INSECURE SOFTWARE IS EATING THE WORLD: PROMOTING CYBERSECURITY IN AN AGE OF UBIQUITOUS SOFTWARE-EMBEDDED SYSTEMS.Published in:Stanford Technology Law Review, 2017, v. 19, n. 3, p. 533By:Daley, JohnPublication type:Article
ACCOUNTABILITY IN ALGORITHMIC COPYRIGHT ENFORCEMENT.Published in:Stanford Technology Law Review, 2017, v. 19, n. 3, p. 473By:Perel, Maayan;Elkin-Koren, NivaPublication type:Article
TAKING TRUST SERIOUSLY IN PRIVACY LAW.Published in:Stanford Technology Law Review, 2017, v. 19, n. 3, p. 431By:Richards, Neil;Hartzog, WoodrowPublication type:Article
HAVING YOUR CAKE AND EATING IT TOO? ZERO-RATING, NET NEUTRALITY, AND INTERNATIONAL LAW.Published in:Stanford Technology Law Review, 2017, v. 19, n. 3, p. 364By:Carrillo, Arturo J.Publication type:Article