2.5(top 20%)
impact factor
2.4K(top 10%)
papers
16.7K(top 10%)
citations
54(top 10%)
h-index
2.8(top 20%)
impact factor
4.4K
all documents
18.9K
doc citations
91(top 10%)
g-index

Top Articles

#TitleJournalYearCitations
1Internet of Things – New security and privacy challengesComputer Law and Security Review20101,043
2Unmanned aircraft systems: Surveillance, ethics and privacy in civil applicationsComputer Law and Security Review2012282
3EU General Data Protection Regulation: Changes and implications for personal data collecting companiesComputer Law and Security Review2018215
4Is a ‘smart contract’ really a smart idea? Insights from a legal perspectiveComputer Law and Security Review2017195
5Hackers — Heroes of the computer revolutionComputer Law and Security Review1986192
6Copyright in the blockchain era: Promises and challengesComputer Law and Security Review2018191
7E-residency and blockchainComputer Law and Security Review2017178
8Understanding the drone epidemicComputer Law and Security Review2014171
9Privacy and consumer risks in cloud computingComputer Law and Security Review2010168
10Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPRComputer Law and Security Review2018150
11Internet of things: Privacy issues revisitedComputer Law and Security Review2015142
12The right to data portability in the GDPR: Towards user-centric interoperability of digital servicesComputer Law and Security Review2018128
13The regulation of civilian drones' impacts on public safetyComputer Law and Security Review2014124
14Privacy impact assessment: Its origins and developmentComputer Law and Security Review2009121
15The new General Data Protection Regulation: Still a sound system for the protection of individuals?Computer Law and Security Review2016118
16Internet of things – Need for a new legal environment?Computer Law and Security Review2009105
17The Internet of Things (IoT) and its impact on individual privacy: An Australian perspectiveComputer Law and Security Review2016101
18The limits of privacy in automated profiling and data miningComputer Law and Security Review2011100
19AI and Big Data: A blueprint for a human rights, social and ethical impact assessmentComputer Law and Security Review2018100
20Protecting the privacy and security of sensitive customer data in the cloudComputer Law and Security Review201297
21Intellectual property law and practice in the blockchain realmComputer Law and Security Review201893
22Cybersecurity in the Internet of Things: Legal aspectsComputer Law and Security Review201691
23Digital evidence in cloud computing systemsComputer Law and Security Review201090
24The proposed data protection Regulation replacing Directive 95/46/EC: A sound system for the protection of individualsComputer Law and Security Review201289
25The EU Proposal for a General Data Protection Regulation and the roots of the ‘right to be forgotten’Computer Law and Security Review201388
26Robotics and law: Key legal and regulatory implications of the robotics age (Part I of II)Computer Law and Security Review201687
27Why fairness cannot be automated: Bridging the gap between EU non-discrimination law and AIComputer Law and Security Review202186
28Data protection in Germany I: The population census decision and the right to informational self-determinationComputer Law and Security Review200985
29The regulation of civilian drones' impacts on behavioural privacyComputer Law and Security Review201483
30Humans forget, machines remember: Artificial intelligence and the Right to Be ForgottenComputer Law and Security Review201883
31Opening up government data for Big Data analysis and public benefitComputer Law and Security Review201782
32Is “Big Data” creepy?Computer Law and Security Review201380
33Electronic health record: Wiring Europe’s healthcareComputer Law and Security Review201177
34Body-worn cameras for police accountability: Opportunities and risksComputer Law and Security Review201574
35Stifling artificial intelligence: Human perilsComputer Law and Security Review201674
36Internet of things – Governance quo vadis?Computer Law and Security Review201372
37Governing digital societies: Private platforms, public valuesComputer Law and Security Review202072
38Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protectionComputer Law and Security Review201671
39Liability for damages caused by artificial intelligenceComputer Law and Security Review201570
40Are ‘pseudonymised’ data always personal data? Implications of the GDPR for administrative data research in the UKComputer Law and Security Review201870
41Cybering, online grooming and ageplayComputer Law and Security Review200867
42Self-driving cars and the chilling effect of liability lawComputer Law and Security Review201567
43Location and tracking of mobile devices: Überveillance stalks the streetsComputer Law and Security Review201366
44A status reportComputer Law and Security Review199265
45Pricing privacy – the right to know the value of your personal dataComputer Law and Security Review201865
46Cloud computing and its implications for cybercrime investigations in AustraliaComputer Law and Security Review201363
47The ICO and artificial intelligence: The role of fairness in the GDPR frameworkComputer Law and Security Review201862
48The state of the art in privacy impact assessmentComputer Law and Security Review201261
49The ‘Right to be Forgotten’ – Worth remembering?Computer Law and Security Review201261
50Is it possible to grant legal personality to artificial intelligence software systems?Computer Law and Security Review201761