- Xueting Fu. The dilemma and resolution of data circulation in China: Is data as consideration the solution?. Comput. Law Secur. Rev., 56:106074, 2025.
- Marcin Rojszczak. Preventing the dissemination of child sexual abuse material (CSAM) with surveillance technologies: The case of EU Regulation 2021/1232. Comput. Law Secur. Rev., 56:106097, 2025.
- Jennifer Tridgell. Open or closing doors? The influence of 'digital sovereignty' in the EU's Cybersecurity Strategy on cybersecurity of open-source software. Comput. Law Secur. Rev., 56:106078, 2025.
- Zofia Bednarz, Kelly Lewis, Jathan Sadowski. 'It's not personal, it's strictly business': Behavioural insurance and the impacts of non-personal data on individuals, groups and societies. Comput. Law Secur. Rev., 56:106096, 2025.
- Lee A. Bygrave. The emergence of EU cybersecurity law: A tale of lemons, angst, turf, surf and grey boxes. Comput. Law Secur. Rev., 56:106071, 2025.
- Piotr Ryszard Rataj. Botnet defense under EU data protection law. Comput. Law Secur. Rev., 56:106080, 2025.
- Mark Brady, Kieran Tranter, Belinda Bennett. Automated vehicles, the 'driver dilemma', stopping powers, and paradigms of regulating road traffic. Comput. Law Secur. Rev., 56:106076, 2025.
- Meihui Zhang, Chi Zhang. The political economy of the fintech regulation in China and its implications. Comput. Law Secur. Rev., 56:106089, 2025.
- Monika Simmler, Giulia Canova. Facial recognition technology in law enforcement: Regulating data analysis of another kind. Comput. Law Secur. Rev., 56:106092, 2025.
- Leon Y. Xiao. Illegal loot box advertising on social media? An empirical study using the Meta and TikTok ad transparency repositories. Comput. Law Secur. Rev., 56:106069, 2025.