scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2014"


Journal ArticleDOI
TL;DR: The analysis concludes that careful consideration is needed of the adequacy of controls over the impacts of drones on two important values – public safety, and behavioural privacy.

183 citations


Journal ArticleDOI
TL;DR: A review of current and emergent regulatory arrangements identifies a considerable range of gaps and uncertainties that need to be addressed, particularly in relation to small drones, including micro-drones.

133 citations


Journal ArticleDOI
TL;DR: An assessment of the impacts of drones on behavioural privacy identifies a set of specific threats that are created or exacerbated, both general and specific to various forms of surveillance.

74 citations


Journal ArticleDOI
TL;DR: In this paper, the authors propose a revision of the "notice and consent" model focused on the opt-in and proposes the adoption of a different approach when, such as in Big Data collection, the data subject cannot be totally aware of the tools of analysis and their potential output.

48 citations


Journal ArticleDOI
TL;DR: In this article, the legal issues encountered during the assembly of texts into so-called "corpora" as well as the use of such corpora are discussed, including contract law, copyright law and database law.

40 citations


Journal ArticleDOI
TL;DR: This work states that many organisations will be embarking on Big Data projects in the next couple of years in order to be in a position to know more about their customers than their competitors.

39 citations


Journal ArticleDOI
TL;DR: Given that the existing system of laws does not provide a sufficient response to a possible threat to fundamental rights, how should the legislature regulate the use of UAVs, without harming the delicate balance between the advantages and disadvantages inherent in their use?

34 citations


Journal ArticleDOI
TL;DR: It is argued that geo-location data are indeed a type of personal data, and a strengthening of the existing law that protects personal data (including location data), and a flexible legal response that can incorporate the ever-evolving and unknown advances in technology are needed.

33 citations


Journal ArticleDOI
TL;DR: Critical literatures exist in relation to computing, data communications, robotics, cyborgisation and surveillance, and an inspection of those literatures should provide insights into the limitations of drones, and the impacts and implications arising from their use.

29 citations


Journal ArticleDOI
TL;DR: The role that technology may play in enhancing the great game of football is speculated about and some comparison between the rules of this sport and therules of law is drawn.

28 citations


Journal ArticleDOI
TL;DR: This analysis of the legislative and prosecution-based responses in five Commonwealth countries highlights the need for clear national and international definitions as the lack of consistency in the international legislative environment creates opportunities for sexual exploitation of children.


Journal ArticleDOI
TL;DR: In the context of mobile commerce, the simple ‘notice and consent’ measure may not be a very useful measure to enhance control; moreover, shifting the burden of privacy protection to data subjects' self-control mayNot be sufficient for meaningful privacy protection in the era of Big Data.

Journal ArticleDOI
Tomi Mikkonen1
TL;DR: The general level of awareness was low: only 43% of the controllers were aware of the forthcoming reform and the willingness to act or to take steps towards the compliance was even lower: 31% of controllers said that they are planning to act towards compliance during this year.

Journal ArticleDOI
TL;DR: It is concluded that traditional models of identity protection need supplementing with new ways of thinking, including pioneering ‘technical-legal’ initiatives that are sensitive to the different risks that threaten the authors' digital identity integrity.

Journal ArticleDOI
TL;DR: In this paper, the authors assess the proposed GDPR through the framework of default entitlements in personal data and cautions against the possibility of reducing the European system of data protection rooted in the values of individual autonomy and informational self-determination to a mere set of administrative rules, yet without a clear direction.

Journal ArticleDOI
TL;DR: In this article, the authors argue that even in those circumstances where the principle does not immediately apply because mass surveillance is undertaken before any criminal charge is issued, the collection of information and potential evidence limits the guarantees offered by the principle during the stages of a legal process.

Journal ArticleDOI
TL;DR: The principles in the Korean law are clearly the strongest in Asia, although this is not yet fully complemented on the enforcement side, and a brief comparison is made with proposed European Union and Council of Europe reforms.

Journal ArticleDOI
TL;DR: The author finds the concepts of both ‘personal data’ and ‘anonymisation’ (which must be protected) misleadingly simplistic and proposes some consequential changes to the proposed EU Regulation, albeit with modest hopes for success.


Journal ArticleDOI
TL;DR: The issues of whether the authors have a right to privacy anymore, who should be making decisions about what is available and where and how a global convention on access to information might be achieved are addressed.

Journal ArticleDOI
TL;DR: The EU/U.S. comparative law analysis provided in this paper aims to help energy suppliers and regulators craft opt out mechanisms to protect individual privacy and data protection rights while also achieving important societal benefits from smart meters.

Journal ArticleDOI
TL;DR: The Grand Chamber has ruled that the data retention directive was invalid ex tunc since it seriously interfered with the fundamental rights to respect for private life and protection of personal data and exceeded the limits of the principle of proportionality.

Journal ArticleDOI
TL;DR: In this paper, the authors examine the issues posed by cross-border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity.

Journal ArticleDOI
Christopher Rees1
TL;DR: The authors argue that the correct approach which the law should adopt is a proprietary one, which is to say that the protection of the economic value inherent in personal information should be grounded in property rights acknowledged by the law.

Journal ArticleDOI
TL;DR: It is found that search engines are data controllers in respect of their search results and that a ‘right to be forgotten’ online applies to outdated and irrelevant data in search results unless there is a public interest in the data remaining available and even where the search results link to lawfully published content.

Journal ArticleDOI
TL;DR: A comparative overview and evaluation of various legal frameworks for electronic communications security in light of the recent developments in the electronic communications sector is provided.

Journal ArticleDOI
TL;DR: The analysis that follows will highlight the Council's data protection system currently in effect as well as developments relating to the Convention's amendment so far with the aim of identifying improvements and shortcomings.

Journal ArticleDOI
TL;DR: To what extent there is a real battle between telcos and OTTs or if both parties are already finding their own ways to overcome their (apparent) disputes is explored.

Journal ArticleDOI
TL;DR: Traditional contractual models developed for IP distribution and the legal framework of existing copyright law that is centered on the core idea of the “use” of the copy are no longer adequate regulators in the digital era where remote access to objects of copyright will soon start to dominate.