LawCite Search |
LawCite Markup Tool |
Help |
Feedback
Law Cite |
Journal Article Title | Citation(s) | Author | Jurisdiction | Date | Full Text | Citation Index † | |
"WWWMDs: Cyber-Attacks Against Infrastructure in Domestic Anti-Terror Laws" | (2011) 27 Computer Law & Security Review 152 | Keiran Hardy | Netherlands | circa 2011 |
|
||
"The Limits of Privacy in Automated Profiling and Data Mining" | (2011) 27 Computer Law & Security Review 45 | Bart W Schermer | Netherlands | circa 2011 |
|
||
"s PSI Re-use Rules: Demystifying the Maze" | (2011) 27 Computer Law & Security Review 68 | Europe | Netherlands | circa 2011 |
|
||
Intellectual Property Rights – Artificial Intelligence and Intellectual Property� | (2011) 27 Computer Law & Security Review 601 | Computer Law & Security Review | Netherlands | circa 2011 |
|
||
"An Overview of EU Data Protection Rules on Use of Data Collected Online" | (2011) 27 Computer Law & Security Report 630 | Richard Jones and Dalal Tahri | Australia | circa 2011 |
|
||
Brussels I Regulationà | (2011) 27 Computer Law & Security Review 298 | Computer Law & Security Review | Netherlands | circa 2011 |
|
||
"Planning for the Succession of Digital Assets" | (2011) 27 Computer Law & Security Review 362 | L McKinnon | Netherlands | circa 2011 |
|
||
(2011) 27 Computer Law & Security Review 223 | (2011) 27 Computer Law & Security Review 223 | Computer Law & Security Review | Netherlands | circa 2011 |
|