nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Addressing the risks of generative AI for the judiciary: The accountability framework(s) under the EU AI Act
|
Carnat, Irina |
|
|
55 |
C |
p. |
artikel |
2 |
A European right to end-to-end encryption?
|
Shurson, Jessica |
|
|
55 |
C |
p. |
artikel |
3 |
A New Right to Procedural Accuracy: A Governance Model for Digital Evidence in Criminal Proceedings
|
Stoykova, Radina (Adi) |
|
|
55 |
C |
p. |
artikel |
4 |
An Infrastructural Brussels Effect: The translation of EU Law into the UK's digital borders
|
Sullivan, Gavin |
|
|
55 |
C |
p. |
artikel |
5 |
Asia-Pacific Developments
|
|
|
|
55 |
C |
p. |
artikel |
6 |
Assessing trustworthy AI: Technical and legal perspectives of fairness in AI
|
Kattnig, Markus |
|
|
55 |
C |
p. |
artikel |
7 |
Bayesian deep learning: An enhanced AI framework for legal reasoning alignment
|
Zhang, Chuyue |
|
|
55 |
C |
p. |
artikel |
8 |
Bias and discrimination in ML-based systems of administrative decision-making and support
|
MAC, Trang Anh |
|
|
55 |
C |
p. |
artikel |
9 |
Christian perspectives on the regulation of posthumous medical data donation (PMDD): An empirical study
|
Pearce, Henry |
|
|
55 |
C |
p. |
artikel |
10 |
Collective cyber situational awareness in EU. A political project of difficult legal realisation?
|
Serini, Federico |
|
|
55 |
C |
p. |
artikel |
11 |
Contextualizing Personal Information: Privacy's Post-Neoliberal Constitutionalism and Its Heterogeneous Imperfections in China
|
Wang, Wayne Wei |
|
|
55 |
C |
p. |
artikel |
12 |
Conversion of cryptoassets
|
Lai, Jiabin |
|
|
55 |
C |
p. |
artikel |
13 |
Copyright protection during the training stage of generative AI: Industry-oriented U.S. law, rights-oriented EU law, and fair remuneration rights for generative AI training under the UN's international governance regime for AI
|
Li, Kaigeng |
|
|
55 |
C |
p. |
artikel |
14 |
Decentralized social networks and the future of free speech online
|
Huang, Tao |
|
|
55 |
C |
p. |
artikel |
15 |
Digital transformation in Russia: Turning from a service model to ensuring technological sovereignty
|
Martynova, Ekaterina |
|
|
55 |
C |
p. |
artikel |
16 |
Editorial Board
|
|
|
|
55 |
C |
p. |
artikel |
17 |
Editorial: Toward a BRICS stack? Leveraging digital transformation to construct digital sovereignty in the BRICS countries
|
Belli, Luca |
|
|
55 |
C |
p. |
artikel |
18 |
European National News
|
Pantlin, Nick |
|
|
55 |
C |
p. |
artikel |
19 |
European National News
|
Pantlin, Nick |
|
|
55 |
C |
p. |
artikel |
20 |
Fair and efficient asylum procedures and artificial intelligence: Quo Vadis due process?
|
Stewart, Ludivine Sarah |
|
|
55 |
C |
p. |
artikel |
21 |
For whom is privacy policy written? A new understanding of privacy policies
|
Ding, Xiaodong |
|
|
55 |
C |
p. |
artikel |
22 |
From smart legal contracts to contracts on blockchain: An empirical investigation
|
Bassan, Fabio |
|
|
55 |
C |
p. |
artikel |
23 |
Generative AI in EU law: Liability, privacy, intellectual property, and cybersecurity
|
Novelli, Claudio |
|
|
55 |
C |
p. |
artikel |
24 |
Global data governance at a turning point? Rethinking China-U.S. cross-border data flow regulatory models
|
Xu, Wanxiu |
|
|
55 |
C |
p. |
artikel |
25 |
Intimate harms and menstrual cycle tracking apps
|
Hammond, Eliza |
|
|
55 |
C |
p. |
artikel |
26 |
Mapping interpretations of the law in online content moderation in Germany
|
Wagner, Ben |
|
|
55 |
C |
p. |
artikel |
27 |
Privacy in Chinese iOS apps and impact of the personal information protection law
|
Kollnig, Konrad |
|
|
55 |
C |
p. |
artikel |
28 |
Procedural fairness in automated asylum procedures: Fundamental rights for fundamental challenges
|
Palmiotto, Francesca |
|
|
55 |
C |
p. |
artikel |
29 |
Resettlement by algorithm: Can artificial intelligence uphold human rights?
|
Ineli-Ciger, Meltem |
|
|
55 |
C |
p. |
artikel |
30 |
Royalty rate determination in standard essential patent litigation in China - from regional rate to global rate
|
Liu, Ying |
|
|
55 |
C |
p. |
artikel |
31 |
South Africa's Digital Transformation: Understanding the Limits of Traditional Policies and the Potential of Alternative Approaches
|
Hadzic, Senka |
|
|
55 |
C |
p. |
artikel |
32 |
Techno-authoritarianism & copyright issues of user-generated content on social- media
|
Chowdhury, Ahmed Ragib |
|
|
55 |
C |
p. |
artikel |
33 |
The Metaverse impact on the politics means
|
Mascitti, Matías |
|
|
55 |
C |
p. |
artikel |
34 |
The New F-word: The case of fragmentation in Dutch cybersecurity governance
|
Mirzaei, Parto |
|
|
55 |
C |
p. |
artikel |
35 |
Who is vulnerable to deceptive design patterns? A transdisciplinary perspective on the multi-dimensional nature of digital vulnerability 1 1 This article is the result of a fruitful transdisciplinary collaboration and all authors have contributed to the drafting of the first version of the paper. The main authors of each section are: Section 1: A. Rossi and L. Sánchez Chamorro (equally); Section 2: A. Rossi; Section 3: A. Rossi; Section 4: A. Rossi and L. Sánchez Chamorro (equally); Section 5: A. Rossi, R. Carli, M. Botes and A. Fernandez (equally); Section 6: L. Sánchez Chamorro, apart from Sections 6.3.1, 6.3.2, and 6.3.3 whose main author was A. Sergeeva and Section 6.4 whose main author was A. Rossi; Section 7.1: R. Carli; Section 7.2: A. Rossi; Section 7.3: L. Sánchez Chamorro; Section 7.4: A. Rossi and L. Sánchez Chamorro (equally); Section 8: A. Rossi.
|
Rossi, Arianna |
|
|
55 |
C |
p. |
artikel |