| Copyright in the blockchain era: Promises and challenges |
27 |
| EU General Data Protection Regulation: Changes and implications for personal data collecting companies |
23 |
| Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR |
18 |
| The right to data portability in the GDPR: Towards user-centric interoperability of digital services |
17 |
| Regulation, I presume? said the robot - Towards an iterative regulatory process for robot governance |
15 |
| AI and Big Data: A blueprint for a human rights, social and ethical impact assessment |
12 |
| Blockchain and law: Incompatible codes? |
11 |
| Are 'pseudonymised' data always personal data? Implications of the GDPR for administrative data research in the UK |
10 |
| Robots, standards and the law: Rivalries between private standards and public policymaking for robot governance |
9 |
| A comparison of data protection legislation and policies across the EU |
9 |
| The ICO and artificial intelligence: The role of fairness in the GDPR framework |
9 |
| The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise |
8 |
| Looking for needles in a haystack: Key issues affecting children's rights in the General Data Protection Regulation |
8 |
| EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era |
7 |
| Automated decision-making in the EU Member States: The right to explanation and other suitable safeguards in the national legislations |
7 |
| China's campaign-style Internet finance governance: Causes, effects, and lessons learned for new information-based approaches to governance |
7 |
| Data integration in IoT ecosystem: Information linkage as a privacy threat |
7 |
| Big genetic data and its big data protection challenges |
6 |
| Privacy, consent and vehicular ad hoc networks (VANETs) |
6 |
| Intellectual property law and practice in the blockchain realm |
6 |
| Pricing privacy - the right to know the value of your personal data |
5 |
| Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten |
5 |
| Some risks of tokenization and blockchainizaition of private law |
5 |
| An examination of the experience of cryptocurrency use in Russia. In search of better practice |
5 |
| Understanding the notion of risk in the General Data Protection Regulation |
5 |
| Ownership of personal data in the Internet of Things |
5 |
| Merging self-driving cars with the law |
5 |
| All watched over by machines of loving grace: A critical look at smart contracts |
5 |
| The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation |
5 |
| Avoiding the internet of insecure industrial things |
5 |
| Funds sharing regulation in the context of the sharing economy: Understanding the logic of China's P2P lending regulation |
4 |
| Creating markets in no-trust environments: The law and economics of smart contracts |
4 |
| The impact of China's 2016 Cyber Security Law on foreign technology firms, and on China's big data and Smart City dreams |
4 |
| Patching the patchwork: appraising the EU regulatory framework on cyber security breaches |
4 |
| Data sharing and interoperability: Fostering innovation and competition through APIs |
4 |
| The introduction of data breach notification legislation in Australia: A comparative view |
4 |
| Building sustainable free legal advisory systems: Experiences from the history of AI & law |
4 |
| The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security |
4 |
| A legal approach to real estate crowdfunding platforms |
4 |
| Backups and the right to be forgotten in the GDPR: An uneasy relationship |
4 |
| Bitcoin and the GDPR: Allocating responsibility in distributed networks |
4 |
| Digital identity - From emergent legal concept to new reality |
3 |
| Singapore's cybersecurity strategy |
3 |
| Destructive sharing economy: A passage from status to contract |
3 |
| The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments |
3 |
| Assessing China's Cybersecurity Law |
3 |
| Preventing discrimination in the automated targeting of job advertisements |
3 |
| Having yes, using no? About the new legal regime for biometric data |
3 |
| Bike litter and obligations of the platform operators: Lessons from China's dockless sharing bikes |
3 |
| Banking in the cloud: Part 1-banks' use of cloud services |
3 |