Computer Law & Security Review

Computer Law & Security Review

计算机法律与安全评论

  • 3区 中科院分区
  • Q1 JCR分区

高引用文章

文章名称 引用次数
Copyright in the blockchain era: Promises and challenges 27
EU General Data Protection Regulation: Changes and implications for personal data collecting companies 23
Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR 18
The right to data portability in the GDPR: Towards user-centric interoperability of digital services 17
Regulation, I presume? said the robot - Towards an iterative regulatory process for robot governance 15
AI and Big Data: A blueprint for a human rights, social and ethical impact assessment 12
Blockchain and law: Incompatible codes? 11
Are 'pseudonymised' data always personal data? Implications of the GDPR for administrative data research in the UK 10
Robots, standards and the law: Rivalries between private standards and public policymaking for robot governance 9
A comparison of data protection legislation and policies across the EU 9
The ICO and artificial intelligence: The role of fairness in the GDPR framework 9
The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise 8
Looking for needles in a haystack: Key issues affecting children's rights in the General Data Protection Regulation 8
EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era 7
Automated decision-making in the EU Member States: The right to explanation and other suitable safeguards in the national legislations 7
China's campaign-style Internet finance governance: Causes, effects, and lessons learned for new information-based approaches to governance 7
Data integration in IoT ecosystem: Information linkage as a privacy threat 7
Big genetic data and its big data protection challenges 6
Privacy, consent and vehicular ad hoc networks (VANETs) 6
Intellectual property law and practice in the blockchain realm 6
Pricing privacy - the right to know the value of your personal data 5
Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten 5
Some risks of tokenization and blockchainizaition of private law 5
An examination of the experience of cryptocurrency use in Russia. In search of better practice 5
Understanding the notion of risk in the General Data Protection Regulation 5
Ownership of personal data in the Internet of Things 5
Merging self-driving cars with the law 5
All watched over by machines of loving grace: A critical look at smart contracts 5
The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation 5
Avoiding the internet of insecure industrial things 5
Funds sharing regulation in the context of the sharing economy: Understanding the logic of China's P2P lending regulation 4
Creating markets in no-trust environments: The law and economics of smart contracts 4
The impact of China's 2016 Cyber Security Law on foreign technology firms, and on China's big data and Smart City dreams 4
Patching the patchwork: appraising the EU regulatory framework on cyber security breaches 4
Data sharing and interoperability: Fostering innovation and competition through APIs 4
The introduction of data breach notification legislation in Australia: A comparative view 4
Building sustainable free legal advisory systems: Experiences from the history of AI & law 4
The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security 4
A legal approach to real estate crowdfunding platforms 4
Backups and the right to be forgotten in the GDPR: An uneasy relationship 4
Bitcoin and the GDPR: Allocating responsibility in distributed networks 4
Digital identity - From emergent legal concept to new reality 3
Singapore's cybersecurity strategy 3
Destructive sharing economy: A passage from status to contract 3
The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments 3
Assessing China's Cybersecurity Law 3
Preventing discrimination in the automated targeting of job advertisements 3
Having yes, using no? About the new legal regime for biometric data 3
Bike litter and obligations of the platform operators: Lessons from China's dockless sharing bikes 3
Banking in the cloud: Part 1-banks' use of cloud services 3