International Review of Law, Computers and Technology
ISSN:1360-0869

International Review of Law, Computers and Technology

学科领域:-
是否预警:不在预警名单内
是否OA:
录用周期:-
新锐分区:-
年发文量:-
影响因子:0
JCR分区:Q0(未被收录)

基本信息

-
1360-0869Scopus收录
0
0
-
WOS期刊SCI分区  2024-2025最新升级版
暂无按学科分区信息
暂无h-index数据
-
----Social Sciences-Law
0%
时间预警情况
2026年03月发布的新锐学术版不在预警名单中
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
0.00%--
CiteScore:3.10
SJR:0.318
SNIP:0.987
学科类别分区排名百分位
大类:Social Sciences
小类:Law
Q1
170 / 1105
大类:Social Sciences
小类:Computer Science Applications
Q3
493 / 947

期刊高被引文献

Nudging citizens through technology in smart cities
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1590928
Terms of service and bills of rights: new mechanisms of constitutionalisation in the social media environment?
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1475898
‘Notice and staydown’ and social media: amending Article 13 of the Proposed Directive on Copyright
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1475906
An experimental approach to regulating non-military unmanned aircraft systems
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1429721
The proposed directive for the supply of digital content: is it fit for purpose?
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1562638
The United Nations data privacy system and its limits
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1426305
The reform of the EU data protection framework in the context of the police and criminal justice sector: harmonisation, scope, oversight and enforcement
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2017.1370224
An analysis of the fundamental tensions between copyright and social media: the legal implications of sharing images on Instagram
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1475897
The internet renaissance of collective management organisations: reflections on flat fee system and the role of collective management organisations
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1565639
The effect of child sexual exploitation images collection size on offender sentencing
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1560553
Secrecy and surveillance: lessons from the law of IMSI catchers
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1569872
Datafication as parenthesis: reconceptualising the best interests of the child principle in data protection law
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1590926
Can twitter change the Iranian legal landscape for women
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1475905
Editorial
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1475913
Anonymous Bitcoin v enforcement law
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1565105
Data trusts: more data than trust? The perspective of the data subject in the face of a growing problem
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1594621
I have a Facebook account, therefore I am – authentication with social networks
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1475895
Introduction: British and Irish law education and technology association conference (BILETA)
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2019.1565632
The right to removal in the time of post-google Spain: myth or reality under general data protection regulation?
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2018.1533752
Strengthening data privacy: the obligation of organisations to notify affected individuals of data breaches
来源期刊:International Review of Law, Computers & TechnologyDOI:10.1080/13600869.2017.1379368

相关文章