Sophie Stalla-Bourdillon
Orcid: 0000-0003-3715-1219
According to our database1,
Sophie Stalla-Bourdillon
authored at least 36 papers
between 2010 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Explainability-by-Design: A Methodology to Support Explanations in Decision-Making Systems.
CoRR, 2022
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022
Proceedings of the 7th International Conference on Internet of Things, 2022
2021
Addressing Regulatory Requirements on Explanations for Automated Decisions with Provenance - A Case Study.
Digit. Gov. Res. Pract., 2021
Comput. Law Secur. Rev., 2021
Comput. Law Secur. Rev., 2021
HSCT 2021 - Joined Up Data Equals Better Care: Facilitating Health and Social Care Transformation through Trustworthy and Collaborative Data Sharing: Welcome and Workshop Summary.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021
Connecting Regulatory Requirements to Audit Outcomes: A Model-driven Approach to Auditable Compliance.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, 2021
2020
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020
2019
Rethinking the "release and forget" Ethos of the Freedom of Information Act 2000: Why Developments in the Field of Anonymisaton Necessitate the Development of a New Approach to Disclosing Data.
Eur. J. Law Technol., 2019
2018
The GDPR: A game changer for electronic identification schemes? The case study of Gov.UK Verify.
Comput. Law Secur. Rev., 2018
Data Protection by Design for Cross-Border Electronic Identification: Does the eIDAS Interoperability Framework Need to Be Modernised?
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
2017
Identity Assurance in the UK: technical implementation and legal implications under eIDAS.
J. Web Sci., 2017
iCLIC Data Mining and Data Sharing workshop: The present and future of data mining and data sharing in the EU.
Comput. Law Secur. Rev., 2017
Nobody puts data in a corner? Why a new approach to categorising personal data is required for the obligation to inform.
Comput. Law Secur. Rev., 2017
2016
An Extended Investigation of the Similarity Between Privacy Policies of Social Networking Sites as a Precursor for Standardization.
J. Web Sci., 2016
IEEE Intell. Syst., 2016
Proceedings of the 8th ACM Conference on Web Science, 2016
Identity assurance in the UK: technical implementation and legal implications under the eIDAS regulation.
Proceedings of the 8th ACM Conference on Web Science, 2016
What's in a name: the conflicting views of pseudonymisation under eIDAS and the General Data Protection Regulation.
Proceedings of the Open Identity Summit 2016, 13-14 October 2016, Rome, Italy, 2016
Proceedings of the Open Identity Summit 2016, 13-14 October 2016, Rome, Italy, 2016
2015
Digital identity and French personality rights - A way forward in recognising and protecting an individual's rights in his/her digital identity.
Comput. Law Secur. Rev., 2015
Comput. Law Secur. Rev., 2015
Investigating Similarity Between Privacy Policies of Social Networking Sites as a Precursor for Standardization.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
2014
Springer Briefs in Cybersecurity, Springer, ISBN: 978-1-4471-6530-9, 2014
From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy ... The case of deep packet inspection technologies.
Comput. Law Secur. Rev., 2014
Corrigendum to 'Online monitoring, filtering, blocking ....What is the difference? Where to draw the line?' [2013] 29 CLSR 702-712.
Comput. Law Secur. Rev., 2014
2013
Online monitoring, filtering, blocking ....What is the difference? Where to draw the line?
Comput. Law Secur. Rev., 2013
2011
Comput. Law Secur. Rev., 2011
2010
The flip side of ISP's liability regimes: The ambiguous protection of fundamental rights and liberties in private digital spaces.
Comput. Law Secur. Rev., 2010
Comput. Law Secur. Rev., 2010