Oxford Index Search Results

You are looking at 1-6 of 6 items for:

decision-making x Law x IT and Communications Law x clear all

Refine by type

Refine by product

 

The Supremacy of Techno-Governance: Privatization of Digital Content and Consumer Protection in the Globalized Information Society

Nicola Lucchi.

in International Journal of Law and Information Technology

January 2007; p ublished online September 2006 .

Journal Article. Subjects: IT and Communications Law. 17822 words.

The article aims to describe the role of technology and contract in regulating access to digital content deregulating intellectual property law monopoly. In particular it argues that the...

Statistical information systems as a means to consistency and rationality in sentencing

A Lovegrove.

in International Journal of Law and Information Technology

January 1999; p ublished online January 1999 .

Journal Article. Subjects: IT and Communications Law. 0 words.

Systems providing statistical information on past sentencing practices for cases in respect of certain offence and offender characteristics are creating worldwide interest and yet have not...

Consumer Based Electronic Commerce: A Comparative Analysis of the Position in Malaysia and Hong Kong

Rebecca Ong.

in International Journal of Law and Information Technology

January 2004; p ublished online January 2004 .

Journal Article. Subjects: IT and Communications Law. 0 words.

Although consumer electronic commerce is growing at a significant rate, a number of stumbling blocks continue to hamper its development. One stumbling block relates to ensuring the trust and...

Big Data analytics: risks and responsibilities

K. Krasnow Waterman and Paula J. Bruening.

in International Data Privacy Law

May 2014; p ublished online May 2014 .

Journal Article. Subjects: Public International Law; IT and Communications Law. 5195 words.

Big data analytics sifts through mountains of data to identify or predict facts about individuals and to use those facts in decisions ranging from which...

Peer-to-peer privacy violations and ISP liability: data protection in the user-generated web

Mario Viola de Azevedo Cunha, Luisa Marin and Giovanni Sartor.

in International Data Privacy Law

May 2012; p ublished online March 2012 .

Journal Article. Subjects: Public International Law; IT and Communications Law. 14507 words.

Since the adoption of the EU e-Commerce Directive, web hosting has dramatically changed. User-generated content is usually uploaded onto platforms that...

Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study

Bonnie Brinton Anderson, C. Brock Kirwan, David Eargle, Scott R. Jensen and Anthony Vance.

in Journal of Cybersecurity

September 2015; p ublished online November 2015 .

Journal Article. Subjects: IT and Communications Law; Computer Science; Computer Security. 8564 words.

Users have long been recognized as the weakest link in security. Accordingly, researchers have applied knowledge from the fields of psychology and human–computer interaction to understand...

Go to »  full text: open access