Journal: Comput. Law Secur. Rev.

Volume 26, Issue 6

575 -- 576Steve Saxby. Editor's foreword
577 -- 594Sylvia Kierkegaard. Twitter thou doeth?
595 -- 612Nancy J. King, Pernille Wegener Jessen. Profiling the mobile customer - Is industry self-regulation adequate to protect consumer privacy when behavioural advertisers target mobile phones? - Part II
613 -- 620Richard Jones, Dalal Tahri. EU law requirements to provide information to website visitors
621 -- 629Mark Perry 0001, Thomas Margoni. From music tracks to Google maps: Who owns computer-generated works?
630 -- 639Kayleen Manwaring. Network neutrality: Issues for Australia
640 -- 648Angela Adrian. Beyond griefing: Virtual crime
649 -- 654Julia Hörnle. How to control interception-does the UK strike the right balance?
655 -- 658Helen Kemmitt, Michael Dizon, Karen Roberts, Bianca Chouls. EU update
659 -- 664Mark Turner 0003. European national news
665 -- 672Gabriela Kennedy. Asia-Pacific news
673 -- 676T. J. McIntyre. Reinventing data protection?

Volume 26, Issue 5

453 -- 454Steve Saxby. Editor's foreword
455 -- 478Nancy J. King, Pernille W. Jessen. Profiling the mobile customer - Privacy concerns when behavioural advertisers target mobile phones - Part I
479 -- 491Graham Greenleaf. India's national ID system: Danger grows in a privacy vacuum
492 -- 501Sophie Stalla-Bourdillon. The flip side of ISP's liability regimes: The ambiguous protection of fundamental rights and liberties in private digital spaces
502 -- 519Patrick Kierkegaard, Angela Adrian. Wikitopia: Balancing intellectual property rights within open source research databases
520 -- 534Mark Burdon, Jason Reid, Rouhshi Low. Encryption safe harbours and data breach notification laws
535 -- 546Patrick van Eecke, Maarten Truyens. Privacy and social networks
547 -- 551Kenneth Geers. Cyber Weapons Convention
552 -- 557Helen Kemmitt, Michael Dizon, Karen Roberts, Alex Clayton, Elizabeth Grimwood-Taylor. EU update
558 -- 563Mark Turner 0003. European national news
564 -- 571Gabriela Kennedy. Asia-Pacific news
572 -- 0Ian Lloyd. Communications Law Handbook
573 -- 0. Retraction notice to "Google's use of Rescuecom's trademark as an advertising keyword and the U.S. federal trademarks Act" (Computer Law and Security Review - The International Journal of Technology Law and Practice [2010] 26 CLSR 77-89)

Volume 26, Issue 4

341 -- 342Steve Saxby. Editor's foreword
343 -- 354David Wright 0003, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul De Hert, Kush Wadhwa, Didier Bigo. Sorting out smart surveillance
355 -- 367Yue Liu. Privacy regulations on biometrics in Australia
368 -- 376Paul De Hert, Vagelis Papakonstantinou. The EU PNR framework decision proposal: Towards completion of the PNR processing scene in Europe
377 -- 384Fanny Coudert. When video cameras watch and screen: Privacy implications of pattern recognition technologies
385 -- 390Christophe Geuens, Jos Dumortier. Mandatory implementation for in-vehicle eCall: Privacy compatible?
391 -- 397Dan Svantesson, Roger Clarke. Privacy and consumer risks in cloud computing
398 -- 405Delphine Goens. The exploitation of Business Register data from a public sector information and data protection perspective: A case study
406 -- 417Guan Hong Tang. Is administrative enforcement the answer? Copyright protection in the digital era
418 -- 426Jay Forder. The inadequate legislative response to e-signatures
427 -- 431Roksana Moore. Principles of the law of software contracts - The way forward?
432 -- 436Helen Kemmitt, Michael Dizon, Karen Roberts, Liz Grimwood-Taylor, Peter O'Byrne, Paul Rawlinson. EU update
437 -- 442Mark Turner 0003. European national news
443 -- 451Gabriela Kennedy, Sarah Doyle. Asia-Pacific news

Volume 26, Issue 3

249 -- 250Steve Saxby. Editor's foreword
251 -- 259Xiaolu Zhang. Charging children with child pornography - Using the legal system to handle the problem of "sexting"
260 -- 272Yaman Akdeniz. To block or not to block: European approaches to content regulation, and implications for freedom of expression
273 -- 283Liam Curren, Jane Kaye. Revoking consent: A 'blind spot' in data protection law?
284 -- 289Hong Xue. Privacy and personal data protection in China: An update for the year end 2009
290 -- 297Sophie Stalla-Bourdillon. Chilling ISPs... when private regulators act without adequate public framework..
298 -- 303Kenneth Geers. The challenge of cyber attack deterrence
304 -- 308Mark Taylor 0005, John Haggerty, David Gresty, Robert Hegarty. Digital evidence in cloud computing systems
309 -- 316Richard Kemp. Open source software (OSS) governance in the organisation
317 -- 319Helen Rose. BSkyB v. EDS [2010] EWHC 86 (TCC) case no: HT-06-311 26.01.2010
320 -- 325Helen Kemmitt, Michael Dizon, Peter O'Byrne, Alex Clayton, Sarah Philpott. EU update
326 -- 330Mark Turner 0003. European national news
331 -- 340Gabriela Kennedy, Sarah Doyle. Asia-Pacific news

Volume 26, Issue 2

113 -- 114Steve Saxby. Editor's foreword - CLSR 1985-2010
115 -- 129Mark Burdon, Bill Lane, Paul von Nessen. The mandatory notification of data breaches: Issues arising for Australian and EU legal developments
130 -- 143Kevin Aquilina. Public security versus privacy in technology law: A balancing act?
144 -- 150Thomas Dreier. "Opt in" and "opt out" mechanisms in the internet era - towards a common theory
151 -- 157Gerrit Hornung, Alexander Roßnagel. An ID card for the Internet - The new German ID card with "electronic proof of identity"
158 -- 169Evelyne Beatrix Cleff. Effective approaches to regulate mobile advertising: Moving towards a coordinated legal, self-regulatory and technical response
170 -- 177Mark Turner 0003, Ruth Wilson. Smart and integrated ticketing in the UK: Piecing together the jigsaw
178 -- 184Marcus Turle. Shared services: An outline of key contractual issues
185 -- 202Warren B. Chik. 'Customary internet-ional law': Creating a body of customary law for cyberspace. Part 2: Applying custom as law to the Internet infrastructure
203 -- 209Ian Walden. Mine host is searching for a 'neutrality' principle!
210 -- 218Kah Leng Ter. Internet domain name disputes: From the Singapore perspective
219 -- 221Corien Prins. The online dimension of recognised victims' rights
222 -- 226Richard Cumbley. British Gas v Accenture: Round one
227 -- 236Helen Kemmitt, Karen Roberts, Benjamin Slinn, Marianna Rybynok. Baker & McKenzie's annual review of developments in EU law relating to IP, IT & telecommunications
237 -- 242Mark Turner 0003. European national news
243 -- 248Gabriela Kennedy, Sarah Doyle. Asia-Pacific news

Volume 26, Issue 1

1 -- 2Steve Saxby. Editorial foreword
3 -- 22Warren B. Chik. 'Customary internet-ional law': Creating a body of customary law for cyberspace. Part 1: Developing rules for transitioning custom into law
23 -- 30Rolf H. Weber. Internet of Things - New security and privacy challenges
31 -- 37Dan Svantesson, Roger Clarke. A best practice model for e-consumer protection
38 -- 42Abida Chaudri. Internet domain names and the interaction with intellectual property
43 -- 51Nicholas Bohm, Stephen Mason. Identity and its verification
52 -- 60Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang. SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases
61 -- 71Ida Madieha Azmi. Legal and ethical issues in knowledge management in Malaysia
72 -- 76Mark Taylor 0005, John Haggerty, David Gresty. The legal aspects of corporate computer usage policies
77 -- 89. RETRACTED: Google's use of Rescuecom's trademark as an advertising keyword and the U.S. Federal Trademarks Act
90 -- 93Steven Baker, Taryn Johnson. Skype Technologies SA v Joltid Limited and others [2009] EWHC 2783 (Ch). Anti-suit injunction: Clarification of effect of English exclusive jurisdiction clause in worldwide technology licensing contract
94 -- 98Helen Kemmitt, Michael Dizon. EU update
99 -- 104Mark Turner 0003. European national news
105 -- 112Gabriela Kennedy, Sarah Doyle. Asia-pacific news