Journal: Comput. Law Secur. Rev.

Volume 25, Issue 6

505 -- 506Steve Saxby. Editor's foreword
507 -- 521Nadezhda Purtova. Property rights in personal data: Learning from the American discourse
522 -- 527Rolf H. Weber. Internet of things - Need for a new legal environment?
528 -- 535Paul Hunton. The growing phenomenon of crime and the internet: A cybercrime execution and analysis model
536 -- 542Niloufer Selvadurai, Md. Rizwanul Islam, Peter Gillies. Unauthorised access to wireless local area networks: The limitations of the present Australian laws
543 -- 553Johanna K. P. Dennis. Bilski v. Doll?
554 -- 562Sherly Elizabeth Abraham. Software patents in the United States: A balanced approach
563 -- 568Ruth Halpin, Roksana Moore. Developments in electronic money regulation - the Electronic Money Directive: A better deal for e-money issuers?
569 -- 582Richard Kemp. Current developments in Open Source Software
583 -- 586Kate Brimsted. The anonymous police blogger, the newspaper and the unmasking of Night Jack
587 -- 591Doris Myles, Michael Dizon, Joanna Thompson, John Oyama. EU update
592 -- 595Mark Turner 0003. European national news
596 -- 602Gabriela Kennedy, Sarah Doyle. Asia-Pacific news

Volume 25, Issue 5

401 -- 402Steve Saxby. Editor's foreword
403 -- 414Paul De Hert, Vagelis Papakonstantinou. The data protection framework decision of 27 November 2008 regarding police and judicial cooperation in criminal matters - A modest achievement however not the improvement some have hoped for
415 -- 431Brendan Van Alsenoy, Danny De Cock, Koen Simoens, Jos Dumortier, Bart Preneel. Delegation and digital mandates: Legal requirements and security objectives
432 -- 446A. Srivastava. Electronic signatures and security issues: An empirical study
447 -- 454Bertel De Groote. Jurisdiction problems regarding Internet torts: Critical remarks
455 -- 463Anna C. B. Russell. Blurring the love lines: The legal implications of intimacy with machines
464 -- 476Da-Yu Kao, Frank Fu-Yuan Huang, Shiuh-Jeng Wang. Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers
477 -- 481Ewan Nettleton, Simon Llewellyn. ECJ provides further guidance on the ambit of database right
482 -- 484Carolyn Burbridge, Graeme Maguire. Digital Britain - the final report
485 -- 490Helen Kemmitt, Michael Dizon, Richard Davies. EU update
491 -- 495Mark Turner 0003. European national news
496 -- 500Gabriela Kennedy, Sarah Doyle. Asia-Pacific news
501 -- 502Raymond Wacks. Global privacy protection: the first generation
502 -- 503Peter Gillies. Cross border Internet dispute resolution
503 -- 504Corien Prins. Internet Governance: Infrastructure and Institutions

Volume 25, Issue 4

305 -- 306Steve Saxby. Editor's foreword
307 -- 317Christopher Kuner. An international legal framework for data protection: Issues and prospects
318 -- 324Thomas Hoeren. The new German Data Protection Act and its compatibility with the European Data Protection Directive
325 -- 334Claire Walker. Data retention in the UK: Pragmatic and proportionate, or a step too far?
335 -- 351Isik Onay. Regulating webcasting: An analysis of the Audiovisual Media Services Directive and the current broadcasting law in the UK
352 -- 366Yijun Tian. Intellectual property (IP) protection versus IP abuses: The recent development of Chinese IP abuse rules and recommendations for foreign technology-driven companies
367 -- 371James Boon. UK software patents - Get with the program
372 -- 376Mark Taylor 0005, John Haggerty, David Gresty. The legal aspects of corporate e-mail investigations
377 -- 381Helen Kemmitt, Michael Dizon, Adam Werth. EU update
382 -- 386Mark Turner 0003. European national news
387 -- 398Gabriela Kennedy, Sarah Doyle, Brenda Lui. Asia-Pacific news
399 -- 0Pernille Wegener Jessen. European Citizen - Cross-Disciplinary Perspectives

Volume 25, Issue 3

209 -- 210Steve Saxby. Editor's foreword
211 -- 226Yves Poullet. Data protection legislation: What is at stake for our society and democracy?
227 -- 236Clare Sullivan. Digital identity - The legal person?
237 -- 250Yue Liu. The principle of proportionality in biometrics: Case studies from Norway
251 -- 262Wouter Stol, H. K. W. Kaspersen, Joyce Kerstens, Eric Rutger Leukfeldt, Arno R. Lodder. Governmental filtering of websites: The Dutch case
263 -- 269Carolyn Burbridge, Graeme Maguire. Digital Britain interim report: A step in the right direction?
270 -- 274Andrew Joint, Edwin Baker, Edward Eccles. Hey, you, get off of that cloud?
275 -- 279Anne S. Y. Cheung. China Internet going wild: Cyber-hunting versus privacy protection
280 -- 284Alex Jenkins. The Bermuda Islands blow 'sweet & sour' on employers' liability for Internet libel
285 -- 287C. N. M. Pounder. Why privacy is at risk
288 -- 291Michael Dizon, Helen Kemmitt, Joanne Pairman, Nick Wloch. EU update
292 -- 296Mark Turner 0003. European national news
297 -- 304Gabriela Kennedy, Sarah Doyle, Brenda Lui. Asia-Pacific news

Volume 25, Issue 2

113 -- 114Steve Saxby. Editor's foreword
115 -- 122Gerrit Hornung, Christoph Schnabel. Data protection in Germany II: Recent decisions on online-searching of computers, automatic number plate recognition and data retention
123 -- 135Roger Clarke. Privacy impact assessment: Its origins and development
136 -- 144Daniel Le Métayer, Shara Monteleone. Automated consent through privacy agents: Legal requirements and technical architecture
145 -- 154Fanny Coudert. Towards a new generation of CCTV networks: Erosion of data protection safeguards?
155 -- 164Jeanne Pia Mifsud Bonnici, Kartina A. Choong. Access to the health records of deceased patients: Why the law is in need of review
165 -- 172Rasika Dayarathna. The principle of security safeguards: Unauthorized activities
173 -- 180Nehaluddin Ahmad. Restrictions on cryptography in India - A case studyof encryption and privacy
181 -- 184Ewan Nettleton. Extraction" that infringe database right
185 -- 188Alana Maurushat, Ron Yu. Sierra v. Ritz
189 -- 193Harry Small, Michael Dizon, Tabeebah Malik, Helen Kemmitt, Ben Smith, Alison Chin, Olufemi Duduyemi Of. EU developments in IP, IT & telecommunications law
194 -- 198Mark Turner 0003. European national news
199 -- 207Gabriela Kennedy, Sarah Doyle, Brenda Lui. Legal developments and industry issues relevant to IT, media and telecommunications law in key jurisdictions across the Asia Pacific

Volume 25, Issue 1

1 -- 2Steve Saxby. Ringing in the changes - A quarter century of CLSR
3 -- 27Sylvia Kierkegaard. Open access to public documents - More secrecy, less transparency!
28 -- 43Graham Greenleaf. Five years of the APEC Privacy Framework: Failure or promise?
44 -- 50Hazel Grant. Data protection 1998-2008
51 -- 58Marcus Turle. Data security: Past, present and future
59 -- 68Gabriela Kennedy, Sarah Doyle, Brenda Lui, et al.. Data protection in the Asia-Pacific region
69 -- 83David Wright 0003, Serge Gutwirth, Michael Friedewald, Paul De Hert, Marc Langheinrich, Anna Moscibroda. Privacy, trust and policy-making: Challenges and responses
84 -- 88Gerrit Hornung, Christoph Schnabel. Data protection in Germany I: The population census decision and the right to informational self-determination
89 -- 96Jon Bing. Protecting personal data in wartime: The destruction of the alphabetic tabulators in Oslo
97 -- 100Helen Kemmitt, Rachael Jolley, Joanne Pairman, Olufemi Duduyemi. Baker & McKenzie's annual review of developments in EU law relating to IP, IT & telecommunications
101 -- 105Mark Turner 0003. The regular article tracking developments at the national level in key European countries in the area of IT and communications - Co-ordinated by Herbert Smith LLP and contributed to by firms across Europe
106 -- 112Gabriela Kennedy, Sarah Doyle, Brenda Lui. Legal developments and industry issues relevant to IT, media and telecommunications law in key jurisdictions across the Asia Pacific