scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2010"


Journal ArticleDOI
TL;DR: In this article, the privacy and consumer risks that are associated with cloud computing are examined.

211 citations


Journal ArticleDOI
TL;DR: This paper examines the legal aspects of digital forensic investigations of cloud computing systems, a new paradigm to the distributed processing of digital data.

120 citations


Journal ArticleDOI
TL;DR: This article examines the two deterrence strategies available to nation-states and their three basic requirements and investigates whether the two most challenging aspects of cyber attacks – attribution and asymmetry – will make cyber attack deterrence an impossible task.

66 citations


Journal ArticleDOI
TL;DR: How the Directive applies to users and operators of social networks and social network applications is discussed, with particular attention drawn to the scope of the Directive, the obligations imposed on data controllers, the interpretation by Working Party 29, as well as the difficulties that are encountered when applying the aging Directive to the technological reality of today’s social networks.

46 citations


Journal ArticleDOI
TL;DR: The article examines the EU and U.S. regulatory frameworks for protecting privacy and personal data in regards to profiling by behavioural advertisers that targets mobile customers and identifies potential harms to privacy andpersonal data related to profiling for behavioural advertising.

43 citations


Journal ArticleDOI
TL;DR: This paper will look at the growing trend of charging minors who engage in “sexting” with child pornography charges by a case study of an actual prosecution, what the consequences of such a conviction entails in the United States, legislative responses, and an analysis of the appropriateness of using the legal system as a way of dealing with this problem.

38 citations


Journal ArticleDOI
TL;DR: This paper examines the legal tools available to ensure that privacy and personal data protection are respected in attempts to ensure the security of the authors' society, and finds that improvements are needed in the legal and regulatory framework if privacy is indeed to be respected by law enforcement authorities and intelligence agencies.

37 citations


Journal ArticleDOI
TL;DR: It is argued that there are a number of difficulties posed by such use concerning the respect of one's privacy, and a universally legally binding minimum core principles that could be applied indiscriminately to all privacy intrusive technology are developed.

34 citations


Journal ArticleDOI
TL;DR: This is the authors’ revised personal version of the text of the final journal article (to reflect changes made in the peer review process).

33 citations


Journal ArticleDOI
TL;DR: The authors review both legal and commercial risks associated with the procurement of new ticketing infrastructures and outline the key contractual issues to be addressed by operators in smart card ticketing projects.

28 citations


Journal ArticleDOI
TL;DR: A set of criteria for assessing the value of e-consumer protection schemes is outlined, followed by a presentation of the model's key features and the several ways in which the model can be applied in order to improve the usefulness of online consumer protection.

Journal ArticleDOI
TL;DR: As a social-networking tool, the use of Twitter can raise a variety of legal issues such as the right of publicity, breach of confidentiality, privacy infringement, fraud trademark infringement, copyright infringement, reverse username hijacking, among others.

Journal ArticleDOI
TL;DR: In games that attempt to encourage complex and enduring interactions among thousands of players, “griefing” has evolved from being an isolated nuisance to a social disease much in the same way crime has become the real world’s social disease.


Journal ArticleDOI
TL;DR: The aspects of CWC that could help to contain conflict in cyberspace are examined and the characteristics of cyber warfare that seem to defy traditional threat mitigation are explored.

Journal ArticleDOI
TL;DR: The legal and ethical ramifications of all the various processes of knowledge management from capturing, creation, sharing and dissemination of knowledge within an organization in Malaysia are explored.

Journal ArticleDOI
TL;DR: The article discusses the fundamental principles and information practices used in digital environments for protecting individuals' private data and a range of models that are available for regulating the collection, use and disclosure of personal data, such as legislation, self-regulation and technical approaches.

Journal ArticleDOI
TL;DR: Potential shortcomings in the provisions that most closely relate to this right to withdraw consent in the UK Act are highlighted, raising questions as to the extent of meaningful rights of revocation, and thus rights of informational privacy, afforded to individuals in a democratic society.

Journal ArticleDOI
TL;DR: Organisations should consider appointing an Open Source Compliance Officer and acquiring a software based indicator tool enabling a number of key governance processes (code review, setting agreed ‘do's and dont's’) to be automated.

Journal ArticleDOI
Marcus Turle1
TL;DR: The legal issues thrown up by the shared services model and ways of managing them are examined.

Journal ArticleDOI
TL;DR: In this paper, the authors assessed significant developments at the pan-European level with regards to the development, and implementation of Internet content blocking policies and argued that there could be a breach of Article 10 of the European Convention on Human Rights if blocking measures or filtering tools are used at state level to silence politically motivated speech on the Internet.

Journal ArticleDOI
TL;DR: This paper will deal with the challenges raised by proactive video surveillance technologies to the way how privacy and security have been balanced so far.

Journal ArticleDOI
TL;DR: In this paper, the authors look at the various approaches taken by the common law such as in Canada, and the legislative approach taken in the United Kingdom and discuss the options for how computer-generated works may be treated and suggestions for their best placement in copyright.

Journal ArticleDOI
TL;DR: In this article, the authors focus on the unique identification (UID) number, which it is proposed will be allocated to India's 1.2 billion people, with 600M UIDs to be allocated by 2015.

Journal ArticleDOI
TL;DR: The purpose of this article is to clarify what ‘identity' is and what is involved in verifying it, and to offer some general observations about identity cards.

Journal ArticleDOI
TL;DR: It is argued that, since China is an emerging global economic power, the combination of domestic social economic development, international trade and economic exchange will encourage China to observe international standards of privacy and personal data protection in its future regulatory response.

Journal ArticleDOI
TL;DR: On both the legal and the technical level, the German approach departs from other European countries, as it strictly distinguishes the electronic proof of identity from the electronic signature function, which the new ID card also provides.

Journal ArticleDOI
TL;DR: Whether there are any objections to implementing a mandatory eCall system in the Community and how these could be dealt with is examined and a possible eCall implementation in the community is looked at.

Journal ArticleDOI
TL;DR: The legal aspects of corporate computer usage policies including their creation, management, and their relevance to corporate computer forensic investigations are examined.

Journal ArticleDOI
Yue Liu1
TL;DR: An analysis of the current regulatory environment, at the federal level, of privacy protection concerning biometrics in Australia, focusing on the federal Privacy Act 1988 and the Biometrics Institute Privacy Code is provided.