scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2015"


Journal ArticleDOI
TL;DR: There is a growing need for appropriate regulatory as well as technical action in order to bridge the gap between the automated surveillance by IoT devices and the rights of individuals who are often unaware of the potential privacy risk to which they are exposed.

152 citations


Journal ArticleDOI
TL;DR: Factors leading to the occurrence of damage identified in the article confirm that the operation of AI is based on the pursuit of goals, which means that with its actions AI may cause damage; and thus issues of compensation will have to be addressed in accordance with the existing legal provisions.

85 citations


Journal ArticleDOI
TL;DR: The deployment of police body-worn cameras in five countries is analyzed, their suitability as an accountability tool given the associated privacy threats are investigated, and the societal impact of their deployment as well as the risk of function creep are discussed.

77 citations


Journal ArticleDOI
TL;DR: How the decision about the timing of a market introduction can be approached and how possible chilling effects of liability law can be redressed with an adequate system of obligatory insurance are examined.

76 citations


Journal ArticleDOI
TL;DR: The research reveals that the information security culture assessment (ISCA) instrument can be used, but that it can be further improved by incorporating additional privacy concepts, and that the IPCA can be enhanced by aligning it to information privacy attributes.

70 citations


Journal ArticleDOI
TL;DR: Based on the 17 most common data collection scenarios, the following aspects have been observed: there is a severe privacy trust crisis in China, females have lower trust in enterprises and social associations than males, and people with higher degrees possess stronger awareness of precautions and thus lower degree of trust.

43 citations


Journal ArticleDOI
TL;DR: This work proposes and test a vision of a personal information market with privacy, a four-space market model for personal data, which combines technical and legal measures that have been proposed byTechnical and legal scholars over the past two decades to compose something new.

40 citations


Journal ArticleDOI
TL;DR: In this article, an examination of Australian consumer law reveals that misleading and deceptive conduct and false testimonials in the form of fake online reviews are potentially actionable and that cases are starting to emerge which justify regulatory action.

38 citations


Journal ArticleDOI
TL;DR: This article addresses the arising issues and suggests innovative technological solutions for minimizing privacy infringements and negative impacts on the private sphere of individuals.

34 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigate China's growing P2P platforms and the dangers if this new form of lending is left unregulated, and propose a coordinated approach tackling potential risks endogenous in this sector.

30 citations


Journal ArticleDOI
TL;DR: In this paper, the authors discuss the practices that were deployed in the Netherlands and assesses them based on a multi-site study that examined the practices of 100 Dutch websites with regard to the installation of cookies.

Journal ArticleDOI
TL;DR: Investigation of better legal measures for the regulation of consumer protection in the mobile payment service area, particularly those measures relevant to non-financial institutions, considers possible legal solutions.

Journal ArticleDOI
TL;DR: The prevalence and satisfaction of existing technologies, including wiretapping, fingerprints, DNA research, database coupling, data mining and profiling, camera surveillance and network analyses, and the extent to which policing technologies are evaluated and yield success stories were investigated.

Journal ArticleDOI
TL;DR: It is argued that while these initiatives towards harmonisation of data protection policies in Africa are commendable they still require further reforms to ensure free flow of personal data across Africa.

Journal ArticleDOI
TL;DR: This paper provides a short description of the statute and an analysis of the most important provisions introduced while reflecting on how its introduction is accommodated within the Brazilian legal system.

Journal ArticleDOI
TL;DR: It is demonstrated that intermediaries' safe harbor will have to deal with the recognition of human rights that could open new horizons to the development of the regulation of the intermediary' liability.

Journal ArticleDOI
TL;DR: A critical review of the literature that offers and discusses definitions of the third wave of computing can be found in this article, where the authors present a framework for research into the technologies and their implications, distinguishing core from common attributes and identifying categories of inter-device interaction.

Journal ArticleDOI
TL;DR: It appears rather unproblematic to grant legal persons partial protection under privacy and data protection regimes, especially when it recognizes general duties of care for data processors and governmental agencies.

Journal ArticleDOI
Anna Bunn1
TL;DR: Whether a right to be forgotten has been recognised as an aspect of a broader right to privacy, and whether the Google decision moves us closer to an understanding of privacy as the right to an appropriate flow of information, in line with Nissenbaum's framework of contextual integrity is considered.


Journal ArticleDOI
TL;DR: Concerns are expressed that some of the basic military issues may have been overlooked in contextualizing cyber-attack in United Nations Charter jurisprudence.

Journal ArticleDOI
TL;DR: In the European Union, liability of Internet Intermediaries for third parties' content is regulated by the e-Commerce Directive as mentioned in this paper, which introduces liability exemptions for certain Internet intermediaries, subject to specific requirements.

Journal ArticleDOI
TL;DR: This paper provides an overview of the traditional tort remedies and a summary of the statutory schemes in Hong Kong.

Journal ArticleDOI
TL;DR: A framework within which simple baseline security can be established for small organisations, and consumers can also achieve lower levels of insecurity than currently prevail is presented.

Journal ArticleDOI
TL;DR: This Seminar is intended to encourage reflection upon how increasing digitisation and hyper-connectivity affects the authors' day-to-day interactions with those in power, as well as the security and privacy issues arising from them.

Journal ArticleDOI
TL;DR: It is argued that it is harm that lies at the heart of privacy and that, ultimately, the difference between the two concepts of privacy turns on the determination of when a particular harm is justifiable.

Journal ArticleDOI
TL;DR: The proportionality test as used by the Court of Justice of the EU in its decisions is taken as a starting point and whether this test is properly defined to accommodate technology developments and the increased surveillance of citizens with devices that are not originally built for the purpose of surveillance.

Journal ArticleDOI
TL;DR: The newly adopted and largely unnoticed Regulation No 910/2014 established unified rules across the EU for recognition of national electronic identification as well as the introduction of a variety of new trust services, which go beyond well-known digital signatures and timestamps.

Journal ArticleDOI
TL;DR: This paper sets out to explore a relatively undiscussed topic, namely the digitalised preventative policing practices on children under the United Nations CRC, and aims to open up the debate about the risks ProKid and similar initiatives bring along for children, and their families and about the CRC's potential to address these.

Journal ArticleDOI
TL;DR: This paper evaluates new regulations in Turkey in both general and comprehensive aspects, and reveals the importance of small differences in the Law compared to the EC Directives and how these do affect Turkey and can make them better.