] 28 CLSR 242-248. 501
Volume 28, Number 5, October 2012
- Steve Saxby:
Editorial note. 503 - Peggy Valcke, Jos Dumortier:
Computer, Law & Security Review - special issue Trust in the Information Society - ICRI 20th anniversary conference - "Trust in the information society - In search of trust generating mechanisms for the network society". 504-512
- Patrick S. Ryan, Sarah Falvey:
Trust in the clouds. 513-521 - Luciana Duranti, Corinne Rogers:
Trust in digital records: An increasingly cloudy legal area. 522-531 - Thomas J. Smedinghoff:
Solving the legal challenges of trustworthy online identity. 532-541 - Caroline Pauwels, Ike Picone:
The tussle with trust: Trust in the news media ecology. 542-550 - Brian O'Neill:
Trust in the information society. 551-559 - Rob Frieden:
Do conduit neutrality mandates promote or hinder trust in Internet-mediated transactions? 560-567 - Jos Dumortier, Niels Vandezande:
Trust in the proposed EU regulation on trust services? 568-576 - Szilvia Varadi, Attila Kertész, Michael Parkin:
The necessity of legally compliant data management in European cloud architectures. 577-586
- Ulrich Wuermeling:
Modernization of European data protection law at a turning point. 587-588
- Helen Brown, Roshni Shah, Jason Raeburn:
EU update. 589-594 - Mark Turner:
European national news. 595-599
- Gabriela Kennedy:
Asia-Pacific news. 600-610
Volume 28, Number 6, December 2012
- Steve Saxby:
Editor's foreword. 611-612
- David Wright, Charles D. Raab:
Constructing a surveillance impact assessment. 613-626 - Matthias Bäcker, Gerrit Hornung:
Data processing by police and criminal justice authorities in Europe - The influence of the Commission's draft on the national police laws and laws of criminal procedure. 627-633 - Rolf H. Weber:
Corporate social responsibility as new challenge for the IT industry. 634-640 - Matthias Pocs:
Will the European Commission be able to standardise legal technology design without a legal method? 641-650 - Hasan A. Deveci:
Can hyperlinks and digital rights management secure affordable access to information? 651-661 - Samson Yoseph Esayas:
A walk in to the cloud and cloudy it remains: The challenges and prospects of 'processing' and 'transferring' personal data. 662-678 - Michael Mackay, Thar Baker, Adil Al-Yasiri:
Security-oriented cloud computing platform for critical infrastructures. 679-686 - Hiroko Onishi:
Defamation in cyberspace: A Japanese perspective. 687-695 - Kamal Halili Hassan:
Personal data protection in employment: New legal challenges for Malaysia. 696-703
- Helen Brown, Anuj Moudgil, Max Harris:
EU update. 704-708 - Mark Turner:
European national news. 709-713
- Gabriela Kennedy:
Asia-Pacific news. 714-726
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.