Computer Law & Security Review

Papers
(The median citation count of Computer Law & Security Review is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
Asia–Pacific developments146
Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions58
Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark?57
Stuxnet vs WannaCry and Albania: Cyber-attribution on trial43
European National News35
Digital evidence in fog computing systems33
Tell me who your contacts are, or what can we learn from standard setting in the context of COVID-19 tracing apps33
Fine-tuning GPT-3 for legal rule classification33
Asia Pacific31
An analysis of cybersecurity in Dutch annual reports of listed companies29
NFTs and the virtual yet concrete art of money laundering29
Diffusion of the Budapest Convention on cybercrime and the development of cybercrime legislation in Pacific Island countries: ‘Law on the books’ vs ‘law in action’25
Asia Pacific25
‘Algorithms and Law’ by Martin Ebers & Susana Navas25
European National News24
International and regional commitments in African data privacy laws: A comparative analysis24
European National News23
Asia Pacific23
The case against ‘Narrow’ price parity clauses21
Editorial Board21
UK further education sector journey to compliance with the general data protection regulation and the data protection act 201821
Shifting the digital paradigm: Towards a sui generis competition policy21
An institutional account of responsiveness in financial regulation- Examining the fallacy and limits of ‘same activity, same risks, same rules’ as the answer to financial innovation and regulatory arb20
Contradictions and inconsistencies in Australia's mandatory data breach notification laws20
The protection of human biodata: Is there any role for data ownership?19
Professional Board18
Detecting resale price maintenance for competition law purposes: Proof-of-concept study using web scraped data18
The right to a fair trial as a conceptual framework for digital evidence rules in criminal investigations18
Protection path of personal data and privacy in China: Moving from monism to dualism in civil law and then in criminal law17
FutureNewsCorp, or how the AI Act changed the future of news17
Consumer neuro devices within EU product safety law: Are we prepared for big tech ante portas?16
Critiquing the U.S. characterization, attribution and retaliation laws and policies for cyberattacks16
Ready or not? A systematic review of case studies using data-driven approaches to detect real-world antitrust violations16
Facial recognition technology, democracy and human rights15
A cybersecurity strategy fit for purpose? Introducing the special issue on EU cybersecurity: Collective resilience through regulation15
Incentivizing the sharing of healthcare data in the AI Era14
Data protection law beyond identifiability? Atmospheric profiles, nudging and the Stratumseind Living Lab14
The thin red line: Refocusing data protection law on ADM, a global perspective with lessons from case-law14
Device manufacturers as controllers – Expanding the concept of ‘controllership’ in the GDPR13
What's wrong with death images? Privacy protection of photographic images of the dead13
A preliminary study on artificial intelligence oracles and smart contracts: A legal approach to the interaction of two novel technological breakthroughs13
The platformisation of digital payments: The fabrication of consumer interest in the EU FinTech agenda13
Research on the dilemma and improvement of legal regulation for unfair competition related to corporate data in China13
The dual function of explanations: Why it is useful to compute explanations12
Why fairness cannot be automated: Bridging the gap between EU non-discrimination law and AI12
In principle vs in practice: User, expert and policymaker attitudes towards the right to data portability in the internet of things12
Can the GDPR make data flow for research easier? Yes it can, by differentiating! A careful reading of the GDPR shows how EU data protection law leaves open some significant flexibilities for data prot12
The joined cases of Dwyer, SpaceNet and VD and SR before the European Court of Justice: The judgments of the Grand Chamber about data retention continue falling on deaf ears in Member States12
Cybercrime awareness and victimisation in individuals over 60 years: A Portsmouth case study12
Financial instruments entail liabilities: Ether, bitcoin, and litecoin do not12
What the Dickens: Post-mortem privacy and intergenerational trust11
Copyright trolling as threat to internet users’ legal and economic security: Comments in light of EU and US legislations10
Analysis of the attributes of rights to inferred information and China's choice of legal regulation10
When data protection norms meet digital health technology: China's regulatory approaches to health data protection10
Fairness and justice through automation in China's smart courts10
Digital distortions and interpretive choices: A cartographic perspective on encoding regulation10
Regulating the use of electronic evidence in Chinese courts: Legislative efforts, academic debates and practical applications10
An evidence-based methodology for human rights impact assessment (HRIA) in the development of AI data-intensive systems10
Human-centric data protection laws and policies: A lesson from Japan10
ETIAS system and new proposals to advance the use of AI in public services9
For whom is privacy policy written? A new understanding of privacy policies9
A European right to end-to-end encryption?9
Mapping interpretations of the law in online content moderation in Germany9
The Metaverse impact on the politics means9
Copyright protection during the training stage of generative AI: Industry-oriented U.S. law, rights-oriented EU law, and fair remuneration rights for generative AI training under the UN's internationa9
A New Right to Procedural Accuracy: A Governance Model for Digital Evidence in Criminal Proceedings9
Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity?8
From compliance to security, responsibility beyond law8
The role of the Council of Europe on the 40th anniversary of Convention 1088
Cybersecurity in a post-data environment: Considerations on the regulation of code and the role of producer and consumer liability in smart devices8
Making the private public: Regulating content moderation under Chinese law8
Editorial Board8
GDPR-compliant AI-based automated decision-making in the world of work8
Convention 108 and the GDPR: Trends and perspectives in Latin America8
DLA Piper EU Update7
Averting enfeeblement and fostering empowerment: Algorithmic rights and the right to good administration7
The UK and the EU personal data framework after Brexit: A new trade and cooperation partnership grounded in Council of Europe Convention 108+?7
How to deal with virtual property crime: Judicial dilemma and a theoretical solution from China7
What competition law can do for data privacy (and vice versa)7
Toward a practical legal rule revision in legal debugging7
Asia-Pacific Developments7
European National News7
Patent trolls in China: Some empirical data7
Asia Pacific7
A Matter of (Joint) control? Virtual assistants and the general data protection regulation7
Pairing EU directives and their national implementing measures: A dataset for semantic search7
Originality and the future of copyright in an age of generative AI6
Introduction for computer law and security review: special issue “knowledge management for law”6
DLA Piper EU update6
The European AI liability directives – Critique of a half-hearted approach and lessons for the future6
Eu search for regulatory answers to crypto assets and their place in the financial markets’ infrastructure6
Enforcing legal information extraction through context-aware techniques: The ASKE approach6
Lost in translation? Critically assessing the promises and perils of Brazil's Digital Markets Act proposal in the light of international experiments6
Profiling and (automated) decision-making under the GDPR: A two-step approach6
European National News6
The future EU postal regulation. What can be learnt from the telecommunication regulations6
Cyber operations and automatic hack backs under international law on necessity6
The right of access in automated decision-making: The scope of article 15(1)(h) GDPR in theory and practice5
Promoting more accountable AI in the boardroom through smart regulation5
Transparency of machine-learning in healthcare: The GDPR & European health law5
The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond5
Online content filtering in EU law – A coherent framework or jigsaw puzzle?5
Foreword: Advancements and challenges for Latin American AI and data governance5
Mapping the development of China's data protection law: Major actors, core values, and shifting power relations5
Regulation under administrative guidance: The case of China's forcing interoperability on digital platforms5
China's Interim Measures on generative AI: Origin, content and significance5
Government procurement law and hacking technology: The role of public contracting in regulating an invisible market5
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models5
The digital tokenization of property rights. A comparative perspective5
Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?5
The regulatory framework for the protection of critical infrastructures against cyberthreats: Identifying shortcomings and addressing future challenges: The case of the health sector in particular5
Bayesian deep learning: An enhanced AI framework for legal reasoning alignment4
Council of Europe convention 108+: A modernised international treaty for the protection of personal data4
Rule of law or not? A critical evaluation of legal responses to cyberterrorism in the UK4
The legal nature of cryptocurrency as property: Accounting and taxation implications4
Global data governance at a turning point? Rethinking China-U.S. cross-border data flow regulatory models4
Legal evaluation of the attacks caused by artificial intelligence-based lethal weapon systems within the context of Rome statute4
Who is vulnerable to deceptive design patterns? A transdisciplinary perspective on the multi-dimensional nature of digital vulnerability4
Bias and discrimination in ML-based systems of administrative decision-making and support4
Procedural fairness in automated asylum procedures: Fundamental rights for fundamental challenges4
Harmonizing innovation and regulation: The EU Artificial Intelligence Act in the international trade context4
The flaws of policies requiring human oversight of government algorithms4
Dissecting liabilities in adversarial surgical robot failures: A national (Danish) and EU law perspective4
From smart legal contracts to contracts on blockchain: An empirical investigation4
Deepfakes: regulatory challenges for the synthetic society4
Media presentations of Vietnam's cybersecurity law: A comparative approach with corpus-based critical discourse analysis4
Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots4
Towards a right to repair for the Internet of Things: A review of legal and policy aspects4
Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.04
Exploring data protection challenges of automated driving4
The blocking of Booking/Etraveli – When the first victim of EU's anti-US tech stand was a European3
Royalty rate determination in standard essential patent litigation in China - from regional rate to global rate3
EU sanctions in response to cyber-attacks as crime-based emergency measures3
Internet court's challenges and future in China3
The right not to use the internet3
Education in a datafied world: Balancing children's rights and school's responsibilities in the age of Covid 193
AI trading and the limits of EU law enforcement in deterring market manipulation3
AI liability in Europe: How does it complement risk regulation and deal with the problem of human oversight?3
Pornography, sexual privacy and copyright3
Reconciling transparency and privacy through the European Digital Identity3
The right to self-determination in the digital platform economy3
The future of data protection: Gold standard vs. global standard3
The impact of the general data protection regulation on innovation and the global political economy3
Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards3
China's self-driving car legislation study3
Exclusivity and paternalism in the public governance of explainable AI3
Legal aspects of data cleansing in medical AI3
Regulating AI. A label to complete the proposed Act on Artificial Intelligence3
The Fundamental Rights Impact Assessment (FRIA) in the AI Act: Roots, legal obligations and key elements for a model template3
Will the GDPR Restrain Health Data Access Bodies Under the European Health Data Space (EHDS)?3
How platforms govern users’ copyright-protected content: Exploring the power of private ordering and its implications3
Processing of botnet tracking data under the GDPR3
Citizen scientists as data controllers: Data protection and ethics challenges of distributed science3
The many features which make the eIDAS 2 Digital Wallet either risky or the ideal vehicle for the transition to post-quantum encryption3
The complex relationship between Web2 giants and Web3 projects3
The rise of livestreaming e-commerce in China and challenges for regulation: A critical examination of a landmark case occurring during COVID-19 pandemic3
Shining a light on ‘going dark’: A framework to guide the co-design and communication of decryption laws based on the passage of the Telecommunications and Other Legislation (Assistance and Access) Bi3
The European Media Freedom Act (EMFA) as meta-regulation3
European national news3
Better alone than in bad company: Addressing the risks of companion chatbots through data protection by design3
The law and economics of AI liability3
The “Gold” Standard – China finalises the long-anticipated Standard Contract under the Personal Information Protection Law2
Taming digital gatekeepers: the ‘more regulatory approach’ to antitrust law2
Legal and technical questions of file system reverse engineering2
ITALIAN-LEGAL-BERT models for improving natural language processing tasks in the Italian legal domain2
South Africa's PNR regime: Privacy and data protection2
Crossing the Rubicon? The implications of RCEP on anti‐monopoly enforcement on dominant E‐commerce platforms in China2
Asia Pacific2
Fairness, AI & recruitment2
Players’ rights to game mods: Towards a more balanced copyright regime2
Collective cyber situational awareness in EU. A political project of difficult legal realisation?2
How far can Convention 108+ ‘globalise’? Prospects for Asian accessions2
Hidden depths: The effects of extrinsic data collection on consumer insurance contracts2
Two emerging principles of EU internet law: A comparative analysis of the prohibitions of general data retention and general monitoring obligations2
Public tenders, complaints, machine learning and recommender systems: a case study in public administration2
The curious case of regulating false news on Google2
Asia-Pacific Developments2
European National News2
Identification in personal data: Authenticating the meaning and reach of another broad concept in EU data protection law2
Open Banking goes to Washington: Lessons from the EU on regulatory-driven data sharing regimes2
Talking in the dark: Rules to facilitate open debate about lawful access to strongly encrypted information2
Decision-making by machines: Is the ‘Law of Everything’ enough?2
A survey of Network Neutrality regulations worldwide2
European National News2
Justification of the behavior regulatory pattern on data scraping2
Electronic personhood for artificial intelligence in the workplace2
Options towards a global standard for the protection of individuals with regard to the processing of personal data2
Legal knowledge management for prosecutors based on judgment prediction and error analysis from indictments2
Digital transformation in Russia: Turning from a service model to ensuring technological sovereignty2
The ‘Ethification’ of ICT Governance. Artificial Intelligence and Data Protection in the European Union2
The transformative nature of the EU Declaration on Digital Rights and Principles: Replacing the old paradigm (normative equivalency of rights)2
Our data? An examination of the possible role of individual consent in the regulation of posthumous medical data donation (PMDD)2
What post-mortem privacy may teach us about privacy2
The level of legal security of citizen journalists and social media users participating in public debate. Standards developed in the jurisprudence of the European Court of Human Rights (ECtHR) and the2
Priceless data: why the EU fundamental right to data protection is at odds with trade in personal data2
The two judgments of the European Court of Justice in the four cases of Privacy International, La Quadrature du Net and Others, French Data Network and Others and Ordre des Barreaux francophones et ge2
Untangling the cyber norm to protect critical infrastructures2
Smartphone platforms as privacy regulators2
Editorial Board2
Fair and efficient asylum procedures and artificial intelligence: Quo Vadis due process?2
Editorial Board2
Techno-authoritarianism & copyright issues of user-generated content on social- media2
Automated administrative decision-making under the influence of the GDPR – Early reflections and upcoming challenges2
The role of private and public regulation in the case study of crypto-assets: The Italian move towards participatory regulation2
Generative AI in EU law: Liability, privacy, intellectual property, and cybersecurity2
Monetary sovereignty in the digital era. The law & macroeconomics of digital private money2
Effective data protection by design through interdisciplinary research methods: The example of effective purpose specification by applying user-Centred UX-design methods1
The use of social media evidence in the courtroom: A survey of lawyer's experiences in Poland1
Can legitimate interest be an appropriate lawful basis for processing Artificial Intelligence training datasets?1
Balancing the platform responsibility paradox: A case for amplification regulation to mitigate the spread of harmful but legal content online1
The role of behavioural economics in shaping remedies for facebook's excessive data gathering1
Horizontal intervention, sectoral challenges: Evaluating the data act's impact on agricultural data access puzzle in the emerging digital agriculture sector1
A critical evaluation of China's legal responses to cyberterrorism1
Clarifying “personal data” and the role of anonymisation in data protection law: Including and excluding data from the scope of the GDPR (more clearly) through refining the concept of data protection1
European National News1
Artificial intelligence as a service: Legal responsibilities, liabilities, and policy challenges1
The battle of power: Enforcing data protection law against companies holding data power1
European National News1
From brussels effect to gravity assists: Understanding the evolution of the GDPR-inspired personal information protection law in China1
Licensing high-risk artificial intelligence: Toward ex ante justification for a disruptive technology1
A qualitative investigation of company perspectives on online price discrimination1
Reconsidering discrimination grounds in the data economy: An EU comparison of national constitutions1
Trilemma and tripartition: The regulatory paradigms of cross-border personal data transfer in the EU, the U.S. and China1
The financialisation of Crypto: Designing an international regulatory consensus1
Cybersecurity in the EU: How the NIS2-directive stacks up against its predecessor1
In defense of offense: information security research under the right to science1
Cybersecurity of Internet of Things in the health sector: Understanding the applicable legal framework1
European National News1
Editorial Board1
Limitations of the Freedom of Hyperlinking in the Fields of Copyright Law, Trademark Law and Unfair Competition Law: Is Case-by-case Approach Sufficient?1
Constructing a mutually supportive interface between ethics and regulation1
Discrimination for the sake of fairness by design and its legal framework1
European National News1
South Africa's Digital Transformation: Understanding the Limits of Traditional Policies and the Potential of Alternative Approaches1
Sentencing data-driven cybercrime. How data crime with cascading effects is tackled by UK courts1
Regulating targeted advertising: Addressing discrimination with transparency, fairness, and auditing tests remedies1
European National News1
A study on information privacy concerns and expectations of demographic groups in South Africa1
Using the blockchain to enable transparent and auditable processing of personal data in cloud- based services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) project1
On mapping values in AI Governance1
Struggling to strike the right balance between interests at stake: The ‘Yarovaya’, ‘Fake news’ and ‘Disrespect’ laws as examples of ill-conceived legislation in the age of modern technology1
How might the GDPR evolve? A question of politics, pace and punishment1
Countering online hate speech: How does human rights due diligence impact terms of service?1
Improving colloquial case legal judgment prediction via abstractive text summarization1
The European Health Data Space: An expanded right to data portability?1
Internet service providers as law enforcers and adjudicators. A public role of private actors1
The uncertain future of data retention laws in the EU: Is a legislative reset possible?1
DLA Piper's February EU Update1
Conversion of cryptoassets1
Beyond financial regulation of crypto-asset wallet software: In search of secondary liability1
0.04253101348877