for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> BUSINESS AND ECONOMICS (Total: 3075 journals)
    - ACCOUNTING (89 journals)
    - BANKING AND FINANCE (261 journals)
    - BUSINESS AND ECONOMICS (1154 journals)
    - CONSUMER EDUCATION AND PROTECTION (24 journals)
    - COOPERATIVES (4 journals)
    - ECONOMIC SCIENCES: GENERAL (158 journals)
    - ECONOMIC SYSTEMS, THEORIES AND HISTORY (167 journals)
    - FASHION AND CONSUMER TRENDS (13 journals)
    - HUMAN RESOURCES (94 journals)
    - INSURANCE (23 journals)
    - INTERNATIONAL COMMERCE (127 journals)
    - INTERNATIONAL DEVELOPMENT AND AID (81 journals)
    - INVESTMENTS (25 journals)
    - LABOR AND INDUSTRIAL RELATIONS (43 journals)
    - MACROECONOMICS (13 journals)
    - MANAGEMENT (517 journals)
    - MARKETING AND PURCHASING (86 journals)
    - MICROECONOMICS (24 journals)
    - PRODUCTION OF GOODS AND SERVICES (138 journals)
    - PUBLIC FINANCE, TAXATION (32 journals)
    - TRADE AND INDUSTRIAL DIRECTORIES (2 journals)

BUSINESS AND ECONOMICS (1154 journals)                  1 2 3 4 5 6 | Last

Showing 1 - 200 of 1566 Journals sorted alphabetically
4OR: A Quarterly Journal of Operations Research     Hybrid Journal   (Followers: 9)
Abacus     Hybrid Journal   (Followers: 11)
Accounting Forum     Hybrid Journal   (Followers: 22)
Acta Amazonica     Open Access   (Followers: 3)
Acta Commercii     Open Access   (Followers: 2)
Acta Oeconomica     Full-text available via subscription   (Followers: 2)
Acta Scientiarum. Human and Social Sciences     Open Access   (Followers: 4)
Acta Universitatis Danubius. Œconomica     Open Access  
Acta Universitatis Nicolai Copernici Zarządzanie     Open Access   (Followers: 3)
AD-minister     Open Access   (Followers: 2)
ADR Bulletin     Open Access   (Followers: 5)
Advances in Developing Human Resources     Hybrid Journal   (Followers: 21)
Advances in Economics and Business     Open Access   (Followers: 12)
AfricaGrowth Agenda     Full-text available via subscription   (Followers: 1)
African Affairs     Hybrid Journal   (Followers: 57)
African Development Review     Hybrid Journal   (Followers: 34)
African Journal of Business and Economic Research     Full-text available via subscription   (Followers: 1)
African Journal of Business Ethics     Open Access   (Followers: 7)
African Review of Economics and Finance     Open Access   (Followers: 3)
Afro-Asian Journal of Finance and Accounting     Hybrid Journal   (Followers: 6)
Afyon Kocatepe Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi     Open Access   (Followers: 3)
Agronomy     Open Access   (Followers: 11)
Akademika : Journal of Southeast Asia Social Sciences and Humanities     Open Access   (Followers: 4)
Alphanumeric Journal : The Journal of Operations Research, Statistics, Econometrics and Management Information Systems     Open Access   (Followers: 4)
American Economic Journal : Applied Economics     Full-text available via subscription   (Followers: 125)
American Economic Journal : Economic Policy     Full-text available via subscription   (Followers: 94)
American Journal of Business     Hybrid Journal   (Followers: 14)
American Journal of Business and Management     Open Access   (Followers: 50)
American Journal of Business Education     Open Access   (Followers: 10)
American Journal of Economics and Business Administration     Open Access   (Followers: 22)
American Journal of Economics and Sociology     Hybrid Journal   (Followers: 27)
American Journal of Evaluation     Hybrid Journal   (Followers: 12)
American Journal of Finance and Accounting     Hybrid Journal   (Followers: 16)
American Journal of Health Economics     Full-text available via subscription   (Followers: 12)
American Journal of Industrial and Business Management     Open Access   (Followers: 23)
American Journal of Medical Quality     Hybrid Journal   (Followers: 7)
American Law and Economics Review     Hybrid Journal   (Followers: 26)
ANALES de la Universidad Central del Ecuador     Open Access   (Followers: 1)
Annales de l'Institut Henri Poincare (C) Non Linear Analysis     Full-text available via subscription   (Followers: 1)
Annals in Social Responsibility     Full-text available via subscription  
Annals of Finance     Hybrid Journal   (Followers: 26)
Annals of Operations Research     Hybrid Journal   (Followers: 8)
Annual Review of Economics     Full-text available via subscription   (Followers: 29)
Applied Developmental Science     Hybrid Journal   (Followers: 4)
Applied Economics     Hybrid Journal   (Followers: 44)
Applied Economics Letters     Hybrid Journal   (Followers: 28)
Applied Economics Quarterly     Full-text available via subscription   (Followers: 10)
Applied Financial Economics     Hybrid Journal   (Followers: 21)
Applied Mathematical Finance     Hybrid Journal   (Followers: 6)
Applied Stochastic Models in Business and Industry     Hybrid Journal   (Followers: 5)
Apuntes Universitarios     Open Access   (Followers: 1)
Arab Economic and Business Journal     Open Access   (Followers: 3)
Archives of Business Research     Open Access   (Followers: 4)
Arena Journal     Full-text available via subscription   (Followers: 1)
Argomenti. Rivista di economia, cultura e ricerca sociale     Open Access   (Followers: 2)
ASEAN Economic Bulletin     Full-text available via subscription   (Followers: 5)
Asia Pacific Business Review     Hybrid Journal   (Followers: 5)
Asia Pacific Journal of Human Resources     Hybrid Journal   (Followers: 310)
Asia Pacific Viewpoint     Hybrid Journal  
Asia-Pacific Journal of Business Administration     Hybrid Journal   (Followers: 3)
Asia-Pacific Journal of Operational Research     Hybrid Journal   (Followers: 3)
Asian Business Review     Open Access   (Followers: 2)
Asian Case Research Journal     Hybrid Journal   (Followers: 1)
Asian Development Review     Open Access   (Followers: 14)
Asian Economic Journal     Hybrid Journal   (Followers: 6)
Asian Economic Papers     Hybrid Journal   (Followers: 7)
Asian Economic Policy Review     Hybrid Journal   (Followers: 3)
Asian Journal of Accounting and Governance     Open Access   (Followers: 3)
Asian Journal of Business Ethics     Hybrid Journal   (Followers: 7)
Asian Journal of Social Sciences and Management Studies     Open Access   (Followers: 6)
Asian Journal of Technology Innovation     Hybrid Journal   (Followers: 9)
Asian-pacific Economic Literature     Hybrid Journal   (Followers: 5)
AStA Wirtschafts- und Sozialstatistisches Archiv     Hybrid Journal   (Followers: 5)
Atlantic Economic Journal     Hybrid Journal   (Followers: 14)
Australasian Journal of Regional Studies, The     Full-text available via subscription   (Followers: 2)
Australian Cottongrower, The     Full-text available via subscription   (Followers: 1)
Australian Economic Papers     Hybrid Journal   (Followers: 16)
Australian Economic Review     Hybrid Journal   (Followers: 7)
Australian Journal of Maritime and Ocean Affairs     Hybrid Journal   (Followers: 11)
Balkan Region Conference on Engineering and Business Education     Open Access   (Followers: 1)
Baltic Journal of Real Estate Economics and Construction Management     Open Access   (Followers: 1)
Banks in Insurance Report     Hybrid Journal   (Followers: 1)
BBR - Brazilian Business Review     Open Access   (Followers: 5)
Benchmarking : An International Journal     Hybrid Journal   (Followers: 11)
BER : Consumer Confidence Survey     Full-text available via subscription   (Followers: 4)
BER : Economic Prospects : An Executive Summary     Full-text available via subscription  
BER : Economic Prospects : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Intermediate Goods Industries Survey     Full-text available via subscription   (Followers: 1)
BER : Manufacturing Survey : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Motor Trade Survey     Full-text available via subscription   (Followers: 1)
BER : Retail Sector Survey     Full-text available via subscription   (Followers: 2)
BER : Retail Survey : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Survey of Business Conditions in Building and Construction : An Executive Summary     Full-text available via subscription   (Followers: 4)
BER : Survey of Business Conditions in Manufacturing : An Executive Summary     Full-text available via subscription   (Followers: 3)
BER : Survey of Business Conditions in Retail : An Executive Summary     Full-text available via subscription   (Followers: 3)
BER : Trends : Full Survey     Full-text available via subscription   (Followers: 2)
BER : Wholesale Sector Survey     Full-text available via subscription   (Followers: 1)
Berkeley Business Law Journal     Free   (Followers: 11)
Bio-based and Applied Economics     Open Access   (Followers: 1)
Biodegradation     Hybrid Journal   (Followers: 1)
Biology Direct     Open Access   (Followers: 7)
Black Enterprise     Full-text available via subscription  
Board & Administrator for Administrators only     Hybrid Journal  
Border Crossing : Transnational Working Papers     Open Access   (Followers: 2)
Briefings in Real Estate Finance     Hybrid Journal   (Followers: 5)
British Journal of Industrial Relations     Hybrid Journal   (Followers: 30)
Brookings Papers on Economic Activity     Open Access   (Followers: 46)
Brookings Trade Forum     Full-text available via subscription   (Followers: 3)
BRQ Business Research Quarterly     Open Access   (Followers: 2)
Building Sustainable Legacies : The New Frontier Of Societal Value Co-Creation     Full-text available via subscription   (Followers: 1)
Bulletin of Economic Research     Hybrid Journal   (Followers: 16)
Bulletin of Geography. Socio-economic Series     Open Access   (Followers: 6)
Bulletin of Indonesian Economic Studies     Hybrid Journal   (Followers: 3)
Bulletin of the Dnipropetrovsk University. Series : Management of Innovations     Open Access   (Followers: 1)
Business & Entrepreneurship Journal     Open Access   (Followers: 15)
Business & Information Systems Engineering     Hybrid Journal   (Followers: 5)
Business & Society     Hybrid Journal   (Followers: 9)
Business : Theory and Practice / Verslas : Teorija ir Praktika     Open Access   (Followers: 1)
Business and Economic Horizons     Open Access   (Followers: 2)
Business and Economic Research     Open Access   (Followers: 5)
Business and Management Horizons     Open Access   (Followers: 11)
Business and Management Research     Open Access   (Followers: 16)
Business and Management Studies     Open Access   (Followers: 7)
Business and Politics     Hybrid Journal   (Followers: 6)
Business and Professional Communication Quarterly     Hybrid Journal   (Followers: 7)
Business and Society Review     Hybrid Journal   (Followers: 5)
Business Economics     Hybrid Journal   (Followers: 6)
Business Ethics: A European Review     Hybrid Journal   (Followers: 16)
Business Horizons     Hybrid Journal   (Followers: 9)
Business Information Review     Hybrid Journal   (Followers: 13)
Business Management and Strategy     Open Access   (Followers: 39)
Business Research     Hybrid Journal   (Followers: 1)
Business Strategy and the Environment     Hybrid Journal   (Followers: 11)
Business Strategy Review     Hybrid Journal   (Followers: 6)
Business Strategy Series     Hybrid Journal   (Followers: 5)
Business Systems & Economics     Open Access   (Followers: 1)
Business Systems Research Journal     Open Access   (Followers: 4)
Business, Management and Education     Open Access   (Followers: 16)
Business, Peace and Sustainable Development     Full-text available via subscription   (Followers: 3)
Bustan     Hybrid Journal   (Followers: 1)
Cadernos EBAPE.BR     Open Access   (Followers: 1)
Cambridge Journal of Economics     Hybrid Journal   (Followers: 55)
Cambridge Journal of Regions, Economy and Society     Hybrid Journal   (Followers: 9)
Canadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l Administration     Hybrid Journal   (Followers: 1)
Canadian Journal of Economics/Revue Canadienne d`Economique     Hybrid Journal   (Followers: 25)
Canadian journal of nonprofit and social economy research     Open Access   (Followers: 2)
Capitalism and Society     Hybrid Journal   (Followers: 2)
Capitalism Nature Socialism     Hybrid Journal   (Followers: 11)
Case Studies in Business and Management     Open Access   (Followers: 8)
CBU International Conference Proceedings     Open Access   (Followers: 1)
Central European Business Review     Open Access   (Followers: 1)
Central European Journal of Operations Research     Hybrid Journal   (Followers: 5)
Central European Journal of Public Policy     Open Access   (Followers: 1)
CESifo Economic Studies     Hybrid Journal   (Followers: 15)
Chain Reaction     Full-text available via subscription   (Followers: 1)
Challenge     Full-text available via subscription   (Followers: 4)
China & World Economy     Hybrid Journal   (Followers: 15)
China : An International Journal     Full-text available via subscription   (Followers: 17)
China Economic Journal: The Official Journal of the China Center for Economic Research (CCER) at Peking University     Hybrid Journal   (Followers: 10)
China Economic Review     Hybrid Journal   (Followers: 10)
China Finance Review International     Hybrid Journal   (Followers: 5)
China Nonprofit Review     Hybrid Journal   (Followers: 3)
China perspectives     Open Access   (Followers: 11)
Chinese Economy     Full-text available via subscription  
Ciência & Saúde Coletiva     Open Access   (Followers: 2)
CLIO América     Open Access   (Followers: 1)
Cliometrica     Hybrid Journal   (Followers: 1)
COEPTUM     Open Access  
Community Development Journal     Hybrid Journal   (Followers: 23)
Compensation & Benefits Review     Hybrid Journal   (Followers: 6)
Competition & Change     Hybrid Journal   (Followers: 10)
Competitive Intelligence Review     Hybrid Journal   (Followers: 2)
Competitiveness Review : An International Business Journal incorporating Journal of Global Competitiveness     Hybrid Journal   (Followers: 5)
Computational Economics     Hybrid Journal   (Followers: 9)
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computer Law & Security Report     Hybrid Journal   (Followers: 15)
Computers & Operations Research     Hybrid Journal   (Followers: 10)
Construction Innovation: Information, Process, Management     Hybrid Journal   (Followers: 14)
Contemporary Wales     Full-text available via subscription   (Followers: 3)
Contextus - Revista Contemporânea de Economia e Gestão     Open Access   (Followers: 1)
Contributions to Political Economy     Hybrid Journal   (Followers: 6)
Corporate Communications An International Journal     Hybrid Journal   (Followers: 4)
Corporate Philanthropy Report     Hybrid Journal   (Followers: 2)
Corporate Reputation Review     Hybrid Journal   (Followers: 5)
Creative and Knowledge Society     Open Access   (Followers: 10)
Creative Industries Journal     Hybrid Journal   (Followers: 8)
CRIS - Bulletin of the Centre for Research and Interdisciplinary Study     Open Access   (Followers: 1)
Crossing the Border : International Journal of Interdisciplinary Studies     Open Access   (Followers: 4)
Cuadernos de Administración (Universidad del Valle)     Open Access   (Followers: 1)
Cuadernos de Economía     Open Access   (Followers: 1)
Cuadernos de Economia - Latin American Journal of Economics     Open Access   (Followers: 1)
Cuadernos de Estudios Empresariales     Open Access   (Followers: 1)
Current Opinion in Creativity, Innovation and Entrepreneurship     Open Access   (Followers: 8)
De Economist     Hybrid Journal   (Followers: 12)
Decision Analysis     Full-text available via subscription   (Followers: 8)
Decision Sciences     Hybrid Journal   (Followers: 15)
Decision Support Systems     Hybrid Journal   (Followers: 15)
Defence and Peace Economics     Hybrid Journal   (Followers: 16)
der markt     Hybrid Journal   (Followers: 1)
Desenvolvimento em Questão     Open Access  

        1 2 3 4 5 6 | Last

Journal Cover Computer Law & Security Report
  [SJR: 0.382]   [H-I: 17]   [15 followers]  Follow
    
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
   ISSN (Print) 0267-3649
   Published by Elsevier Homepage  [3041 journals]
  • Asia-Pacific news
    • Abstract: Publication date: Available online 9 March 2017
      Source:Computer Law & Security Review
      Author(s): Gabriela Kennedy
      This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.

      PubDate: 2017-03-10T03:34:28Z
       
  • EU update
    • Abstract: Publication date: Available online 6 March 2017
      Source:Computer Law & Security Review
      Author(s): Kit Burden
      This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside websites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.

      PubDate: 2017-03-10T03:34:28Z
       
  • Professional Board
    • Abstract: Publication date: February 2017
      Source:Computer Law & Security Review, Volume 33, Issue 1


      PubDate: 2017-03-10T03:34:28Z
       
  • An academic perspective on the copyright reform
    • Abstract: Publication date: Available online 1 February 2017
      Source:Computer Law & Security Review
      Author(s): Sophie Stalla-Bourdillon, Eleonora Rosati, Karmen Turk, Christina Angelopoulos, Aleksandra Kuczerawy, Miquel Peguera, Martin Husovec
      The recently proposed new Copyright Directive was released on 14 September 2016. It has been described by EU law-makers as the pillar of the copyright package promised by the European Commission (EC), to be delivered before the end of Mr. Juncker's mandate. In its Communication of 6 May 2015, the EC had stressed “the importance to enhance cross-border access to copyright-protected content services, facilitate new uses in the fields of research and education, and clarify the role of online services in the distribution of works and other subject-matter.” The proposed Copyright Directive is thus a key measure aiming to address two of these three issues. However it is not without shortfalls. We have therefore decided to publicly express our concerns and send an open letter to the European Commission, the European Parliament and the Council to urge them to re-assess the new provisions dealing with mandatory filtering of user-generated content in the light of the CJEU case law and the Charter of Fundamental Rights of the European Union. In a more extended statement, we examine in details the text of both the explanatory memorandum and the Directive itself. Our conclusions are: 1. A comprehensive re-assessment of Article 13 and Recital 39 in the light of the Charter of Fundamental Rights of the European Union and the E-commerce Directive (in particular Article 15) including CJEU case law is needed, as the proposed Copyright Directive does not expressly address the issue of its compatibility with both of these texts. 2. Recital 38 does not clarify the domain and effect of Article 13. Rather, it creates confusion as it goes against settled CJEU case law (relating to Articles 14 and 15 of the E-commerce Directive and Article 3 of the Infosoc Directive). Recital 38 should therefore be deleted or substantially re-drafted/re-phrased. If the EU wants to introduce a change in this regard it should clearly justify its choice. In any case, a recital in the preamble to a directive is not an appropriate tool to achieve this effect. We hope that this exercise will prove useful for the debate that has now begun both in the European Parliament and in the Council.

      PubDate: 2017-02-04T21:20:41Z
       
  • Editor's foreword
    • Abstract: Publication date: Available online 26 January 2017
      Source:Computer Law & Security Review
      Author(s): Steve Saxby


      PubDate: 2017-01-28T20:53:03Z
       
  • Asia-Pacific news
    • Abstract: Publication date: Available online 19 January 2017
      Source:Computer Law & Security Review
      Author(s): Gabriela Kennedy
      This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.

      PubDate: 2017-01-21T14:38:42Z
       
  • Nobody puts data in a corner? Why a new approach to categorising personal
           data is required for the obligation to inform
    • Abstract: Publication date: Available online 17 January 2017
      Source:Computer Law & Security Review
      Author(s): Emma Cradock, Sophie Stalla-Bourdillon, David Millard
      Transparency is a key principle of EU data protection law and the obligation to inform is key to ensuring transparency. The purpose of this obligation is to provide data subjects with information that allows them to assess the compliance and trustworthiness of the data controller. Despite the benefits of categorising personal data for this purpose, a coherent and consistent approach to doing so under the obligation to inform has not emerged. It is unclear what a ‘category’ of personal data is and when this information must be provided. This results in reduced transparency for data subjects and uncertainty for data controllers regarding their legal obligations, defeating the purpose of this obligation. This article highlights these issues and calls for clarification on them. It also posits that in clarifying the law, a new approach to categorising personal data is required to achieve the benefits of categorisation and increase the transparency of personal data processing for data subjects.

      PubDate: 2017-01-21T14:38:42Z
       
  • iCLIC Data Mining and Data Sharing workshop: The present and future of
           data mining and data sharing in the EU
    • Abstract: Publication date: Available online 11 January 2017
      Source:Computer Law & Security Review
      Author(s): Robert Thorburn, Sophie Stalla-Bourdillon, Eleonora Rosati
      Held at Southampton University's Highfield campus and hosted by iCLIC, an interdisciplinary core on Law, the Internet and Culture, the Data Mining and Data Sharing workshop brought together attendees and speakers from industry, government, academia and a range of disciplines alike. The workshop comprised two sessions, each with a keynote and an associated panel. The first session was chaired by Eleonora Rosati and dealt with copyright and database rights, data mining and data sharing. The second session, chaired by Sophie Stalla-Bourdillon, focussed on data protection, data mining and data sharing. The following report covers both sessions, associated panel discussions and the subsequent question and answer sessions.

      PubDate: 2017-01-14T10:51:50Z
       
  • European national news
    • Abstract: Publication date: Available online 9 January 2017
      Source:Computer Law & Security Review
      Author(s): Nick Pantlin
      This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments in key European countries. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.

      PubDate: 2017-01-14T10:51:50Z
       
  • IT Law in the United Kingdom after Brexit
    • Abstract: Publication date: Available online 3 January 2017
      Source:Computer Law & Security Review
      Author(s): Ian Lloyd
      It is difficult to find a more appropriate introduction than the words of this song in the attempt to assess what IT Law could look like in the UK at the time (whenever that may be 1 1 The recent and highly controversial case of R v. Secretary of State [2016] EWHC 2768 (Admin) illustrates well some of the complex issues that may arise in the field. Although primarily concerned with the question whether the move (under the often quoted Article 50) to leave the EU requires Parliamentary approval, the case c ) when its exit from the EU might be concluded. Speculation is normally more in the realm of futurists than in that of a lawyer whose profession traditionally values qualities such as stability and predictability. These are not normal times and it may be helpful to consider some of the issues and topics that will require to be addressed in the near future. It is not the purpose of the article to repeat the arguments for and against UK membership of the EU. It seeks, rather, to highlight some of the issues that will inevitably arise following what has been described as the largest demerger in history – with what has been described as the world's 5th largest economy 2 2 It has been suggested that the UK's economy has slipped to 6th place following the referendum. seeking to disengage itself from the world's largest trading block. It is difficult to imagine that there has ever been such a legislative challenge. The information sector is an increasingly important part of the national economy and consideration of some of the issues affecting it makes for an interesting case study. This article will focus on four legal topics; data protection, e-commerce, intellectual property and telecommunications. This is by no means an exhaustive list of the issues, even in the IT sector, that need to be addressed, but may serve to highlight some of the key points that will be required for consideration by legislators and to indicate also the scale of the task facing them. In some cases, the quest to seek answers will lie within the control of the UK legislature and government but other issues may be more difficult to resolve independently.

      PubDate: 2017-01-06T10:25:58Z
       
  • Fragments of fragments. The domain name system regulation: global law or
           informalization of the international legal order?
    • Abstract: Publication date: Available online 23 December 2016
      Source:Computer Law & Security Review
      Author(s): Gianpaolo Maria Ruotolo
      The paper studies some international law aspects underpinning the project of the new Domain Name System (DNS) governance, in order to try and bridge the worlds of IT law and international law. It also deals with the issue of the fragmentation of both international and domestic legal orders with an international lawyer's perspective, and faces the approach adopted on the same issue by the global/transnational law doctrine. It uses the DNS governance in the perspective of the international legal order as a case study, framing it in the context of various informal cross-border cooperation between public authorities. It also examines the ICANN, trying to understand if it could be read as an international organization, and the gradual overcoming of the ‘political question doctrine’ in the US.

      PubDate: 2016-12-28T14:39:02Z
       
  • “In the public interest”: The privacy implications of international
           business-to-business sharing of cyber-threat intelligence
    • Abstract: Publication date: Available online 22 December 2016
      Source:Computer Law & Security Review
      Author(s): Clare Sullivan, Eric Burger
      This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence. The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date. This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally. In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.

      PubDate: 2016-12-28T14:39:02Z
       
  • Autonomous weapon system: Law of armed conflict (LOAC) and other legal
           challenges
    • Abstract: Publication date: Available online 22 December 2016
      Source:Computer Law & Security Review
      Author(s): Vivek Sehrawat
      The legality of autonomous weapon systems (AWS) under international law is a swiftly growing issue of importance as technology advances and machines acquire the capacity to operate without human control. This paper argues that the existing laws are ineffective and that a different set of laws are needed. This paper examines several issues that are critical for the development and use of AWS in warfare. It argues that a preemptive ban on AWS is irrelevant at this point and urges the appropriate authorities to develop a modern legal framework that is tailored to embrace these state-of-the-art weapons as the Law of Armed Conflict (LOAC) develops. First, this paper explores the myriad of laws designed to govern the potential future development and deployment of artificial intelligence and AWS in the context of International Humanitarian Law or LAOC. Second, the paper argues that it will be challenging for AWS to fulfill the requirements laid out under the International Committee of the Red Cross and LOAC for the rules of humanity, military necessity, distinction, proportionality and precaution, especially as it is related to noncombatants. Third, the paper discusses command responsibility and argues that states should establish accountability for wrongful acts committed by the AWS. Finally, this paper contends that there is an urgent need for a new legal framework to regulate these AWS and presents different solutions for the legal framework of AWS.

      PubDate: 2016-12-28T14:39:02Z
       
  • Facebook e-court: Online justice for online disputes
    • Abstract: Publication date: Available online 20 December 2016
      Source:Computer Law & Security Review
      Author(s): Ibrahim Al Swelmiyeen, Ahmed Al-Nuemat
      Owing to their significant popularity, Facebook and other social network sites have gained considerable importance. The popularity of Facebook can be signified through more than 1.2 billion users, i.e. one in every five persons in the world is a Facebook user. It is being used for a variety of activities including sharing of opinions, announcing something or sending invites to parties and events, meeting new people, etc. This paper examines the legal aspects of resolving disputes, which occur in the world of social networking. The social matters are pertinent to the legal aspects. Thus, this article will focus on social science in most areas to present a more thorough approach. For example, the association between disclosure of private information and the friends list, the relation between disputes and social activities and the limitations on viewing others' private profiles will be reviewed.

      PubDate: 2016-12-21T14:01:55Z
       
  • How to attribute the right to data portability in Europe: A comparative
           analysis of legislations
    • Abstract: Publication date: Available online 20 December 2016
      Source:Computer Law & Security Review
      Author(s): Barbara Van der Auwermeulen
      The number of online services is constantly growing, offering numerous and unprecedented advantages for consumers. Often, the access to these services requires the disclosure of personal information. This personal data is very valuable as it concedes significant advantages over competitors, allowing better answers to the customer's needs and therefore offering services of a better quality. For some services, analysing the customers' data is at the core of their business model. Furthermore, personal data has a monetary value as it enables the service providers to pursue targeted advertising. Usually, the first companies who provide a service will benefit from large volumes of data and might create market entrance barriers for new online providers, thus preventing users from the benefits of competition. Furthermore, by holding a grip on this personal data, they are making it more expensive or burdensome for the user to shift to a new service. Because of this value, online services tend to keep collected information and impede their users to reuse the personal data they have provided. This behaviour results in the creation of a lock-in effect. Upcoming awareness for this problem has led to the demand of a right to data portability. The aim of this paper is to analyse the different legislative systems that exist or have been recently created in this regard that would grant a right to data portability. Firstly, this article draws up the framework of data portability, explaining its origin, general aspects, advantages as well as its possible downfalls. Secondly, the core of the article is approached as the different ways of granting data portability are analysed. In this regard, the possible application of European Competition Law to prohibit restrictions to data portability is examined. Afterwards, an examination of the application of U.S. Antitrust Law is made to determine whether it could be a source of inspiration for European legislators. Finally, an analysis of the new General Data Protection Regulation is made with respect to the development of data portability throughout the European legislative procedure. This article makes a cross-examination of legislations, compares them with one another in order to offer a reflection on the future of portable data in Europe, and finally attempts to identify the best approach to attribute data portability.

      PubDate: 2016-12-21T14:01:55Z
       
  • Legal aspects of ownership in modified open source software and its impact
           on Russian software import substitution policy
    • Abstract: Publication date: Available online 20 December 2016
      Source:Computer Law & Security Review
      Author(s): Alexander Savelyev
      In my previous publication, I tried to show how personal data legislation might be used for achieving the purposes of national sovereignty 1 1 Alexander Savelyev. Russia's new personal data localization regulations: A step forward or a self-imposed sanction? // [2016] 32 Computer Law & Security Review 128–145. . In this paper, I will demonstrate how open source software may be used for achieving similar purposes. However, the interplay between local copyright law, public procurement law and open source community norms creates many issues relating to the legal status and ownership in modified software, based on open source. This is especially so in the case of so-called copyleft open source licenses, where a collision occurs between copyright, as an absolute right enforceable against the world, and the copyleft provisions of license agreements, which may be treated as “rights in personam” enforceable only against the licensee. The exclusive right to derivative software as an independent object of copyright, may come into conflict with restrictions inherited from incoming copyleft licenses. This paper provides an overview and analysis of such problems faced by Russian software developers, attempting to comply with Russian import substitution provisions, by using open source components. Although it is based on Russian law, it may be applicable to other jurisdictions, since general aspects of copyright law and its interaction with private international law and contract law drive it. The paper concludes that the developer of software, containing code licensed under GPL or other copyleft provisions, receives full exclusive right to the derivative software and can commercialize it as he sees appropriate, subject only to possible claims of breach of contract rather than copyright infringement. This opens wide perspectives for using open source components regardless of the type of license used as bricks for building a de-globalized economy and society based on principles of information sovereignty.

      PubDate: 2016-12-21T14:01:55Z
       
  • EU update
    • Abstract: Publication date: Available online 19 December 2016
      Source:Computer Law & Security Review
      Author(s): Kit Burden
      This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.

      PubDate: 2016-12-21T14:01:55Z
       
  • Banking and fraud
    • Abstract: Publication date: Available online 15 December 2016
      Source:Computer Law & Security Review
      Author(s): Stephen Mason, Nicholas Bohm
      The authors wrote a memorandum to the UK Treasury Committee, House of Commons in January 2011 on the topic of banking and fraud. The methods used by thieves to steal from the customers of banks have increased, and in September 2016, the UK consumer magazine Which? made a super-complaint to the Payment Systems Regulator to (i) formally investigate the scale of bank-transfer fraud and how much it is costing consumers to take action, and (ii) propose new measures and greater liability for banks to ensure consumers are better protected when they have been tricked into making a bank transfer. This comment replicates the Memorandum submitted to the Treasury Committee on the basis of having our observations put on the record. The references have been updated and citations added. Apart from the increased variety of methods used by thieves to steal money, the remarks we made in 2011 remain true today.

      PubDate: 2016-12-21T14:01:55Z
       
  • Opening up government data for Big Data analysis and public benefit
    • Abstract: Publication date: Available online 14 December 2016
      Source:Computer Law & Security Review
      Author(s): Keiran Hardy, Alana Maurushat
      Governments around the world are posting many thousands of their datasets on online portals. A major purpose of releasing this data is to drive innovation through Big Data analysis, as well as to promote government transparency and accountability. This article considers the benefits and risks of releasing government data as open data, and identifies the challenges the Australian government faces in releasing its data into the public domain. The Australian government has ambitious aims to release greater amounts of its data to the public. However, it is likely this task will prove difficult due to uncertainties surrounding the reliability of de-identification and the requirements of privacy law, as well as a public service culture which is yet to fully embrace the open data movement.

      PubDate: 2016-12-14T17:02:14Z
       
  • Misuse of private information as a tort: The implications of Google v
           Judith Vidal-Hall
    • Abstract: Publication date: Available online 12 December 2016
      Source:Computer Law & Security Review
      Author(s): Jojo Y.C. Mo
      The Court of Appeal in the recent decision of Google Inc v Judith Vidal Hall 1 1 [2015] E.M.L.R. 15, [2015] E.W.C.A. Civ 311. has made a number of remarkable rulings in the area of privacy. An important aspect of this decision is that it clarified the legal foundation in which an action for unauthorised disclosure of private information is found. However, the decision itself is not without flaws. This paper seeks to analyse potential problems with the action being classified as a tort as well as the scope of misuse of private information being a form of privacy protection.

      PubDate: 2016-12-14T17:02:14Z
       
  • Pseudonymization and impacts of Big (personal/anonymous) Data processing
           in the transition from the Directive 95/46/EC to the new EU General Data
           Protection Regulation
    • Abstract: Publication date: Available online 12 December 2016
      Source:Computer Law & Security Review
      Author(s): Luca Bolognini, Camilla Bistolfi
      In order to carry out the so-called “Big Data analysis”, the collection of personal data seems to be inevitable. The opportunities arising from the analysis of such information need to be balanced with the risks for the data protection of individuals. In this sense, the anonymization technique might be a solution, but it seems to be inappropriate in certain circumstances, among which Big Data processing can be included. In fact, anonymization has a high degree of uncontrollability of the impacts of profiling directed to individual targets whose data has been anonymized. In this sense, pseudonymization can be used both to reduce the risks of reidentification and help data controllers and processors to respect their personal data protection obligations by keeping control over their activities. On the one hand, pseudonymization ensures the capability to reconstruct the processes of identity masking, by allowing re-identification. On the other hand the accountability of the data controller and data processor is guaranteed, thanks to the fact that there will always be a person who can re-identify subjects included in a cluster, acting as a “data keeper”.

      PubDate: 2016-12-14T17:02:14Z
       
  • More than a game: Did Nintendo v. PC Box give manufacturers more control
           over the use of hardware?
    • Abstract: Publication date: Available online 12 December 2016
      Source:Computer Law & Security Review
      Author(s): Bohdan Widła
      The impact of the judgement of the Court of Justice of the European Union issued in the case C-355/12 Nintendo v. PC Box, which concerned the scope of protection granted to technological protection measures (TPMs) of videogames, goes beyond the videogame industry. The CJEU confirmed that TPMs entailing both software media and hardware are admissible. Moreover, according to the CJEU, if a software product also contains other copyrighted media, the general provisions of European copyright law concerning copyright take precedence over software-specific provisions. The article discusses to what extent additional protection of TPMs has been made available to hardware manufacturers, who are also copyright holders, to software which allows the hardware to perform its function.

      PubDate: 2016-12-14T17:02:14Z
       
  • China's stance on the Google/Motorola merger: Implications for competition
           in intellectual property-intensive sectors
    • Abstract: Publication date: Available online 12 December 2016
      Source:Computer Law & Security Review
      Author(s): Qiang Yu
      China's merger enforcement agency approved the Google/Motorola merger with conditions. This pattern of approval is not in full accordance with that in other jurisdictions, including the United States and the European Union, which made unconditional approvals. This contradiction attracted ample criticism; some critics believe that China's policy is designed to protect domestic industry. In investigating the Chinese merger agency's decision and the basis for its decision making, this article finds that much of the criticism is groundless and misleading because the critics have failed to incorporate all elements of the global value chain of mobile intelligent terminals into their analyses. The investigation also shows that, although the decision makers are less experienced, their decisions are based on Chinese competition law and market realities. It is important for international firms to be aware of this pattern in merger analysis.

      PubDate: 2016-12-14T17:02:14Z
       
  • Ethiopia's new cybercrime legislation: Some reflections
    • Abstract: Publication date: Available online 9 December 2016
      Source:Computer Law & Security Review
      Author(s): Kinfe Micheal Yilma
      Ethiopia has been enacting various pieces of legislation to regulate some aspects of the digital environment. The cybercrime proclamation of 2016 is the most recent addition to the statute book that criminalizes a range of cybercrimes. It has also introduced a number of novel evidentiary and procedural rules that will assist in the investigation and prosecution of cybercrimes. The law has, however, attracted criticisms from various corners mainly owing to some of its human rights unfriendly provisions. This comment provides brief analysis of the cybercrime legislation and highlights some of the challenges that lie ahead in the course of putting the law into practice.

      PubDate: 2016-12-14T17:02:14Z
       
  • A comparative study on sanction system of cyber aider from perspectives of
           German and Chinese criminal law
    • Abstract: Publication date: Available online 9 December 2016
      Source:Computer Law & Security Review
      Author(s): Ting Zhang
      In the context of the global information age, cases concerning the provision of technical assistance to commit cybercrimes are growing in leaps and bounds and a brand-new crime-as-a-service industry is beginning to take shape. German criminal law addresses this issue in the context of joint commission theory and individual incrimination as complementary, whereas the Chinese model, by contrast, has made marked progress in the fight against cyber aiding by introducing new criminal provisions. The change of cyber-aiding indeed represents a significant challenge to current criminal legislation and consideration of its criminal countermeasures is indispensably significant.

      PubDate: 2016-12-14T17:02:14Z
       
  • Website blocking in Russia: Recent trends
    • Abstract: Publication date: Available online 8 December 2016
      Source:Computer Law & Security Review
      Author(s): Ruslan Nurullaev
      This article analyses Russian regulation and implementation of website blocking in copyright cases. In Russia, right holders can apply for preliminary website blocking injunctions, which allow the restriction of access to websites used to commit copyright infringements. This gives right holders time to submit a claim against the website operator or hosting provider. In addition, the Russian parliament recently introduced permanent website blocking orders that can be used against websites, which repeatedly infringe copyright. This paper looks into the main trends related to website blocking in Russia: implementation of permanent website blocking, over blocking and lack of proportionality, difficulty to appeal website blocking decisions and the emerging practice of preventive website blocking. When analysing Russian developments the article puts them into context with practices in the EU and UK.

      PubDate: 2016-12-14T17:02:14Z
       
  • Professional Board
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6


      PubDate: 2016-12-14T17:02:14Z
       
  • Editor's foreword
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Steve Saxby


      PubDate: 2016-12-14T17:02:14Z
       
  • Legal aspects of linked data – The European framework
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Víctor Rodríguez-Doncel, Cristiana Santos, Pompeu Casanovas, Asunción Gómez-Pérez
      This paper portrays a general overview of the existing European legal framework that applies to the publication and consumption of linked data resources in typical settings. The point of view of both data publishers and data consumers is considered, identifying their rights and obligations, with special attention to those derived from the copyright and data protection laws. The goal of this analysis is to identify the practices that help to make the publication and consumption of linked data resources legally compliant processes. An insight on broader regulations, best practices and common situations is given.

      PubDate: 2016-12-14T17:02:14Z
       
  • Why the certification process defined in the General Data Protection
           Regulation cannot be successful
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Eric Lachaud
      This paper analyses the final version of Articles 42 and 43 dedicated to the certification procedures in the General Data Protection Regulation (hereinafter GDPR). It questions the introduction of this procedure in the data protection regulation framework and argues that the purposes assigned to the certification in the GDPR meet the needs of the different contributors to the preliminary discussions to the reform. It also argues that the processes defined in Articles 42 and 43 to issue the certification diverge from the commonly accepted practices in this activity and the processes suggested in the new regulation impede its chance to be successfully implemented.

      PubDate: 2016-12-14T17:02:14Z
       
  • Payments in the digital market: Evaluating the contribution of Payment
           Services Directive II
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Mary Donnelly
      This article evaluates the implications of PSD II for payments in the digital market against a background of the European Commission's Digital Market Strategy. It analyses the core elements of PSD II relevant to payments in the digital market. These include the expansion of the scope of the directive; changes in the rights and obligations of the parties and the allocation of liability for unauthorised payment transactions; and, the introduction of security and authentication requirements in the online context. The article also highlights the more harmonised approach to enforcement and the close involvement of the European Banking Authority. The article also identifies gaps in the PSD II framework and speculates that these will ultimately have to be addressed if the Commission's Digital Market Strategy is to be achieved. Thus, it concludes that, while the reforms introduced in PSD II will improve the quality of payment services and enhance e-commerce within the European Union, some payment-related impediments to the perfection of the internal digital market remain.

      PubDate: 2016-12-14T17:02:14Z
       
  • Legal issues in the application of CISG in online sale (e-commence)
           contracts
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): A. Assaduzzaman
      The objective of this article is mainly to determine whether the scope of application of the CISG covers online sale contracts since there is no mention about ecommerce in the Convention. The United Nations Convention on Contracts for International Sale of Goods 1980 was adopted a quarter of century ago while advanced electronic communication technologies were not available. Today's business transaction heavily depends on electronic commerce which is mostly operated through workable business website. The application of the CISG depends on the subject-matter and international character of the transaction and its relationship to the Convention. Therefore, the most decisive factor for the scope of application is subject-matter of the sale and parties' places of business which helps determining internationality of the contract. This paper examines the form requirement under Article 13 of the Convention which includes telegram and telex to be considered as writing and whether this also includes electronic transactions. This paper also scrutinises the concept of cyberspace as a place of business to determine the requirement of internationality under the Convention. The final outcome of this paper is to assert that the use of electronic communication technology does not turn the CISG inapplicable to International sale transactions.

      PubDate: 2016-12-14T17:02:14Z
       
  • Swedish police implementation of IMSI-catchers in a European law
           perspective
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Markus Naarttijärvi
      In this article the qualitative requirements of legality under the European Convention on Human Rights are analyzed as they apply to the use of ‘IMSI-catchers’ – a technical device to track the location and use of cell phones. The implementation of IMSI-catchers in the Swedish police is used as a case study and litmus test to illustrate how domestic law may interact with the requirements under convention law in this area. The article shows that the Swedish implementation of IMSI-catchers in substantive law has lagged behind the actual use of the measure in police work through references to the domestic legal principle that ‘the ether is free’ that serve to preclude legal protection of confidentiality of radio communications. The application of this principle highlights deficiencies in the conformity of Swedish law with both the EU ePrivacy directive and the requirements of legality under the European Convention.

      PubDate: 2016-12-14T17:02:14Z
       
  • The legal definition of personal data in the regulatory environment of the
           Russian Federation: Between formal certainty and technological development
           
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Vladislav Arkhipov, Victor Naumov
      The regulatory environment of the Russian Federation is attracting increasing interest due to its recent focus on the aspects of data protection and the Internet governance. Starting from 2006, a comprehensive regulation of the information issues in Russia began to emerge, having immediate practical effect not only on national parties, but also – due to developments in approaches to jurisdiction – to parties acting in digital environment internationally. The purpose of the research is to consider ‘narrow’ approach to the legal definition of personal data (as the trigger of personal data legislation) in the regulatory environment of the Russian Federation in the context of regulation of informational and telecommunication technologies with a particular focus on ‘Big Data’. The problem considered implies the balance between the principle of formal certainty of legal norms, on the one hand, and technological developments, on the other. The formal definition of personal data shall be interpreted uniformly to ensure consistent and predictable application of law which appears not reliably possible at the moment, although the Russian definition of personal data corresponds to the CETS Convention No. 108 which Russia is a party to. As the analysis of the Russian court practice shows, the courts are applying the broad definition interpreting it as if it has at least two additional criteria: that a set of data should be enough to identify an individual and that only a set of data in possession of a particular operator should be considered. It is suggested that these criteria find reflection in “surgical” amendments to the legislation, and the United Kingdom's Data Protection Act, 1998 can serve as a source of adoption in terms of comparative law. Furthermore, the article discusses whether the ‘narrow’ approach may be viewed as contributing to privacy protection in the age of Big Data, rather than lowering barriers of privacy. The authors explain that the ‘narrow’ approach may be considered positive in this aspect because it allows keeping the existing general privacy regulation workable in a reasonably predictable manner. Besides, the research may serve as an introductory material into the Russian data protection legislation.

      PubDate: 2016-12-14T17:02:14Z
       
  • The right to information in the legislation of the Azerbaijan Republic
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Ramil M. Aslanov
      The notions of “transparency” and “democracy” of the governmental policies are considered a necessity in the fight against irregularities (corruption, fraud, etc.). The question of Right to Information is especially acute for Central Asian countries. This article presents a detailed analysis of the domestic acts providing the right to information, as well as relevant international instruments in this field, to which the Azerbaijan Republic joined after gaining its independence. The Constitution of the Azerbaijan Republic contains such norms as “freedom of information”, “freedom of thought and speech,” “personal privacy”, etc. The right of citizens to information is one of the most important political and personal rights of man and citizen. The Constitution of the Azerbaijan Republic in the Article 50 states that everyone has the right to seek, receive, transmit, produce and disseminate information by any legal means. The comparison of the content of Article 10 of the European Convention on Human Rights and Fundamental Freedoms adopted in 1950, and the provisions of the Constitution of the Azerbaijan Republic give reason to note that these acts have no fundamental differences. The results of the analysis identify the drawbacks in legislation that are similar for the countries of the region.

      PubDate: 2016-12-14T17:02:14Z
       
  • Data mining and copyright: A bittersweet technology gift for copyright
           owners and the Malaysian public?
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Pek San Tay, Cheng Peng Sik
      The Age of Big Data is marked by an explosion of digital information that is captured by new digital technologies. The volume, velocity and variability of the data that is captured surpass the processing capacity of the human mind. Understanding text contents and correlations can no longer be performed without the intervention of technology. Data mining refers to the process of using software techniques to analyze large amounts of data sets in order to discover useful information. The information is usually in the form of patterns or relationships that might otherwise not be observed if scanned by the human eye and is therefore useful for many industries in predicting future trends. However, data mining involves the reproduction of databases and, accordingly, raises copyright issues. The objective of this paper is two-fold. First, it identifies the copyright issues arising from data mining and analyses its legality under Malaysian copyright law. Secondly, it discusses how copyright law can play a role to regulate data mining so as to protect database owners without hindering the public interest to enjoy the benefits of data mining. It concludes by recommending how the Malaysian Copyright Act 1987 may be amended in order to strike a balance between the competing interests of database owners and that of the public so that the benefits of data mining may be optimised.

      PubDate: 2016-12-14T17:02:14Z
       
  • EU update
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Kit Burden
      This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarizes recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.

      PubDate: 2016-12-14T17:02:14Z
       
  • European national news
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Nick Pantlin
      This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.

      PubDate: 2016-12-14T17:02:14Z
       
  • Asia-Pacific news
    • Abstract: Publication date: December 2016
      Source:Computer Law & Security Review, Volume 32, Issue 6
      Author(s): Gabriela Kennedy
      This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.

      PubDate: 2016-12-14T17:02:14Z
       
  • Introducing the Open Clause to improve copyright flexibility in
           cyberspace? Analysis and commentary on the proposed “two-step test” in
           the Third Amendment to the Copyright Law of the PRC, in comparison with
           the EU and the US
    • Abstract: Publication date: Available online 1 December 2016
      Source:Computer Law & Security Review
      Author(s): Chenguo Zhang
      The so called “three-step test”, that the limitations and exceptions of copyright shall be allowed in certain special cases, provided that they do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author, grants copyright flexibilities to balance the interests of all stakeholders, especially within the European system of circumscribed limitations and exceptions. This is essential for the domain of computer law, confronted by rapid and unpredictable global technological developments, and is, thus, enshrined in the most important international intellectual property (IP) treaties. Through the proposed third amendment to the Copyright Law of the PRC, the legislature intends to adopt this test while also introducing an open-ended list of limitations and exceptions that constitutes a China-specific “two-step test.” This contravenes prima facie the thesis endorsed by the WTO Panel in the case concerning Section 110(5) of the US Copyright Act in 2000. In contrast, court decisions in China frequently apply the fair use doctrine of US copyright law, neglecting to consider its peculiar context of the US common law tradition and, thus, unduly expanding the Chinese courts' discretionary power. This paper summarizes the case law in China and takes a comparative approach to address the divergence between the judicial application of cyber copyright law and the existing legislation. It suggests revising the proposed Article 43 of the Copyright Law of the PRC to capture the due interpretation of the three-step test, thereby finessing the delineation between rights protection and free use with the compensation of remuneration under the principle of proportionality. It argues that transplanting the US fair use doctrine into Chinese copyright law is feasible, but with the preconditions of endeavouring to strengthen judicial reform to integrate the IP adjudication systems, enhancing the coherence and efficiency of copyright enforcement, and facilitating consistent dialogues between scholars, practitioners, and lawmakers.

      PubDate: 2016-12-14T17:02:14Z
       
  • Professional Board
    • Abstract: Publication date: October 2016
      Source:Computer Law & Security Review, Volume 32, Issue 5


      PubDate: 2016-12-14T17:02:14Z
       
  • Editor's foreword
    • Abstract: Publication date: October 2016
      Source:Computer Law & Security Review, Volume 32, Issue 5
      Author(s): Steve Saxby


      PubDate: 2016-12-14T17:02:14Z
       
  • Law enforcement access to evidence via direct contact with cloud providers
           – identifying the contours of a solution
    • Abstract: Publication date: October 2016
      Source:Computer Law & Security Review, Volume 32, Issue 5
      Author(s): Dan Jerker B. Svantesson, Lodewijk van Zwieten
      Effective criminal investigation depends on reliable access to evidence. With the extensive use of cloud computing in various forms, electronic evidence of criminal activity may no longer be found with criminals or their associates themselves. Rather, the evidence resides with cloud providers, oftentimes on servers outside of the territory of the investigating law enforcement authorities (LEAs). Thus, even in otherwise completely domestic criminal investigations of crime committed domestically against a domestic victim, relevant electronic evidence may be stored in a cloud arrangement in another country. Obtaining the evidence in those situations may be difficult. In this article, we identify 16 variables and a number of fundamental and non-fundamental constraints that must be taken into account by anyone setting out to construct a framework facilitating appropriate LEA access to evidence via direct contact with cloud providers, while safeguarding the rights and interest of individuals, as well as the rights and interest of the provider, and those of other States.

      PubDate: 2016-12-14T17:02:14Z
       
  • Placing the state in the cloud: Issues of data governance and public
           procurement
    • Abstract: Publication date: October 2016
      Source:Computer Law & Security Review, Volume 32, Issue 5
      Author(s): Niamh Gleeson, Ian Walden
      This paper examines certain aspects of the legal framework that can make an impact on the public sector take-up of cloud services in the EU. The paper poses two questions that governments or public sector bodies will commonly ask themselves when considering moving data or operations into cloud: what public data sets or operations should or could be put into cloud; and how should cloud services be procured? The paper examines the legal framework surrounding both questions and identifies practices and potential barriers in the current framework. The first issue for public sector take-up of cloud concerns data governance and requirements concerning access to, and the security of, public sector data. Public bodies are subject to data governance obligations that distinguish them from other cloud users and can make an impact on the decision-making process for cloud adoption. At one end of the spectrum, there are freedom of information laws that render public sector data ‘open’ or ‘accessible’ by default; while at the other, states have fundamental obligations to protect data that can impact national security. As such, public bodies will generally need to operate some form of procedure capable of distinguishing the sensitivity of the data they hold. The development and deployment of robust data classification schemes can offer public bodies a tool for decision-making when handling public data, to enable them to decide whether cloud solutions are suitable and, if so, whether special conditions should be required of the cloud solution. The second issue for public sector take-up of cloud concerns the extent to which EU public procurement legislation is adapted to a cloud environment. One aspect of this is the need to fund innovative new cloud services for the public sector and the requirement to use procurement models that do not infringe state aid rules. This paper concludes by assessing whether new or different EU legislation or guidance is needed for public sector data classification or for public procurement in order to facilitate to public sector cloud take-up.

      PubDate: 2016-12-14T17:02:14Z
       
  • Data analytics and consumer profiling: Finding appropriate privacy
           principles for discovered data
    • Abstract: Publication date: October 2016
      Source:Computer Law & Security Review, Volume 32, Issue 5
      Author(s): Nancy J. King, Jay Forder
      In Big Data, the application of sophisticated data analytics to very large datasets makes it possible to infer or derive (“to discover”) additional personal information about consumers that would otherwise not be known from examining the underlying data. The discovery and use of this type of personal information for consumer profiling raises significant information privacy concerns, challenging privacy regulators around the globe. This article finds appropriate privacy principles to protect consumers' privacy in this context. It draws insights from a comparative law study of information privacy laws in the United States and Australia. It examines draft consumer privacy legislation from the United States to reveal its strengths and weaknesses in terms of addressing the significant privacy concerns that relate to Big Data's discovery of personal data and subsequent profiling by businesses.

      PubDate: 2016-12-14T17:02:14Z
       
  • Cybersecurity in the Internet of Things: Legal aspects
    • Abstract: Publication date: October 2016
      Source:Computer Law & Security Review, Volume 32, Issue 5
      Author(s): Rolf H. Weber, Evelyne Studer
      The explosion in the number of smart, connected, and inherently insecure devices is shifting the security paradigm. While the Internet of Things technological shift will require clear legal frameworks, alternative approaches also need to be developed. This article examines the changing legal cybersecurity environment in the Internet of Things context. It discusses selected applicable international regulations as well as alternative approaches to addressing the security issues arising in the Internet of Things.

      PubDate: 2016-12-14T17:02:14Z
       
  • Why research may no longer be the same: About the territorial scope of the
           New Data Protection Regulation
    • Abstract: Publication date: October 2016
      Source:Computer Law & Security Review, Volume 32, Issue 5
      Author(s): E.J. Kindt
      In an innovative digital information society, research plays a key role. This research is no longer an individual and national activity, but is increasingly collaborative involving various resources, stakeholders and countries. For this purpose, research platforms are set up as they offer various advantages. In this article, we discuss examples of such research platforms and their benefits, including but not limited to the BEAT platform for biometric technology testing. After an analysis of the current and of the new territorial application rules under the data protection legislation, we investigate the consequences of these new rules for research and platforms in four particular situations. We warn and advise the regulator that research platforms and the use of other equipment for the collection and processing of personal data in the Union for research may escape from data protection legislation once the new data protection regulation applies. This is due to the revised territorial application rules in the new regulation. We therefore plead for more reflection and clear terminology and for keeping the criterion of the use of equipment for the territorial application of data protection legislation. Rejecting this criterion may result in considerable better (competitive) positions for non-Union companies and institutions collecting and using personal data collected in the Union for research as compared to Union research organisations.

      PubDate: 2016-12-14T17:02:14Z
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.158.152.80
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016