scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2007"


Journal ArticleDOI
TL;DR: It is argued that users/consumers of RFID systems should be given the mandate to have control over their products and systems and in order to fully address solution to the security concerns.

61 citations


Journal ArticleDOI
TL;DR: The UK government has estimated that by 2008 compliance with WEEE obligations will cost the UK in excess of £100 million annually, although the new legislation is due to begin in January 2007.

30 citations


Journal ArticleDOI
TL;DR: The Batteries Directive as mentioned in this paper aims to reduce the amount of harmful substances that leak from used batteries when they are dumped with regular trash in landfill, which poses dangers to human health and the environment.

30 citations


Journal ArticleDOI
Jane Craghill1, Mark Watts1
TL;DR: The Review was published on 6th December 2006 and the following is an assessment of the main recommendations.

27 citations


Journal ArticleDOI
TL;DR: It is argued that the landscape of e-signatures regulations is divergent and fragmentary, which, to some extent, impedes the flow of international e-commerce.

20 citations


Journal ArticleDOI
TL;DR: It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising and the consumer willingness to accept mobile advertising will increase.

18 citations


Journal ArticleDOI
TL;DR: Olsen et al. as mentioned in this paper proposed a framework for identity management in the context of European data protection law, which involves both identity providers and other service providers, and analyzed how to ensure a compliant interaction with the end-user.

14 citations


Journal ArticleDOI
TL;DR: It is concluded that the reciprocities within and between the judiciary's sub-organisations represent great interest, and how dependent the judiciary is becoming upon its information services is examined.

14 citations


Journal ArticleDOI
TL;DR: This paper examines the legal aspects of UK corporate computer forensic investigations for incidents such as fraud, money laundering, accessing or distributing indecent images, harassment, industrial spying and identity theft.

12 citations


Journal ArticleDOI
TL;DR: The legal issues surrounding the development of RFID enabled smart cards can transform the delivery of services and goods, through the automated identification and verification of customers, resulting in significant efficiency gains and ultimately lower costs for consumers.

12 citations


Journal ArticleDOI
TL;DR: In this article, the authors draw a blueprint of such a system, which basically includes three schemes, namely the self-help communication mechanism, the alternative dispute resolution scheme, and the judicial procedure.

Journal ArticleDOI
TL;DR: Examination of intellectual property (“IP”) strategy and best business practices for research and development services in China finds that there is more practical control over the results of the R&D and IP can be better protected.

Journal ArticleDOI
TL;DR: Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of ‘phishing’.

Journal ArticleDOI
TL;DR: The Human Services (Enhanced Service Delivery) Bill 2007 as discussed by the authors was introduced into Parliament to establish Australia's Access Card ID system, which is only half of the blueprint for the ID system: the other half is yet to come in a Bill or Bills not yet seen.

Journal ArticleDOI
TL;DR: This paper looks into the history of this discussion and suggests that the ID card issue is now very clearly back on the agenda.

Journal ArticleDOI
TL;DR: This article seeks to address issues from the perspective of European data protection law, addressing the roles and responsibilities of collaborators and will analyse how to ensure a compliant interaction with the end-user.

Journal ArticleDOI
TL;DR: This article explores new computer misuse provisions by way of amendment to the Computer Misuse Act 1990 in the context of ‘denial-of-service’ attacks.

Journal ArticleDOI
Marcus Turle1
TL;DR: The emerging body of jurisprudence relating to s.40 of FOIA demonstrates that assessing the operation of the exemption requires a degree of sophistication, balancing the rights of FOIA applicants and the public with the privacy rights of public officials.

Journal ArticleDOI
Paul Ganley1
TL;DR: In this article, the authors examine a number of UK copyright law issues relevant to providers and users of IPTV services and examine how copyright impacts on what end-users can do with IPTV content they receive and what consequences this may have for IPTV providers.


Journal ArticleDOI
TL;DR: This article attempts to show that the coding of law into applications is haphazard, and investigates why some laws receive significant attention from software makers and others do not.


Journal ArticleDOI
TL;DR: The privacy concerns facing search engines, Google's current approach to privacy, and the work it has to do to convince European privacy regulators that this approach really does comply with data protection legislation are looked at.

Journal ArticleDOI
TL;DR: This paper analyses the proposed Payment Services Directive, which has been further weakened by the introduction of new amendments that reduced the payment provider's obligation by the European Parliament, after intense lobbying from the powerful banking institutions.

Journal ArticleDOI
Abida Chaudri1
TL;DR: This article defines and summarises the various types of domain names, how they are registered, the legal effects of registration, the WHOIS databases and, briefly, the interaction between domain names and intellectual property.

Journal ArticleDOI
TL;DR: An analysis of the UIGEA and its effects on Internet gambling firms, as well as related businesses is provided, suggesting that this legislation has reduced Internet gambling in publicly traded firms.


Journal ArticleDOI
TL;DR: Issues arising in developing country markets, particularly those where voice service competition is limited, are examined.

Journal ArticleDOI
TL;DR: UK law and practice on software inventions no longer reflects current thinking at the EPO, and that could have grave economic consequences for the software industry.

Journal ArticleDOI
TL;DR: To effectively harmonize IT law in different countries, it is argued that new legislation with respect to IT products, as well as the attempt to create a more general harmonization of copyright, has led to ‘disharmonization’, while the social problems arising from information technology have hardly been dealt with.