Autor der Publikation

From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy ... The case of deep packet inspection technologies.

, , und . Comput. Law Secur. Rev., 30 (6): 670-686 (2014)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

Addressing Regulatory Requirements on Explanations for Automated Decisions with Provenance - A Case Study., , , , und . Digit. Gov. Res. Pract., 2 (2): 16e:1-16e:14 (2021)Corrigendum to 'Online monitoring, filtering, blocking ....What is the difference? Where to draw the line?' 2013 29 CLSR 702-712.. Comput. Law Secur. Rev., 30 (2): 223 (2014)The flip side of ISP's liability regimes: The ambiguous protection of fundamental rights and liberties in private digital spaces.. Comput. Law Secur. Rev., 26 (5): 492-501 (2010)Privacy vs. Security, , und . Springer Briefs in Cybersecurity Springer, (2014)An Extended Investigation of the Similarity Between Privacy Policies of Social Networking Sites as a Precursor for Standardization., , und . J. Web Sci., 2 (3): 31-44 (2016)A taxonomy of explanations to support Explainability-by-Design., , , und . CoRR, (2022)Nobody puts data in a corner? Why a new approach to categorising personal data is required for the obligation to inform., , und . Comput. Law Secur. Rev., 33 (2): 142-158 (2017)User Configurable Privacy Requirements Elicitation in Cyber-Physical Systems., , , , , , und . UMAP (Adjunct Publication), Seite 109-119. ACM, (2022)On networks and states - The global politics of Internet governance.. Comput. Law Secur. Rev., 27 (3): 327-328 (2011)From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy ... The case of deep packet inspection technologies., , und . Comput. Law Secur. Rev., 30 (6): 670-686 (2014)