Academic Journals Database
Disseminating quality controlled scientific knowledge

Journal of International Commercial Law and Technology

ISSN: 1901--8401
Publisher: International Association of IT Lawyers


ADD TO MY LIST
 
Admiralty Law and Imaginative Precision in Lord Jim

Author(s): Hilton Staniland
Volume: 8
Issue: 4
Year: 2013
Improving Patent Quality through Pre-grant Opposition in Thailand

Author(s): Wanwipar Puasiri
Volume: 8
Issue: 4
Year: 2013
VoIP: A Corporate Governance Approach to Avoid the Risk of Civil Liability

Author(s): Tian Gerber | Kerry-Lynn Thomson | Mariana Gerber
Volume: 8
Issue: 4
Year: 2013
Freedom of Contract in the EU and China

Author(s): Junwei Fu
Volume: 8
Issue: 4
Year: 2013
How to Achieve 15 Minutes (or More) of Fame through YouTube

Author(s): Liz Lavaveshkul
Volume: 7
Issue: 4
Year: 2012
Legal Systems in Transformation and Transnational Conflict Solution in Information Society

Author(s): Arnaldo Sobrinho de Morais Neto | Harrisson Alexandre Targino | Thalysor Mota Vidal Nóbrega
Volume: 7
Issue: 4
Year: 2012
Does Intangible Cultural Heritage Law Resolve Everything in China?

Author(s): Luo Li
Volume: 7
Issue: 4
Year: 2012
A User-Unfriendly Draft: 3rd Revision of the Chinese Copyright Law

Author(s): Hong Xue
Volume: 7
Issue: 4
Year: 2012
Can You Ever Regulate the Virtual World Against Economic Crime?

Author(s): Clare Chambers
Volume: 7
Issue: 4
Year: 2012
The Legal and Regulatory Framework of Mobile Banking and Mobile Payments in South Africa

Author(s): Vivienne Lawack-Davids
Volume: 7
Issue: 4
Year: 2012
Liability Exemptions Wanted! Internet Intermediaries’ Liability under UK Law

Author(s): Sophie Stalla-Bourdillon
Volume: 7
Issue: 4
Year: 2012
Is Cybercrime one of the weakest links in Electronic Government?

Author(s): Shalini Kesar
Volume: 6
Issue: 4
Year: 2011
SQL Injection - Database Attack Revolution And Prevention

Author(s): Ramakanth Dorai | Vinod Kannan
Volume: 6
Issue: 4
Year: 2011
Regulating File Sharing: Open Regulation for an Open Internet

Author(s): Michael Filby
Volume: 6
Issue: 4
Year: 2011
Taxonomy for Information Privacy Metrics

Author(s): Rasika Dayarathna
Volume: 6
Issue: 4
Year: 2011
Security Safeguards on e-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003

Author(s): Sonny Zulhuda | Ida Madieha bt. Abdul Ghani Azmi
Volume: 6
Issue: 4
Year: 2011
How Technically Savvy Is Your Legal Counsel?

Author(s): David Reavis
Volume: 3
Issue: 4
Year: 2008
Changing Faces of International Trade: Multilateralism to Regionalism

Author(s): Sayantan Gupta
Volume: 3
Issue: 4
Year: 2008
Appraising the Market Overt Exception

Author(s): Ji Lian Yap
Volume: 3
Issue: 4
Year: 2008
Financial Collateral Arrangements

Author(s): Gulenay Rusen
Volume: 2
Issue: 4
Year: 2007
Towards Privacy-Preserving Data Mining in Law Enforcement

Author(s): Stijn Vanderlooy | Joop Verbeek | Jaap van den Herik
Volume: 2
Issue: 4
Year: 2007
Cyber Crime and Business: How to not Get Caught by the Online Phisherman

Author(s): Nick Nykodym | Lisa Kahle-Piasecki | Sonny Ariss | Tracey A. Toussaint
Volume: 5
Issue: 4
Year: 2010
Keywords Advertising: Issues of Trademark Infringement

Author(s): Althaf Marsoof
Volume: 5
Issue: 4
Year: 2010
Telecommunications (interception and access) and its Regulation in Arab Countries

Author(s): Nazzal Kiswani
Volume: 5
Issue: 4
Year: 2010
ELECTRONIC FUNDS TRANSFER: EXPLORING THE DIFFICULTIES OF SECURITY

Author(s): MPAKWANA ANNASTACIA MTHEMBU
Volume: 5
Issue: 4
Year: 2010
Graphical Password: Usable Graphical Password Prototype

Author(s): Ali Mohamed Eljetlawi | Norafida Bt.Ithnin
Volume: 4
Issue: 4
Year: 2009
E-Commerce and Mobile Commerce in South Africa: Regulatory Challenges

Author(s): Z NTOZINTLE JOBODWANA
Volume: 4
Issue: 4
Year: 2009
Australian ‘Bikie’ Laws in the Absence of an Express Bill of Rights

Author(s): Anthony Gray
Volume: 4
Issue: 4
Year: 2009
Intellectual Capital in the World of Information Economies

Author(s): Angela Adrian
Volume: 3
Issue: 4
Year: 2008
Modality Mix of RFID Regulation

Author(s): Daniel Ronzani
Volume: 3
Issue: 4
Year: 2008
Data Sensitivity: Proposals for Resolving the Conundrum

Author(s): Karen McCullagh
Volume: 2
Issue: 4
Year: 2007
The Exclusivity of Ultrafast Communication Networks

Author(s): Bart Custers
Volume: 3
Issue: 4
Year: 2008
Bridging the Gap in the Doha Talks: A Look at Services Trade

Author(s): Rafael Leal-Arcas
Volume: 2
Issue: 4
Year: 2007
The Legal Implications of Reputation Risk Management for Franchisors

Author(s): Tom Burns
Volume: 2
Issue: 4
Year: 2007
Concept of Private Property in Space – An Analysis

Author(s): Jijo George Cherian | Job Abraham
Volume: 2
Issue: 4
Year: 2007
Global Competition Versus Regional Interests: FDI and Pharmaceuticals in India

Author(s): William O. Duperon | E. Mine Cinar
Volume: 5
Issue: 4
Year: 2010
Islam in the Digital Age: Counseling and Fatwas at the Click of a Mouse

Author(s): Mohamed Chawki
Volume: 5
Issue: 4
Year: 2010
Circumventing the Privity Rule in Malaysia

Author(s): Tan Pei Meng
Volume: 4
Issue: 4
Year: 2009
Revisiting the Historical ‘Copy-wrongs’ of ‘Copy-rights’! Are we resurrecting the Licensing era?

Author(s): Akhil Prasad | Aditi Agarwalai
Volume: 4
Issue: 4
Year: 2009
Contemporary Anti-Competitive Practices of Patents Usage

Author(s): Oleg Milchenko
Volume: 8
Issue: 3
Year: 2013
THE DATA PROTECTION COMPLIANCE PROGRAM

Author(s): Rosario Imperiali
Volume: 7
Issue: 3
Year: 2012
BOOK REVIEW: THE COPYRIGHT ENFORCEMENT ENIGMA

Author(s): Willem Grosheide
Volume: 7
Issue: 3
Year: 2012
Termination for Convenience Clauses and Good Faith

Author(s): Anthony Gray
Volume: 7
Issue: 3
Year: 2012
The Challenges in Safeguarding Financial Privacy in South Africa

Author(s): Naledi Thabang Masete
Volume: 7
Issue: 3
Year: 2012
Balancing the Inventors’ Interest against the Public Interest: The Case of the Patent Law of Qatar

Author(s): Mohamed Salem Abou El Farag
Volume: 7
Issue: 3
Year: 2012
Authentication of Electronic Records: Limitations of Indian Legal Approach

Author(s): Farooq A. Mir | M. Tariq Banday
Volume: 7
Issue: 3
Year: 2012
Legal Environments for Digital Trust: Trustmarks, Trusted Computing and the Issue of Legal Liability

Author(s): Yianna Danidou | Burkhard Schafer
Volume: 7
Issue: 3
Year: 2012
Employer’s Duty to Provide a Safe Working Environment

Author(s): Itumeleng Clarence Tshoose
Volume: 6
Issue: 3
Year: 2011
E-mail Communication for Provisional Sentence Summons

Author(s): Roy Samuel Lekala
Volume: 6
Issue: 3
Year: 2011
Redress for Consumers in terms of the Consumer Protection Act 68 of 2008: A Comparative Discussion

Author(s): Corlia Van Heerden | Jacolien Barnard
Volume: 6
Issue: 3
Year: 2011
The Development of Policy Recommendations for Enhanced Legal Support to ICT: Roadmapping Approach of LEGAL-IST Project

Author(s): Irina Neaga | Tarek M. Hassan | Chris D. Carter
Volume: 3
Issue: 3
Year: 2008
Thirty Years After: Anton Piller Orders and the Supreme and Federal Courts of Canada

Author(s): Jeff Berryman
Volume: 2
Issue: 3
Year: 2007
Development of Intellectual Property Laws and Foreign Direct Investment in Jordan

Author(s): Abdullah Nawafleh
Volume: 5
Issue: 3
Year: 2010
Relationships between Claim Structure and the Competitiveness of a Patent

Author(s): Takashi Miyazawa | Hiroshi Osada
Volume: 5
Issue: 3
Year: 2010
Addressing the Challenges posed by Cybercrime: A South African Perspective

Author(s): Fawzia Cassim
Volume: 5
Issue: 3
Year: 2010
Disguising Trade in Development Partnerships

Author(s): Priscilla Schwartz
Volume: 5
Issue: 3
Year: 2010
The 2008 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market

Author(s): Andy Jones | Craig Valli | Glenn S. Dardick | Ian Sutherland | Gareth D. O. Davies
Volume: 4
Issue: 3
Year: 2009
The Riddle of the Robots

Author(s): Jon Bing
Volume: 3
Issue: 3
Year: 2008
The Arbitration Law of the Dubai International Finance Centre

Author(s): Sam R. Luttrell
Volume: 3
Issue: 3
Year: 2008
Communication : A Vital Tool to Combat Cyber Crime

Author(s): Nick Nykodym | Robert Taylor
Volume: 2
Issue: 3
Year: 2007
Transborder Data Flows and Extraterritoriality: The European Position

Author(s): Yves Poullet
Volume: 2
Issue: 3
Year: 2007
International electronic contracting in the newest UN Convention

Author(s): Paul Przemyslaw Polanski
Volume: 2
Issue: 3
Year: 2007
Global Technology and Modern Commercial Agency of Necessity

Author(s): Tim Vollans
Volume: 3
Issue: 3
Year: 2008
Legal and Ethical Implications of GPS Vulnerabilities

Author(s): Muhammad Usman Iqbal | Samsung Lim
Volume: 3
Issue: 3
Year: 2008
A GUI Prototype for the Framework of Criminal Judicial Reasoning System

Author(s): Sotarat Thammaboosadee | Udom Silparcha
Volume: 4
Issue: 3
Year: 2009
Does Multilateralism Crowd Out Intra-Group Trade? Evidence from Some Developing Regions

Author(s): Chukwuma Agu | Anthonia I. Achike | Uchenna Amaeze
Volume: 4
Issue: 3
Year: 2009
PIRACY, FILE SHARING … AND LEGAL FIG LEAVES

Author(s): John Lambrick
Volume: 4
Issue: 3
Year: 2009
The Necessity of Sector Specific Regulation in Electronic Communications Law

Author(s): Antonios G. Broumas
Volume: 4
Issue: 3
Year: 2009
Governance Models for Interoperable Electronic Identities

Author(s): Tobias Mahler
Volume: 8
Issue: 2
Year: 2013
Electronic Identity for Europe: Moving from Problems to Solutions

Author(s): Norberto Norberto Nuno Gomes de Andrade
Volume: 8
Issue: 2
Year: 2013
Trademarks in New Markets: Simple Infringement or Cause for Evaluation?

Author(s): Katja Weckström
Volume: 7
Issue: 2
Year: 2012
Cybercrime

Author(s): Ronald C. Griffin
Volume: 7
Issue: 2
Year: 2012
Privacy & Terrorism Review Where Have We Come In 10 Years?

Author(s): Besar Xhelili | Emir Crowne
Volume: 7
Issue: 2
Year: 2012
Trademarks in Virtual Worlds: Law, Outlaws or New in-Laws?

Author(s): Katja Weckström
Volume: 7
Issue: 2
Year: 2012
Towards Crowdsourced Online Dispute Resolution

Author(s): Jaap van den Herik | Daniel Dimov
Volume: 7
Issue: 2
Year: 2012
Protection of trademarks and the Internet with respect to the Czech law

Author(s): Zuzana Slováková
Volume: 1
Issue: 2
Year: 2006
The Implementation of Public E- Services for Immovable Property Contracts in Lithuania : Legal Aspects

Author(s): Darius Stitilis, Rimantas Petrauskas, and Irmantas Rotomskis
Volume: 1
Issue: 2
Year: 2006
Intellectual Property Law & Competition Law

Author(s): Atul Patel | Auro Aurobinda Panda | Akshay Deo | Siddhartha Khettry | Sujith Philip Mathew
Volume: 6
Issue: 2
Year: 2011
Transfer of Contractual Risk and INCOTERMS :Brief Analysis of their Application in Brazil

Author(s): Frederico Eduardo Z. Glitz
Volume: 6
Issue: 2
Year: 2011
The Allotment Contract through the Hotel-keeper's General and Special Liability for Damage

Author(s): Mr.sc. Oliver Radolović
Volume: 6
Issue: 2
Year: 2011
The Fairness of ‘Stealing’ Knowledge for Education

Author(s): Ratnaria Wahid
Volume: 6
Issue: 2
Year: 2011
Defining the Current Corporate IT Risk Landscape

Author(s): Verine Etsebeth
Volume: 6
Issue: 2
Year: 2011
Secret Commissions in IT Contracts

Author(s): Tim Vollans
Volume: 5
Issue: 2
Year: 2010
Policing obscenity in Hong Kong

Author(s): Rebecca Ong
Volume: 4
Issue: 2
Year: 2009
Trends in Private Equity and Venture Capital Investments with Special Focus on the Booming India Growth Story

Author(s): Ritankar Sahu | Ananya Nath | Priyadarshi Banerjee
Volume: 4
Issue: 2
Year: 2009
The Failed SACU-USA Free Trade Agreement in Hindsight: A Lost Opportunity or Disaster Averted?

Author(s): Palollo Michael Lehloenya
Volume: 4
Issue: 2
Year: 2009
Sustainable Energy Infrastructure: Law, Policy and Practice

Author(s): Priscilla Schwartz
Volume: 4
Issue: 2
Year: 2009
Regional Integration Agenda for

Author(s): Amos Saurombe
Volume: 4
Issue: 2
Year: 2009
Trade, Aid and Human Rights: China’s Africa Policy in Perspective

Author(s): Uche Ofodile
Volume: 4
Issue: 2
Year: 2009
A Pseudonymous Peer-2-Peer Review System for Child Protection On-line

Author(s): Thomas Martin | Chis Durbin | Mark Pawlewski | David Parish
Volume: 5
Issue: 2
Year: 2010
Truth finding: Do Subsidies Continue After Privatization?

Author(s): Yu Wu
Volume: 3
Issue: 2
Year: 2008
The Idea-Expression Dichotomy: Indianizing an International Debate

Author(s): K.P. Abinava Sankar | Nikhil L.R. Chary
Volume: 3
Issue: 2
Year: 2008
The Impact of Legal Challenges on the Evolution of Web-based Intelligent Agents

Author(s): Yun Wan | Yue Liu
Volume: 3
Issue: 2
Year: 2008
Tapping and Data Retention in Ultrafast Communication Networks

Author(s): Bart Custers
Volume: 3
Issue: 2
Year: 2008
Negotiable Instruments, in Particular Bills of Exchange in Macau, China

Author(s): Jianhong Fan | Yang Tao
Volume: 2
Issue: 2
Year: 2007
Right of Disabled People to Accessible Internet

Author(s): Amir Majid
Volume: 2
Issue: 2
Year: 2007
Development of Consumer Credit Laws in Malaysia

Author(s): Ahmad Saufi Abdul Rahman
Volume: 2
Issue: 2
Year: 2007
Private-Public Sector Cooperation in Combating Cybercrime: In Search of a Model

Author(s): Susan W. Brenner
Volume: 2
Issue: 2
Year: 2007
The E-VAT Directive: Mitigating Tax Competition or Spurring It?

Author(s): Oleksandr Pastukhov
Volume: 2
Issue: 2
Year: 2007
Identity Theft and the Gullible Computer User: What Sun Tzu in The Art of War Might Teach

Author(s): Joseph Savirimuthu
Volume: 3
Issue: 2
Year: 2008
A Call From the Panopticon to the Judicial Chamber “Expect Privacy!”

Author(s): Julia Alpert Gladstone
Volume: 1
Issue: 2
Year: 2006
Intellectual Property or Intangible Chattel?

Author(s): Angela Adrian
Volume: 1
Issue: 2
Year: 2006
Book Review: Gábor Hamza's

Author(s): Adam Boóc
Volume: 1
Issue: 2
Year: 2006
Open Access to Legal Scholarship: Dropping the Barriers to Discourse and Dialogue

Author(s): Richard Danner
Volume: 7
Issue: 1
Year: 2012
Crimson Chaos: Sports Team Trademarks In Artwork And The Functionality Doctrine

Author(s): Todd Thurheimer
Volume: 7
Issue: 1
Year: 2012
“The sleeping lion needed protection” – lessons from the Mbube (Lion King) debacle

Author(s): Matome Melford Ratiba
Volume: 7
Issue: 1
Year: 2012
The Virtual Shareholders Meeting: How to make it work?

Author(s): Anatoli van der Krans
Volume: 2
Issue: 1
Year: 2007
Data Protection Online: Alternative Approaches to Sensitive Data?

Author(s): Rebecca Wong
Volume: 2
Issue: 1
Year: 2007
Establishing Legal Order in the Digital World: Local Laws and Internet Content Regulation

Author(s): Yulia A. Timofeeva
Volume: 1
Issue: 1
Year: 2006
Uniformity v. Diversity of Internet Intermediaries’ Liability Regime: Where does the ECJ stand?

Author(s): Sophie Stalla-Bourdillon
Volume: 6
Issue: 1
Year: 2011
Alternative Dispute Resolution and Art-Law - A New Research Project of the Geneva Art-Law Centre

Author(s): Anne Laure Bandle | Sarah Theurich
Volume: 6
Issue: 1
Year: 2011
Intermediary Liability and Child Pornography: A Comparative Analysis

Author(s): Arun B. Mattamana | Anjali Anchayil
Volume: 5
Issue: 1
Year: 2010
Cyber Crime Law in India: Has Law Kept Pace with Emerging Trends? An Empirical Study

Author(s): N. S. Nappinai
Volume: 5
Issue: 1
Year: 2010
New Challenges and Possible Policy Options for the Regulation of Electronic Identity

Author(s): Anssi Hoikkanen | Margherita Bacigalupo | Ramón Compañó | Wainer Lusoli | Ioannis Maghiros
Volume: 5
Issue: 1
Year: 2010
Share’a: Intellectual Theft or Intellectual Infringement?

Author(s): Moh’d Amin Naser | Walid H.M Muhaisen
Volume: 4
Issue: 1
Year: 2009
Too far down the Yellow Brick Road – Cyber-hysteria and Virtual Porn

Author(s): Maureen Johnson | Kevin M Rogers
Volume: 4
Issue: 1
Year: 2009
Development in World Trade law

Author(s): Priscilla Schwartz
Volume: 4
Issue: 1
Year: 2009
EU Relations with China and Russia: How to Approach New Superpowers in Trade Matters

Author(s): Rafael Leal-Arcas
Volume: 4
Issue: 1
Year: 2009
The PRC Contract Law and Its Unique Notion of Subrogation

Author(s): Grace Li
Volume: 4
Issue: 1
Year: 2009
Service Orientation: Licensing Perspectives

Author(s): Dr. G.R. Gangadharan | Vincenzo D'Andrea
Volume: 4
Issue: 1
Year: 2009
Identifying Legal Concerns in the Biometric Context

Author(s): Yue Liu
Volume: 3
Issue: 1
Year: 2008
The Postal Acceptance Rule in the Digital Age

Author(s): Marwan Al Ibrahim | Ala’eldin Ababneh | Hisham Tahat
Volume: 2
Issue: 1
Year: 2007
The EC and enhancing ship and port facility security

Author(s): Ekaterina Anyanova
Volume: 2
Issue: 1
Year: 2007
Cyber Torts: Common Law and Statutory Restraints in the United States

Author(s): Gregory C. Mosier | Tara I. Fitzgerald | Tara I. Fitzgerald
Volume: 2
Issue: 1
Year: 2007
Towards A Supranational Internet Law

Author(s): Paul Przemyslaw Polanski
Volume: 1
Issue: 1
Year: 2006
Legal Issues Alone Are Not Enough to Manage Computer Fraud Committed by Employees

Author(s): Shalini Kesar
Volume: 1
Issue: 1
Year: 2006
Implementation of Internal Market Legislation Relevant to the Information Society

Author(s): Einar Hannesson
Volume: 1
Issue: 1
Year: 2006
The Labours of Valukas - Document Review and the Lehmans Report

Author(s): Bill Davies
Volume: 6
Issue: 1
Year: 2011
The Gordian Knot of Mobile TV Policy in Singapore

Author(s): T. C. Lin Trisha
Volume: 5
Issue: 1
Year: 2010
Why do you need a reservation system?      Affiliate Program