Computer Law & Security Review

Papers
(The TQCC of Computer Law & Security Review is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
Asia–Pacific developments146
Prospective implementation of ai for enhancing European (in)security: Challenges in reasoning of automated travel authorization decisions58
Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark?57
Stuxnet vs WannaCry and Albania: Cyber-attribution on trial43
European National News35
Tell me who your contacts are, or what can we learn from standard setting in the context of COVID-19 tracing apps33
Fine-tuning GPT-3 for legal rule classification33
Digital evidence in fog computing systems33
Asia Pacific31
An analysis of cybersecurity in Dutch annual reports of listed companies29
NFTs and the virtual yet concrete art of money laundering29
Diffusion of the Budapest Convention on cybercrime and the development of cybercrime legislation in Pacific Island countries: ‘Law on the books’ vs ‘law in action’25
Asia Pacific25
‘Algorithms and Law’ by Martin Ebers & Susana Navas25
European National News24
International and regional commitments in African data privacy laws: A comparative analysis24
European National News23
Asia Pacific23
The case against ‘Narrow’ price parity clauses21
Editorial Board21
UK further education sector journey to compliance with the general data protection regulation and the data protection act 201821
Shifting the digital paradigm: Towards a sui generis competition policy21
Contradictions and inconsistencies in Australia's mandatory data breach notification laws20
An institutional account of responsiveness in financial regulation- Examining the fallacy and limits of ‘same activity, same risks, same rules’ as the answer to financial innovation and regulatory arb20
The protection of human biodata: Is there any role for data ownership?19
Detecting resale price maintenance for competition law purposes: Proof-of-concept study using web scraped data18
The right to a fair trial as a conceptual framework for digital evidence rules in criminal investigations18
Professional Board18
FutureNewsCorp, or how the AI Act changed the future of news17
Protection path of personal data and privacy in China: Moving from monism to dualism in civil law and then in criminal law17
Critiquing the U.S. characterization, attribution and retaliation laws and policies for cyberattacks16
Ready or not? A systematic review of case studies using data-driven approaches to detect real-world antitrust violations16
Consumer neuro devices within EU product safety law: Are we prepared for big tech ante portas?16
Facial recognition technology, democracy and human rights15
A cybersecurity strategy fit for purpose? Introducing the special issue on EU cybersecurity: Collective resilience through regulation15
Data protection law beyond identifiability? Atmospheric profiles, nudging and the Stratumseind Living Lab14
The thin red line: Refocusing data protection law on ADM, a global perspective with lessons from case-law14
Incentivizing the sharing of healthcare data in the AI Era14
What's wrong with death images? Privacy protection of photographic images of the dead13
A preliminary study on artificial intelligence oracles and smart contracts: A legal approach to the interaction of two novel technological breakthroughs13
The platformisation of digital payments: The fabrication of consumer interest in the EU FinTech agenda13
Research on the dilemma and improvement of legal regulation for unfair competition related to corporate data in China13
Device manufacturers as controllers – Expanding the concept of ‘controllership’ in the GDPR13
The dual function of explanations: Why it is useful to compute explanations12
Why fairness cannot be automated: Bridging the gap between EU non-discrimination law and AI12
In principle vs in practice: User, expert and policymaker attitudes towards the right to data portability in the internet of things12
Can the GDPR make data flow for research easier? Yes it can, by differentiating! A careful reading of the GDPR shows how EU data protection law leaves open some significant flexibilities for data prot12
The joined cases of Dwyer, SpaceNet and VD and SR before the European Court of Justice: The judgments of the Grand Chamber about data retention continue falling on deaf ears in Member States12
Cybercrime awareness and victimisation in individuals over 60 years: A Portsmouth case study12
Financial instruments entail liabilities: Ether, bitcoin, and litecoin do not12
What the Dickens: Post-mortem privacy and intergenerational trust11
When data protection norms meet digital health technology: China's regulatory approaches to health data protection10
Fairness and justice through automation in China's smart courts10
Digital distortions and interpretive choices: A cartographic perspective on encoding regulation10
Regulating the use of electronic evidence in Chinese courts: Legislative efforts, academic debates and practical applications10
An evidence-based methodology for human rights impact assessment (HRIA) in the development of AI data-intensive systems10
Human-centric data protection laws and policies: A lesson from Japan10
Copyright trolling as threat to internet users’ legal and economic security: Comments in light of EU and US legislations10
Analysis of the attributes of rights to inferred information and China's choice of legal regulation10
A European right to end-to-end encryption?9
Mapping interpretations of the law in online content moderation in Germany9
The Metaverse impact on the politics means9
Copyright protection during the training stage of generative AI: Industry-oriented U.S. law, rights-oriented EU law, and fair remuneration rights for generative AI training under the UN's internationa9
A New Right to Procedural Accuracy: A Governance Model for Digital Evidence in Criminal Proceedings9
ETIAS system and new proposals to advance the use of AI in public services9
For whom is privacy policy written? A new understanding of privacy policies9
The role of the Council of Europe on the 40th anniversary of Convention 1088
Cybersecurity in a post-data environment: Considerations on the regulation of code and the role of producer and consumer liability in smart devices8
Making the private public: Regulating content moderation under Chinese law8
Editorial Board8
GDPR-compliant AI-based automated decision-making in the world of work8
Convention 108 and the GDPR: Trends and perspectives in Latin America8
Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity?8
From compliance to security, responsibility beyond law8
DLA Piper EU Update7
Averting enfeeblement and fostering empowerment: Algorithmic rights and the right to good administration7
The UK and the EU personal data framework after Brexit: A new trade and cooperation partnership grounded in Council of Europe Convention 108+?7
How to deal with virtual property crime: Judicial dilemma and a theoretical solution from China7
What competition law can do for data privacy (and vice versa)7
Toward a practical legal rule revision in legal debugging7
Asia-Pacific Developments7
European National News7
Patent trolls in China: Some empirical data7
Asia Pacific7
A Matter of (Joint) control? Virtual assistants and the general data protection regulation7
Pairing EU directives and their national implementing measures: A dataset for semantic search7
Enforcing legal information extraction through context-aware techniques: The ASKE approach6
Lost in translation? Critically assessing the promises and perils of Brazil's Digital Markets Act proposal in the light of international experiments6
Profiling and (automated) decision-making under the GDPR: A two-step approach6
Eu search for regulatory answers to crypto assets and their place in the financial markets’ infrastructure6
European National News6
The future EU postal regulation. What can be learnt from the telecommunication regulations6
Cyber operations and automatic hack backs under international law on necessity6
Introduction for computer law and security review: special issue “knowledge management for law”6
DLA Piper EU update6
The European AI liability directives – Critique of a half-hearted approach and lessons for the future6
Originality and the future of copyright in an age of generative AI6
China's Interim Measures on generative AI: Origin, content and significance5
Government procurement law and hacking technology: The role of public contracting in regulating an invisible market5
From insight to compliance: Appropriate technical and organisational security measures through the lens of cybersecurity maturity models5
The digital tokenization of property rights. A comparative perspective5
Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?5
The regulatory framework for the protection of critical infrastructures against cyberthreats: Identifying shortcomings and addressing future challenges: The case of the health sector in particular5
The right of access in automated decision-making: The scope of article 15(1)(h) GDPR in theory and practice5
Promoting more accountable AI in the boardroom through smart regulation5
Transparency of machine-learning in healthcare: The GDPR & European health law5
The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond5
Online content filtering in EU law – A coherent framework or jigsaw puzzle?5
Foreword: Advancements and challenges for Latin American AI and data governance5
Mapping the development of China's data protection law: Major actors, core values, and shifting power relations5
Regulation under administrative guidance: The case of China's forcing interoperability on digital platforms5
3.2688751220703