본문 바로가기
HOME> 저널/프로시딩 > 저널/프로시딩 검색상세

저널/프로시딩 상세정보

권호별목차 / 소장처보기

H : 소장처정보

T : 목차정보

Computer law & security review : the international... 16건

  1. [해외논문]   Editorial Board   SSCI


    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. ii , 2017 , 0267-3649 ,

    초록

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  2. [해외논문]   Professional Board   SSCI


    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. iii , 2017 , 0267-3649 ,

    초록

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  3. [해외논문]   Editor's foreword   SSCI

    Saxby, S.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 1 - 2 , 2017 , 0267-3649 ,

    초록

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  4. [해외논문]   An academic perspective on the copyright reform   SSCI

    Stalla-Bourdillon, S. , Rosati, E. , Turk, K. , Angelopoulos, C. , Kuczerawy, A. , Peguera, M. , Husovec, M.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 3 - 13 , 2017 , 0267-3649 ,

    초록

    The recently proposed new Copyright Directive was released on 14 September 2016. It has been described by EU law-makers as the pillar of the copyright package promised by the European Commission (EC), to be delivered before the end of Mr. Juncker's mandate. In its Communication of 6 May 2015, the EC had stressed ''the importance to enhance cross-border access to copyright-protected content services, facilitate new uses in the fields of research and education, and clarify the role of online services in the distribution of works and other subject-matter.'' The proposed Copyright Directive is thus a key measure aiming to address two of these three issues. However it is not without shortfalls. We have therefore decided to publicly express our concerns and send an open letter to the European Commission, the European Parliament and the Council to urge them to re-assess the new provisions dealing with mandatory filtering of user-generated content in the light of the CJEU case law and the Charter of Fundamental Rights of the European Union. In a more extended statement, we examine in details the text of both the explanatory memorandum and the Directive itself. Our conclusions are: 1. A comprehensive re-assessment of Article 13 and Recital 39 in the light of the Charter of Fundamental Rights of the European Union and the E-commerce Directive (in particular Article 15) including CJEU case law is needed, as the proposed Copyright Directive does not expressly address the issue of its compatibility with both of these texts. 2. Recital 38 does not clarify the domain and effect of Article 13. Rather, it creates confusion as it goes against settled CJEU case law (relating to Articles 14 and 15 of the E-commerce Directive and Article 3 of the Infosoc Directive). Recital 38 should therefore be deleted or substantially re-drafted/re-phrased. If the EU wants to introduce a change in this regard it should clearly justify its choice. In any case, a recital in the preamble to a directive is not an appropriate tool to achieve this effect. We hope that this exercise will prove useful for the debate that has now begun both in the European Parliament and in the Council.

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  5. [해외논문]   ''In the public interest'': The privacy implications of international business-to-business sharing of cyber-threat intelligence   SSCI

    Sullivan, C. , Burger, E.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 14 - 29 , 2017 , 0267-3649 ,

    초록

    This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence. The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date. This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally. In this article, the authors examine whether static and dynamic IP addresses are ''personal data'' as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  6. [해외논문]   Opening up government data for Big Data analysis and public benefit   SSCI

    Hardy, K. , Maurushat, A.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 30 - 37 , 2017 , 0267-3649 ,

    초록

    Governments around the world are posting many thousands of their datasets on online portals. A major purpose of releasing this data is to drive innovation through Big Data analysis, as well as to promote government transparency and accountability. This article considers the benefits and risks of releasing government data as open data, and identifies the challenges the Australian government faces in releasing its data into the public domain. The Australian government has ambitious aims to release greater amounts of its data to the public. However, it is likely this task will prove difficult due to uncertainties surrounding the reliability of de-identification and the requirements of privacy law, as well as a public service culture which is yet to fully embrace the open data movement.

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  7. [해외논문]   Autonomous weapon system: Law of armed conflict (LOAC) and other legal challenges   SSCI

    Sehrawat, V.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 38 - 56 , 2017 , 0267-3649 ,

    초록

    The legality of autonomous weapon systems (AWS) under international law is a swiftly growing issue of importance as technology advances and machines acquire the capacity to operate without human control. This paper argues that the existing laws are ineffective and that a different set of laws are needed. This paper examines several issues that are critical for the development and use of AWS in warfare. It argues that a preemptive ban on AWS is irrelevant at this point and urges the appropriate authorities to develop a modern legal framework that is tailored to embrace these state-of-the-art weapons as the Law of Armed Conflict (LOAC) develops. First, this paper explores the myriad of laws designed to govern the potential future development and deployment of artificial intelligence and AWS in the context of International Humanitarian Law or LAOC. Second, the paper argues that it will be challenging for AWS to fulfill the requirements laid out under the International Committee of the Red Cross and LOAC for the rules of humanity, military necessity, distinction, proportionality and precaution, especially as it is related to noncombatants. Third, the paper discusses command responsibility and argues that states should establish accountability for wrongful acts committed by the AWS. Finally, this paper contends that there is an urgent need for a new legal framework to regulate these AWS and presents different solutions for the legal framework of AWS.

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  8. [해외논문]   How to attribute the right to data portability in Europe: A comparative analysis of legislations   SSCI

    Van der Auwermeulen, B.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 57 - 72 , 2017 , 0267-3649 ,

    초록

    The number of online services is constantly growing, offering numerous and unprecedented advantages for consumers. Often, the access to these services requires the disclosure of personal information. This personal data is very valuable as it concedes significant advantages over competitors, allowing better answers to the customer's needs and therefore offering services of a better quality. For some services, analysing the customers' data is at the core of their business model. Furthermore, personal data has a monetary value as it enables the service providers to pursue targeted advertising. Usually, the first companies who provide a service will benefit from large volumes of data and might create market entrance barriers for new online providers, thus preventing users from the benefits of competition. Furthermore, by holding a grip on this personal data, they are making it more expensive or burdensome for the user to shift to a new service. Because of this value, online services tend to keep collected information and impede their users to reuse the personal data they have provided. This behaviour results in the creation of a lock-in effect. Upcoming awareness for this problem has led to the demand of a right to data portability. The aim of this paper is to analyse the different legislative systems that exist or have been recently created in this regard that would grant a right to data portability. Firstly, this article draws up the framework of data portability, explaining its origin, general aspects, advantages as well as its possible downfalls. Secondly, the core of the article is approached as the different ways of granting data portability are analysed. In this regard, the possible application of European Competition Law to prohibit restrictions to data portability is examined. Afterwards, an examination of the application of U.S. Antitrust Law is made to determine whether it could be a source of inspiration for European legislators. Finally, an analysis of the new General Data Protection Regulation is made with respect to the development of data portability throughout the European legislative procedure. This article makes a cross-examination of legislations, compares them with one another in order to offer a reflection on the future of portable data in Europe, and finally attempts to identify the best approach to attribute data portability.

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  9. [해외논문]   Introducing the Open Clause to improve copyright flexibility in cyberspace? Analysis and commentary on the proposed ''two-step test'' in the Third Amendment to the Copyright Law of the PRC, in comparison with the EU and the US   SSCI

    Zhang, C.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 73 - 86 , 2017 , 0267-3649 ,

    초록

    The so called ''three-step test'', that the limitations and exceptions of copyright shall be allowed in certain special cases, provided that they do not conflict with a normal exploitation of the work and do not unreasonably prejudice the legitimate interests of the author, grants copyright flexibilities to balance the interests of all stakeholders, especially within the European system of circumscribed limitations and exceptions. This is essential for the domain of computer law, confronted by rapid and unpredictable global technological developments, and is, thus, enshrined in the most important international intellectual property (IP) treaties. Through the proposed third amendment to the Copyright Law of the PRC, the legislature intends to adopt this test while also introducing an open-ended list of limitations and exceptions that constitutes a China-specific ''two-step test.'' This contravenes prima facie the thesis endorsed by the WTO Panel in the case concerning Section 110(5) of the US Copyright Act in 2000. In contrast, court decisions in China frequently apply the fair use doctrine of US copyright law, neglecting to consider its peculiar context of the US common law tradition and, thus, unduly expanding the Chinese courts' discretionary power. This paper summarizes the case law in China and takes a comparative approach to address the divergence between the judicial application of cyber copyright law and the existing legislation. It suggests revising the proposed Article 43 of the Copyright Law of the PRC to capture the due interpretation of the three-step test, thereby finessing the delineation between rights protection and free use with the compensation of remuneration under the principle of proportionality. It argues that transplanting the US fair use doctrine into Chinese copyright law is feasible, but with the preconditions of endeavouring to strengthen judicial reform to integrate the IP adjudication systems, enhancing the coherence and efficiency of copyright enforcement, and facilitating consistent dialogues between scholars, practitioners, and lawmakers.

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지
  10. [해외논문]   Misuse of private information as a tort: The implications of Google v Judith Vidal-Hall   SSCI

    Mo, J.Y.C.
    Computer law & security review : the international journal of technology law and practice v.33 no.1 ,pp. 87 - 97 , 2017 , 0267-3649 ,

    초록

    The Court of Appeal in the recent decision of Google Inc v Judith Vidal Hall has made a number of remarkable rulings in the area of privacy. An important aspect of this decision is that it clarified the legal foundation in which an action for unauthorised disclosure of private information is found. However, the decision itself is not without flaws. This paper seeks to analyse potential problems with the action being classified as a tort as well as the scope of misuse of private information being a form of privacy protection.

    원문보기

    원문보기
    무료다운로드 유료다운로드

    회원님의 원문열람 권한에 따라 열람이 불가능 할 수 있으며 권한이 없는 경우 해당 사이트의 정책에 따라 회원가입 및 유료구매가 필요할 수 있습니다.이동하는 사이트에서의 모든 정보이용은 NDSL과 무관합니다.

    NDSL에서는 해당 원문을 복사서비스하고 있습니다. 아래의 원문복사신청 또는 장바구니담기를 통하여 원문복사서비스 이용이 가능합니다.

    이미지

    Fig. 1 이미지

논문관련 이미지