Journal: Comput. Law Secur. Rev.

Volume 34, Issue 6

1177 -- 1179Steve Saxby. Editor's foreword
1180 -- 1196Stearns Broadhead. The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments
1197 -- 1214Luca Tosoni. Rethinking Privacy in the Council of Europe's Convention on Cybercrime
1215 -- 1231Andrej Savin. Regulating internet platforms in the EU - The emergence of the 'Level playing Field'
1232 -- 1246Bernold Nieuwesteeg, Michael Faure. An analysis of the effectiveness of the EU data breach notification obligation
1247 -- 1257Eugenia A. Politou, Alexandra K. Michota, Efthimios Alepis, Matthias Pocs, Constantinos Patsakis. Backups and the right to be forgotten in the GDPR: An uneasy relationship
1258 -- 1277Eduard Fosch Villaronga, Michiel A. Heldeweg. "Regulation, I presume?" said the robot - Towards an iterative regulatory process for robot governance
1278 -- 1290Adam J. Brown, William Bradley Glisson, Todd R. Andel, Kim-Kwang Raymond Choo. Cloud forecasting: Legal visibility issues in saturated environments
1291 -- 1299Vikas Kathuria, Jessica C. Lai. User review portability: Why and how?
1300 -- 1313Anna Konstantinovna Zharova, Ian Lloyd. An examination of the experience of cryptocurrency use in Russia. In search of better practice
1314 -- 1332Tom Mackie. Proving liability for highly and fully automated vehicle accidents in Australia
1333 -- 1341Sunilduth Baichoo, Maleika Heenaye-Mamode Khan, Pramod Bissessur, Narainsamy Pavaday, Nazmeen Boodoo-Jahangeer, Neel R. Purmah. Legal and ethical considerations of biometric identity card: Case for Mauritius
1342 -- 1354Aimin Qi, Guosong Shao, Wentong Zheng. Assessing China's Cybersecurity Law
1355 -- 1359Kit Burden. EU update
1360 -- 1363Nick Pantlin. European national news
1364 -- 1376Gabriela Kennedy. Asia Pacific news

Volume 34, Issue 5

997 -- 998Steve Saxby. Editor's foreword
999 -- 0Steve Saxby. New member of the CLSR professional board
1000 -- 1018Paul Quinn, Liam Quinn. Big genetic data and its big data protection challenges
1019 -- 1038Markus Naarttijärvi. Balancing data protection and privacy - The case of information security sensor systems
1039 -- 1052Vaclav Janecek. Ownership of personal data in the Internet of Things
1053 -- 1076David Ryan. European remedial coherence in the regulation of non-consensual disclosures of sexual images
1077 -- 1098Maria Grazia Porcedda. Patching the patchwork: appraising the EU regulatory framework on cyber security breaches
1099 -- 1118Miquel Peguera. Hyperlinking under the lens of the revamped right of communication to the public
1119 -- 1130Agustí Cerrillo-i-Martínez. How do we provide the digital footprint with eternal rest? Some criteria for legislation regulating digital wills
1131 -- 1138Thomas Hoeren, Stefan Pinelli. Agile programming - Introduction and current legal challenges
1139 -- 1143Graeme Horsman, Angela King. Policing and Crime Act 2017: Changes to pre-charge bail and the impact on digital forensic analysis
1144 -- 1149Simon Geiregat. Cryptocurrencies are (smart) contracts
1150 -- 1153Jan De Bruyne, Jarich Werbrouck. Merging self-driving cars with the law
1154 -- 1161Kit Burden. EU update
1162 -- 1165Nick Pantlin. European national news
1166 -- 1174Gabriela Kennedy. Asia pacific news
1175 -- 1176Nicolo Zingales. Data Localization Law and Policy by W. Kuan Hon, Edward Elgar Publishing (2017). ISBN Hardback 978 1 78643 196 7, Elgaronline 978-1 78643 197 4

Volume 34, Issue 4

667 -- 670Steve Saxby. Editor's foreword--CLSR 1985-2018
671 -- 676Katina Michael. Sylvia Mercado Kierkegaard (1953-2015)
677 -- 700Roger Clarke, Marcus R. Wigan. The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security
701 -- 706Rolf H. Weber. "Rose is a rose is a rose is a rose" - what about code and law?
707 -- 714Peggy Valcke, Inge Graef, Damian Clifford. iFairness - Constructing fairness in IT (and other areas of) law through intra- and interdisciplinarity
715 -- 722Dan Jerker B. Svantesson. Jurisdictional issues and the internet - a brief overview 2.0
723 -- 731Clare Sullivan. Digital identity - From emergent legal concept to new reality
732 -- 738Vagelis Papakonstantinou, Paul De Hert. digital persons"
739 -- 753Stephen Castell. The future decisions of RoboJudge HHJ Arthur Ian Blockchain: Dread, delight or derision?
754 -- 772Alessandro Mantelero. AI and Big Data: A blueprint for a human rights, social and ethical impact assessment
773 -- 778Yves Poullet. Is the general data protection regulation the solution?
779 -- 783Ian Lloyd. From ugly duckling to Swan. The rise of data protection and its limits
784 -- 805Sophie Stalla-Bourdillon, Henry Pearce, Niko Tsakalakis. The GDPR: A game changer for electronic identification schemes? The case study of Gov.UK Verify
806 -- 815Daniel Drewer, Vesela Miladinova. The canary in the data mine
816 -- 823Francis Aldhouse. A reflection on the priorities of a data protection authority
824 -- 829Tamar Gidron, Uri Volovelsky. The right to be forgotten: The Israeli version
830 -- 842Xavier Tracol. Opinion 1/15 of the Grand Chamber dated 26 July 2017 about the agreement on Passenger Name Record data between the EU and Canada
843 -- 846Christopher Millard. Blockchain and law: Incompatible codes?
847 -- 862Gönenç Gürkaynak, Ilay Yilmaz, Burak Yesilaltay, Berk Bengi. Intellectual property law and practice in the blockchain realm
863 -- 869Alexander Savelyev. Some risks of tokenization and blockchainizaition of private law
870 -- 880Paul Przemyslaw Polanski. Rethinking the notion of hosting in the aftermath of Delfi: Shifting from liability to responsibility?
881 -- 885Nick Pantlin, Claire Wiseman, Miriam Everett. Supply chain arrangements: The ABC to GDPR compliance - A spotlight on emerging market practice in supplier contracts in light of the GDPR
886 -- 889Kit Burden. Impact of disruptive technologies on sourcing and outsourcing transactions
890 -- 900Bert-Jaap Koops, Eleni Kosta. Looking for some light through the lens of "cryptowar" history: Policy options for law enforcement authorities against "going dark"
901 -- 907Ian Walden. 'The Sky is Falling!' - Responses to the 'Going Dark' problem
908 -- 911Joseph V. DeMarco. An approach to minimizing legal and reputational risk in Red Team hacking exercises
912 -- 919Felicity Gerry, Julia Muraszkiewicz, Olivia Iannelli. The drive for virtual (online) courts and the failure to consider obligations to combat human trafficking - A short note of concern on identification, protection and privacy of victims
920 -- 923Corien Prins. Digital justice
924 -- 927Kah Leng Ter. Singapore's cybersecurity strategy
928 -- 932Richard Kemp. Legal aspects of cloud security
933 -- 945Stephen Mason. Documents signed or executed with electronic signatures in English law
946 -- 953Edward A. Morse. From Rai stones to Blockchains: The transformation of payments
954 -- 964Reinhard Steennot. Reduced payer's liability for unauthorized payment transactions under the second Payment Services Directive (PSD2)
965 -- 976Liyang Hou. Destructive sharing economy: A passage from status to contract
977 -- 984Kit Burden. EU update
985 -- 987Nick Pantlin. European national news
988 -- 995Gabriela Kennedy. Asia Pacific news

Volume 34, Issue 3

433 -- 435Steve Saxby. Editor's foreword
436 -- 449Sandra Wachter. Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR
450 -- 466Lachlan Urquhart, Derek McAuley. Avoiding the internet of insecure industrial things
467 -- 476Roger Clarke. Guidelines for the responsible application of data analytics
477 -- 495Angela Daly. The introduction of data breach notification legislation in Australia: A comparative view
496 -- 507Mikhail S. Zhuravlev, Tatiana A. Brazhnik. Russian data retention requirements: Obligation to store the content of communications
508 -- 522Uldis Kinis. From Responsible Disclosure Policy (RDP) towards State Regulated Responsible Vulnerability Disclosure Procedure (hereinafter - RVDP): The Latvian approach
523 -- 538Els J. Kindt. Having yes, using no? About the new legal regime for biometric data
539 -- 549Bart van der Sloot. A new approach to the right to privacy, or how the European Court of Human Rights embraced the non-domination principle
550 -- 561Alexander Savelyev. Copyright in the blockchain era: Promises and challenges
562 -- 581Paul Przemyslaw Polanski. Revisiting country of origin principle: Challenges related to regulating e-commerce in the European Union
582 -- 594Pardis Moslemzadeh Tehrani, Johan Shamsuddin Bin Hj Sabaruddin, Dhiviya A. P. Ramanathan. Cross border data transfer: Complexity of adequate protection and its exceptions
595 -- 614W. Kuan Hon, Christopher Millard. Banking in the cloud: Part 3 - contractual issues
615 -- 627David Jacobus Dalenberg. Preventing discrimination in the automated targeting of job advertisements
628 -- 639Bernardo D. Olivares Olivares. Technological innovation within the Spanish tax administration and data subjects' right to access: An opportunity knocks
640 -- 646Cedric Vanleenhove. Bolagsupplysningen: The Brussels I Recast Regulation's jurisdictional rules for online infringement of personality rights further clarified
647 -- 652Kit Burden. EU update
653 -- 656Nick Pantlin. European national news
657 -- 665Gabriela Kennedy. Asia pacific news

Volume 34, Issue 2

189 -- 191Steve Saxby. Editor's foreword
192 -- 0Steve Saxby. New member of the CLSR editorial board
193 -- 203Paul De Hert, Vagelis Papakonstantinou, Gianclaudio Malgieri, Laurent Beslay, Ignacio Sanchez. The right to data portability in the GDPR: Towards user-centric interoperability of digital services
204 -- 221Mark Elliot, Kieron O'Hara, Charles D. Raab, Christine M. O'Keefe, Elaine Mackey, Chris Dibben, Heather Gowans, Kingsley Purdam, Karen McCullagh. Functional anonymisation: Personal data and the data environment
222 -- 233Miranda Mourby, Elaine Mackey, Mark Elliot, Heather Gowans, Susan E. Wallace, Jessica Bell, Hannah Smith, Stergios Aidinlis, Jane Kaye. Are 'pseudonymised' data always personal data? Implications of the GDPR for administrative data research in the UK
234 -- 243Bart Custers, Francien Dechesne, Alan M. Sears, Tommaso Tani, Simone van der Hof. A comparison of data protection legislation and policies across the EU
244 -- 256Eric Lachaud. The General Data Protection Regulation and the rise of certification as a regulatory instrument
257 -- 268Michael Butterworth. The ICO and artificial intelligence: The role of fairness in the GDPR framework
269 -- 278Eva Lievens, Valerie Verdoodt. Looking for needles in a haystack: Key issues affecting children's rights in the General Data Protection Regulation
279 -- 288Raphaël Gellert. Understanding the notion of risk in the General Data Protection Regulation
289 -- 303Gianclaudio Malgieri, Bart Custers. Pricing privacy - the right to know the value of your personal data
304 -- 313Eduard Fosch Villaronga, Peter Kieseberg, Tiffany Li. Humans forget, machines remember: Artificial intelligence and the Right to Be Forgotten
314 -- 326Graham Greenleaf, Andrew Mowbray, Philip Chung 0001. Building sustainable free legal advisory systems: Experiences from the history of AI & law
327 -- 336Paul De Hert, Cihan Parlar, Juraj Sajfert. The Cybercrime Convention Committee's 2017 Guidance Note on Production Orders: Unilateralist transborder access to electronic evidence promoted via soft law
337 -- 357W. Kuan Hon, Christopher Millard. Banking in the cloud: Part 2 - regulation of cloud as 'outsourcing'
358 -- 390Cesare Bartolini, Cristiana Santos, Carsten Ullrich. Property and the cloud
391 -- 397Julia Hörnle. Global social media vs local values: Private international law should protect local consumer rights by using the public policy exception?
398 -- 404Michael Veale, Lilian Edwards. Clarity, surprises, and further questions in the Article 29 Working Party draft guidance on automated decision-making and profiling
405 -- 408Ian Lloyd. Data retention
409 -- 418Kit Burden. EU update
419 -- 422Nick Pantlin. European national news
423 -- 432Gabriela Kennedy. Asia Pacific news

Volume 34, Issue 1

1 -- 2Steve Saxby. Editor's foreword
3 -- 0Steve Saxby. New member of the CLSR professional board
4 -- 24W. Kuan Hon, Christopher Millard. Banking in the cloud: Part 1 - banks' use of cloud services
25 -- 36Dan Jerker B. Svantesson. Enter the quagmire - the complicated relationship between data protection law and consumer protection law
37 -- 46Rajen Akalu. Privacy, consent and vehicular ad hoc networks (VANETs)
47 -- 66Joshua Yuvaraj. Privacy Act 1988
67 -- 98Max Parasol. The impact of China's 2016 Cyber Security Law on foreign technology firms, and on China's big data and Smart City dreams
99 -- 110Anna Romanou. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise
111 -- 124Graeme Horsman. Combatting those who intentionally access images depicting child sexual abuse on the Internet: A call for a new offence in England and Wales
125 -- 133Nishtha Madaan, Mohd Abdul Ahad, Sunil M. Sastry. Data integration in IoT ecosystem: Information linkage as a privacy threat
134 -- 153Christina Tikkinen-Piri, Anna Rohunen, Jouni Markkula. EU General Data Protection Regulation: Changes and implications for personal data collecting companies
154 -- 165Catherine Jasserand. Law enforcement access to personal data originally collected by private parties: Missing data subjects' safeguards in directive 2016/680?
166 -- 174Kit Burden. EU update
175 -- 177Nick Pantlin. European national news
178 -- 185Gabriela Kennedy. Asia Pacific news
186 -- 187Hector L. MacQueen. th edition by Stephen Mason, Institute of Advanced Legal Studies, University of London, 2016. Pp lvii + 418 (including index). ISBN 978-1-911507000. £37.94. Also available online free of charge at http: //ials.sas.ac.uk/digital/humanities-digital-library/observing-law-ials-open-book-service-law