1.
|
The Case for Regulating Quality within Computer Security Applications Moore, Roksana; The University of Southampton
|
2.
|
Food and nano-food within the Chinese regulatory system: no need to have overregulation.Less physicality can produce more power. Poto, Margherita
|
3.
|
Cloud Computing: Centralization and Data Sovereignty De Filippi, Primavera - McCarthy, Smari
|
4.
|
Recent French decisions on database protection: Towards a more consistent and compliant approach with the Court of Justice’s case law? Derclaye, Estelle; University of Nottingham
|
5.
|
Editorial Maharg, Paul; Australian National University - Bloxham, Sefton
|
6.
|
Critical review of referencing software when used with OSCOLA Meredith, Sandra; Law Faculty, Oxford uni
|
7.
|
Smart Surveillance Technologies in Border Control Kenk, Vildana Sulić - Križaj, Janez - Štruc, Vitomir - Dobrišek, Simon; University of Ljubljana
|
8.
|
Privacy Enhancing of Smart CCTV and its Ethical and Legal Problems Koch, Heiner; IZEW - Matzner, Tobias; IZEW - Krumm, Julia; IZEW
|
9.
|
Copyright and Movements of Access: Business is Business, but Friends are Friends Kretschmann, Angela; UNISINOS - www.unisinos.br
|
10.
|
Actual Trends in Improvement of risk area security using combined methods for biometrical identification of subjects Pospisil, Radek - Skrob, Milan
|