Computer Law & Security Review最新文献

筛选
英文 中文
Asia-Pacific Developments 亚太地区的发展
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-02-28 DOI: 10.1016/j.clsr.2025.106116
Gabriela Kennedy , Joanna Wong , Justin Lai , James North , Philip Catania , Michael do Rozario , Jack Matthews , Arun Babu , Gayathri Poti , Ishita Vats , Kiyoko Nakaoka , Lam Chung Nian , Emma Choe
{"title":"Asia-Pacific Developments","authors":"Gabriela Kennedy ,&nbsp;Joanna Wong ,&nbsp;Justin Lai ,&nbsp;James North ,&nbsp;Philip Catania ,&nbsp;Michael do Rozario ,&nbsp;Jack Matthews ,&nbsp;Arun Babu ,&nbsp;Gayathri Poti ,&nbsp;Ishita Vats ,&nbsp;Kiyoko Nakaoka ,&nbsp;Lam Chung Nian ,&nbsp;Emma Choe","doi":"10.1016/j.clsr.2025.106116","DOIUrl":"10.1016/j.clsr.2025.106116","url":null,"abstract":"<div><div>This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106116"},"PeriodicalIF":3.3,"publicationDate":"2025-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143601100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
European national news 欧洲国家新闻
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-02-25 DOI: 10.1016/j.clsr.2025.106114
Nick Pantlin
{"title":"European national news","authors":"Nick Pantlin","doi":"10.1016/j.clsr.2025.106114","DOIUrl":"10.1016/j.clsr.2025.106114","url":null,"abstract":"<div><div>This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.</div><div>© 2025 Herbert Smith Freehills LLP. Published by Elsevier Ltd. All rights reserved.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106114"},"PeriodicalIF":3.3,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143600490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
My AI, my code, my secret – Trade secrecy, informational transparency and meaningful litigant participation under the European Union's AI Liability Directive Proposal 我的人工智能,我的代码,我的秘密——欧盟人工智能责任指令提案下的商业保密、信息透明度和有意义的诉讼参与
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-02-21 DOI: 10.1016/j.clsr.2025.106117
Ljupcho Grozdanovski
{"title":"My AI, my code, my secret – Trade secrecy, informational transparency and meaningful litigant participation under the European Union's AI Liability Directive Proposal","authors":"Ljupcho Grozdanovski","doi":"10.1016/j.clsr.2025.106117","DOIUrl":"10.1016/j.clsr.2025.106117","url":null,"abstract":"<div><div>In European Union (EU) law, the AI Liability Directive (AILD) proposal included a right for victims of harm caused by high-risk AI systems to request the disclosure of relevant evidence. That right is, however, limited by the protection of trade secrets. During legal proceedings, business confidentiality can indeed restrict the victims’ access to evidence, potentially precluding them from fully understanding the disputed facts and effectively making their views known before a court. This article examines whether the AILD provided sufficient procedural mechanisms to ensure that litigants can effectively participate in judicial proceedings, even when critical evidence is withheld from them, due to legitimate trade secret protections. Our analysis draws on the evidentiary challenges highlighted in emerging global AI liability cases and selected CJEU case law, which provide guidance on how a balance can be struck between legitimate confidentiality and a workable level of informational transparency, necessary for an informed and fair resolution of future AI liability disputes.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106117"},"PeriodicalIF":3.3,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143453793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using sensitive data to de-bias AI systems: Article 10(5) of the EU AI act 使用敏感数据消除人工智能系统的偏见:欧盟人工智能法案第10(5)条
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-02-16 DOI: 10.1016/j.clsr.2025.106115
Marvin van Bekkum
{"title":"Using sensitive data to de-bias AI systems: Article 10(5) of the EU AI act","authors":"Marvin van Bekkum","doi":"10.1016/j.clsr.2025.106115","DOIUrl":"10.1016/j.clsr.2025.106115","url":null,"abstract":"<div><div>In June 2024, the EU AI Act came into force. The AI Act includes obligations for the provider of an AI system. Article 10 of the AI Act includes a new obligation for providers to evaluate whether their training, validation and testing datasets meet certain quality criteria, including an appropriate examination of biases in the datasets and correction measures. With the obligation comes a new provision in Article 10(5) AI Act, allowing providers to collect sensitive data to fulfil the obligation. Article 10(5) AI Act aims to prevent discrimination. In this paper, I investigate the scope and implications of Article 10(5) AI Act. The paper primarily concerns European Union law, but may be relevant in other parts of the world, as policymakers aim to regulate biases in AI systems.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106115"},"PeriodicalIF":3.3,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143419207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual justice, or justice virtually: Navigating the challenges in China’s adoption of virtual criminal justice 虚拟司法,或虚拟司法:应对中国采用虚拟刑事司法的挑战
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-02-08 DOI: 10.1016/j.clsr.2025.106112
Han Qin , Li Chen
{"title":"Virtual justice, or justice virtually: Navigating the challenges in China’s adoption of virtual criminal justice","authors":"Han Qin ,&nbsp;Li Chen","doi":"10.1016/j.clsr.2025.106112","DOIUrl":"10.1016/j.clsr.2025.106112","url":null,"abstract":"<div><div>Positioned within China’s <em>Trial Informatization</em> framework, the availability of virtual litigation has played a crucial role in enhancing access to justice. In the criminal justice system, the implementation of virtual litigation has transformed various areas, including pre-trial interviews, simplified criminal procedures, witness testimony, commutation hearings, and the reception of petitions. However, these technological advancements pose challenges to the authority, legitimacy, engagement and public deterrence aspects of criminal trials. To address these challenges, virtual litigation should be reframed as a tool to effect incremental change and be limited in application to cases where in-person hearings and other court processes are unfeasible. Further, more stringent rules need to be imposed on the finding of an implicit acceptance by accused persons to a remote trial process so as to preserve their autonomy. Courts should bear responsibility for third-party interfaces utlised as part of the criminal justice process, such as video conferencing platforms or digital document repositories. Finally, on the other side of the bench, defense counsel should have an equal say as the prosecution in determining whether a trial is conducted remotely.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106112"},"PeriodicalIF":3.3,"publicationDate":"2025-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143350252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adverse human rights impacts of dissemination of nonconsensual sexual deepfakes in the framework of European Convention on Human Rights: A victim-centered perspective 在《欧洲人权公约》框架内传播未经双方同意的性假新闻对人权的不利影响:以受害者为中心的观点
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-02-01 DOI: 10.1016/j.clsr.2025.106108
Can Yavuz
{"title":"Adverse human rights impacts of dissemination of nonconsensual sexual deepfakes in the framework of European Convention on Human Rights: A victim-centered perspective","authors":"Can Yavuz","doi":"10.1016/j.clsr.2025.106108","DOIUrl":"10.1016/j.clsr.2025.106108","url":null,"abstract":"<div><div>Generative artificial intelligence systems have advanced significantly over the past decade and can now generate synthetic but highly realistic audio, photo, and video, commonly referred to as deepfake. Image-based sexual abuse was the first widespread (mis)use of deepfake technology and continues to be the most common form of its misuse. However, further (empirical) research is needed to examine this phenomenon's adverse human rights implications. This paper analyses the potential adverse human rights impacts of the dissemination of nonconsensual sexual deepfakes in the framework of the European Convention on Human Rights and argues that the dissemination of such deepfakes can hinder the rights protected by the Convention. These include the right to respect for private and family life, as nonconsensual sexual deepfakes can undermine data protection, harm one's image and reputation, and compromise psychological integrity and personal autonomy. Additionally, such deepfakes can threaten freedom of expression by creating a silencing effect on public watchdogs, politicians, and private individuals. Finally, nonconsensual sexual deepfakes can impair the economic and moral rights of pornography performers by abusing their work and bodies to abuse others without authorization and compensation. These findings highlight that the Council of Europe member states must fulfil their obligations to provide effective protection against this technology-facilitated, gender-based, and sexual violence.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106108"},"PeriodicalIF":3.3,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To err is human: Managing the risks of contracting AI systems 人孰能无过:管理承包人工智能系统的风险
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-01-30 DOI: 10.1016/j.clsr.2025.106110
Maarten Herbosch
{"title":"To err is human: Managing the risks of contracting AI systems","authors":"Maarten Herbosch","doi":"10.1016/j.clsr.2025.106110","DOIUrl":"10.1016/j.clsr.2025.106110","url":null,"abstract":"<div><div>Artificial intelligence (AI) increasingly influences contract law. Applications like virtual home assistants can form contracts on behalf of users, while other AI tools can assist parties in deciding whether to contract. The advent of Generative AI has further accelerated and broadened the proliferation of such applications. However, AI systems are inherently imperfect, sometimes leading to unexpected or undesirable contracts, raising concerns about the legal protection of AI deployers.</div><div>Some authors have suggested that autonomous AI deployment cannot lead to a legally binding contract in the absence of a human “intent”. Others have argued that the system deployer is completely unprotected in cases of undesirable AI output. They argue that that deployment implies that the deployer should bear the risk of any mistake.</div><div>This article challenges these views by leveraging existing contract formation and mistake frameworks. Traditional analysis demonstrates that AI deployment can produce valid contracts. It also suggests that deployers may invoke the unilateral mistake doctrine, drawing parallels to clerical errors in human contracts. While AI outputs are probabilistic and unpredictable, similar characteristics apply to human decision-making. The potential benefits of AI development justify affording AI deployers protections analogous to those provided in traditional scenarios.</div><div>To enhance protection, deployers should use high-performing systems with safeguards such as oversight mechanisms and registration tools. As industry standards evolve, these safeguards will become more defined. The analysis concludes that current contract law frameworks are flexible enough to accommodate AI systems, negating the need for a complete overhaul.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106110"},"PeriodicalIF":3.3,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI, copyright and the AI Act 生成人工智能,版权和人工智能法案
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-01-29 DOI: 10.1016/j.clsr.2025.106107
João Pedro Quintais
{"title":"Generative AI, copyright and the AI Act","authors":"João Pedro Quintais","doi":"10.1016/j.clsr.2025.106107","DOIUrl":"10.1016/j.clsr.2025.106107","url":null,"abstract":"<div><div>This paper provides a critical analysis of the Artificial Intelligence (AI) Act's implications for the European Union (EU) copyright acquis, aiming to clarify the complex relationship between AI regulation and copyright law while identifying areas of legal ambiguity and gaps that may influence future policymaking. The discussion begins with an overview of fundamental copyright concerns related to generative AI, focusing on issues that arise during the input, model, and output stages, and how these concerns intersect with the text and data mining (TDM) exceptions under the Copyright in the Digital Single Market Directive (CDSMD).</div><div>The paper then explores the AI Act's structure and key definitions relevant to copyright law. The core analysis addresses the AI Act's impact on copyright, including the role of TDM in AI model training, the copyright obligations imposed by the Act, requirements for respecting copyright law—particularly TDM opt-outs—and the extraterritorial implications of these provisions. It also examines transparency obligations, compliance mechanisms, and the enforcement framework. The paper further critiques the current regime's inadequacies, particularly concerning the fair remuneration of creators, and evaluates potential improvements such as collective licensing and bargaining. It also assesses legislative reform proposals, such as statutory licensing and AI output levies, and concludes with reflections on future directions for integrating AI governance with copyright protection.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106107"},"PeriodicalIF":3.3,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigative genetic genealogy in Europe: Why the “manifestly made public by the data subject” legal basis should be avoided 欧洲的调查基因谱系:为什么应该避免“数据主体明显公开”的法律依据
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-01-10 DOI: 10.1016/j.clsr.2025.106106
Taner Kuru
{"title":"Investigative genetic genealogy in Europe: Why the “manifestly made public by the data subject” legal basis should be avoided","authors":"Taner Kuru","doi":"10.1016/j.clsr.2025.106106","DOIUrl":"10.1016/j.clsr.2025.106106","url":null,"abstract":"<div><div>Investigative genetic genealogy has emerged as an effective investigation tool in the last few years, gaining popularity, especially after the arrest of the Golden State Killer. Since then, hundreds of cases have been reported to be solved thanks to this novel and promising technique. Unsurprisingly, this success also led law enforcement authorities in the EU to experiment with it. However, there is an ambiguity on which legal basis in the EU data protection framework should be used to access the personal data of genetic genealogy database users for investigative purposes, which may put the legality and legitimacy of investigative genetic genealogy in Europe at stake. Accordingly, this article examines whether the “manifestly made public by the data subject” legal basis enshrined in Article 10(c) of the Law Enforcement Directive could be used for such purposes. Based on its analysis, the article argues that this legal basis cannot be used for such purposes, given that the personal data in question are not “manifestly made” “public”, and they are not disclosed “by the data subject” in all cases. Therefore, the article concludes by suggesting a way forward to ensure the lawfulness of this investigation method in the EU data protection framework.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106106"},"PeriodicalIF":3.3,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data rule hanging over platform competition: How does the GDPR affect social media market concentration? 数据规则笼罩着平台竞争:GDPR如何影响社交媒体市场集中度?
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2025-01-08 DOI: 10.1016/j.clsr.2024.106102
Qifan Yang , Yituan Liu
{"title":"Data rule hanging over platform competition: How does the GDPR affect social media market concentration?","authors":"Qifan Yang ,&nbsp;Yituan Liu","doi":"10.1016/j.clsr.2024.106102","DOIUrl":"10.1016/j.clsr.2024.106102","url":null,"abstract":"<div><div>Personal Data protection has become a cornerstone for policy in the digital sphere, significantly influencing the market behaviours of leading social media companies. This paper empirically studies the impact of the European Union’s General Data Protection Regulation (GDPR) on the social media market concentration in the EU, employing both the synthetic control method and the generalised difference-in-differences method. The findings reveal that the GDPR significantly reduced social media market concentration from 2015 to 2020, with a stronger impact on large companies. However, in the long term, the impact of the GDPR on EU social media market concentration is gradually fading, which has been very weak after 2020. Furthermore, the impact strength of the GDPR on the social media market concentration can be changed by Internet market scales and high technology levels. These insights contribute to a deeper understanding of how data protection policies shape the market dynamics of social media companies.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106102"},"PeriodicalIF":3.3,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信