首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Process Mining for legal Courts: Visualising, analysing and comparing Italian divorce proceedings 法院程序挖掘:可视化,分析和比较意大利离婚诉讼
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-11-01 DOI: 10.1016/j.clsr.2025.106210
Vittoria Caponecchia, Bernardo D’Agostino, Sima Sarv Ahrabi, Giovanni Comandè, Daniele Licari, Andrea Vandin
Process Mining (PM) is a family of data-driven techniques that use data to study the underlying processes generating the data, i.e., the data-generating process. Despite being initially tailored for the engineering and industrial domain, it is becoming popular also in more human-centric domains like the legal and healthcare ones. We present a PM methodology using the fuzzy miner technique aimed at analysing and optimising the complex processes underlying decision making by legal Courts. We consider specifically the domain of civil proceedings, with a focus on divorces. In PM terms, we see a legal proceeding as a process instance, and the different internal phases in which a legal proceeding transits as activities. The studied process is, therefore, the internal process followed by a Court, possibly varying over the years, to handle specific types of proceedings. By leveraging PM techniques, this article compares consensual divorce proceedings within a Court across time, and across Courts. As a case study we take two Courts in Northern Italy. Our PM analysis identifies key performance indicators and uncovers hidden process efficiencies and inefficiencies. The findings highlight the ability of PM to reveal critical process patterns, enabling organisations to make data-driven decisions and implement targeted process improvements.
过程挖掘(Process Mining, PM)是一系列数据驱动的技术,它使用数据来研究生成数据的底层过程,即数据生成过程。尽管最初是为工程和工业领域量身定制的,但它在法律和医疗保健等更以人为中心的领域也越来越受欢迎。我们提出了一种PM方法,使用模糊矿工技术,旨在分析和优化法院决策的复杂过程。我们具体考虑民事诉讼领域,重点是离婚。在项目管理术语中,我们将法律程序视为一个过程实例,并将法律程序转换为活动的不同内部阶段。因此,所研究的程序是法院所遵循的内部程序,可能随着时间的推移而变化,以处理特定类型的诉讼。通过利用项目管理技术,本文比较了法院内跨时间和跨法院的双方同意的离婚诉讼。作为案例研究,我们以意大利北部的两个法院为例。我们的PM分析确定了关键的性能指标,并揭示了隐藏的流程效率和低效率。研究结果强调了项目管理揭示关键过程模式的能力,使组织能够做出数据驱动的决策并实施有针对性的过程改进。
{"title":"Process Mining for legal Courts: Visualising, analysing and comparing Italian divorce proceedings","authors":"Vittoria Caponecchia,&nbsp;Bernardo D’Agostino,&nbsp;Sima Sarv Ahrabi,&nbsp;Giovanni Comandè,&nbsp;Daniele Licari,&nbsp;Andrea Vandin","doi":"10.1016/j.clsr.2025.106210","DOIUrl":"10.1016/j.clsr.2025.106210","url":null,"abstract":"<div><div>Process Mining (PM) is a family of data-driven techniques that use data to study the underlying processes generating the data, i.e., the data-generating process. Despite being initially tailored for the engineering and industrial domain, it is becoming popular also in more human-centric domains like the legal and healthcare ones. We present a PM methodology using the <strong>fuzzy miner technique</strong> aimed at analysing and optimising the complex processes underlying decision making by legal Courts. We consider specifically the domain of civil proceedings, with a focus on divorces. In PM terms, we see a legal proceeding as a process instance, and the different internal phases in which a legal proceeding transits as activities. The studied process is, therefore, the internal process followed by a Court, possibly varying over the years, to handle specific types of proceedings. By leveraging PM techniques, this article compares consensual divorce proceedings within a Court across time, and across Courts. As a case study we take two Courts in Northern Italy. Our PM analysis identifies key performance indicators and uncovers hidden process efficiencies and inefficiencies. The findings highlight the ability of PM to reveal critical process patterns, enabling organisations to make data-driven decisions and implement targeted process improvements.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106210"},"PeriodicalIF":3.2,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145424762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mapping the scholarship of the regulation of dark patterns: A systematic review of concepts, regulatory paradigms, and solutions from law and HCI perspectives 绘制黑暗模式监管的学术研究:从法律和HCI的角度对概念、监管范式和解决方案的系统回顾
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-11-01 DOI: 10.1016/j.clsr.2025.106225
Weiwei Yi , Zihao Li
In recent years, dark patterns, which are interface designs that manipulate user decisions, have raised growing regulatory concern. Yet scholarship on their governance remains fragmented, particularly in how the concept is defined, the harms are understood, and legal responses are framed. This paper offers a systematic review of 65 studies from Law and Human–Computer Interaction, following PRISMA guidelines. It identifies five root problems and layered harms, critiques sectoral regulations for their theoretical and enforcement limits, and synthesises proposed solutions, from doctrinal refinements and accountability measures to technical design interventions. Building on these findings, the paper argues that regulatory progress is hindered by the elusive nature of dark patterns, the difficulty of pinpointing actionable harms, and the expanding scope of the concept. It concludes by advocating a paradigmatic shift towards a proactive framework centred on ‘diligent design’, and outlines directions for collaborative, transdisciplinary research.
近年来,暗模式,即操纵用户决策的界面设计,已经引起了越来越多的监管关注。然而,关于它们治理的学术研究仍然支离破碎,特别是在如何定义概念、如何理解危害以及如何制定法律回应方面。本文根据PRISMA的指导方针,对法律和人机交互领域的65项研究进行了系统回顾。它确定了五个根本问题和分层危害,批评了部门法规的理论和执行限制,并综合了从理论改进和问责措施到技术设计干预的拟议解决方案。在这些发现的基础上,这篇论文认为,由于黑暗模式难以捉摸的本质、难以确定可采取行动的危害以及这一概念的范围不断扩大,监管进展受到了阻碍。最后,它倡导向以“勤奋设计”为中心的主动框架的范式转变,并概述了协作、跨学科研究的方向。
{"title":"Mapping the scholarship of the regulation of dark patterns: A systematic review of concepts, regulatory paradigms, and solutions from law and HCI perspectives","authors":"Weiwei Yi ,&nbsp;Zihao Li","doi":"10.1016/j.clsr.2025.106225","DOIUrl":"10.1016/j.clsr.2025.106225","url":null,"abstract":"<div><div>In recent years, dark patterns, which are interface designs that manipulate user decisions, have raised growing regulatory concern. Yet scholarship on their governance remains fragmented, particularly in how the concept is defined, the harms are understood, and legal responses are framed. This paper offers a systematic review of 65 studies from Law and Human–Computer Interaction, following PRISMA guidelines. It identifies five root problems and layered harms, critiques sectoral regulations for their theoretical and enforcement limits, and synthesises proposed solutions, from doctrinal refinements and accountability measures to technical design interventions. Building on these findings, the paper argues that regulatory progress is hindered by the elusive nature of dark patterns, the difficulty of pinpointing actionable harms, and the expanding scope of the concept. It concludes by advocating a paradigmatic shift towards a proactive framework centred on ‘diligent design’, and outlines directions for collaborative, transdisciplinary research.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106225"},"PeriodicalIF":3.2,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber risk insurance in the shipping business: What cover is available? 航运业的网络风险保险:可提供哪些保险?
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-11-01 DOI: 10.1016/j.clsr.2025.106226
Chimaobi Umezuruike
Cyber risk events have become a routine occurrence in business operations, and the shipping industry is not left out. Internet technology has been adopted in shipping for onshore and shipboard purposes. Hence, shipping businesses face dual-pronged cyber risks. On the one hand, they are exposed to shipboard cyber risks, and on the other hand, they face onshore cyber exposure much like any other business.
Conventionally, perils of the sea and other offshore risks are handled by traditional marine insurance policies, while onshore business risks are handled by non-marine insurance policies. Both sets of risks had been unique to their classes of insurance. Now, things are muddled as both aspects feature the exposure to cyber risks.
This article analyses the categories of cyber insurance available to the shipowner. It considers the coverage of cyber risks under traditional marine insurance and affirmative cyber insurance. It evaluates how traditional marine insurance tailored for ships' hulls and machinery mitigates some cyber risks and how affirmative cyber insurance covers shipboard and business cyber risks. It examines affirmative cyber insurance policies tailored to the shipping industry and those intended for businesses at large.
Instance policies from each category are analysed to answer what cyber risks may be covered and the policies’ restrictions. This paper is restricted primarily to policies from the UK and the US insurance markets and decided cases from both jurisdictions. It is concluded that shipping businesses require a combination of policies or an extensive hybrid policy to adequately mitigate cyber risks.
网络风险事件已成为企业经营的常态,航运业也不例外。陆上航运和船上航运均采用互联网技术。因此,航运企业面临着双重的网络风险。一方面,他们面临着船上的网络风险,另一方面,他们也像其他企业一样面临着陆上的网络风险。按照惯例,海上灾害和其他离岸风险是由传统的海上保险政策处理的,而在岸业务风险是由非海上保险政策处理的。这两种风险在它们的保险类别中都是独一无二的。现在,事情变得混乱起来,因为这两个方面都暴露在网络风险之下。本文分析了船东可选择的网络保险类别。考虑了传统海上保险和积极网络保险下网络风险的承保范围。它评估了为船体和机械量身定制的传统海上保险如何减轻一些网络风险,以及积极的网络保险如何涵盖船上和商业网络风险。它研究了为航运业量身定制的积极网络保险政策,以及针对整个企业的政策。对每个类别的实例策略进行分析,以回答可能涵盖的网络风险以及策略的限制。本文主要限于英国和美国保险市场的政策以及两个司法管辖区的已判决案件。结论是,航运企业需要政策组合或广泛的混合政策来充分减轻网络风险。
{"title":"Cyber risk insurance in the shipping business: What cover is available?","authors":"Chimaobi Umezuruike","doi":"10.1016/j.clsr.2025.106226","DOIUrl":"10.1016/j.clsr.2025.106226","url":null,"abstract":"<div><div>Cyber risk events have become a routine occurrence in business operations, and the shipping industry is not left out. Internet technology has been adopted in shipping for onshore and shipboard purposes. Hence, shipping businesses face dual-pronged cyber risks. On the one hand, they are exposed to shipboard cyber risks, and on the other hand, they face onshore cyber exposure much like any other business.</div><div>Conventionally, perils of the sea and other offshore risks are handled by traditional marine insurance policies, while onshore business risks are handled by non-marine insurance policies. Both sets of risks had been unique to their classes of insurance. Now, things are muddled as both aspects feature the exposure to cyber risks.</div><div>This article analyses the categories of cyber insurance available to the shipowner. It considers the coverage of cyber risks under traditional marine insurance and affirmative cyber insurance. It evaluates how traditional marine insurance tailored for ships' hulls and machinery mitigates some cyber risks and how affirmative cyber insurance covers shipboard and business cyber risks. It examines affirmative cyber insurance policies tailored to the shipping industry and those intended for businesses at large.</div><div>Instance policies from each category are analysed to answer what cyber risks may be covered and the policies’ restrictions. This paper is restricted primarily to policies from the UK and the US insurance markets and decided cases from both jurisdictions. It is concluded that shipping businesses require a combination of policies or an extensive hybrid policy to adequately mitigate cyber risks.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106226"},"PeriodicalIF":3.2,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145424763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing legal document building with Retrieval-Augmented Generation 通过增强检索生成加强法律文件建设
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-11-01 DOI: 10.1016/j.clsr.2025.106229
Matteo Buffa , Alfio Ferrara , Sergio Picascia , Davide Riva , Silvana Castano
Legal document building refers to the process of producing a legal textual document following a predefined schema with the support of digital, automated tools. Such systems must balance two fundamental requirements: providing targeted drafting assistance while preserving judicial autonomy and decision-making authority, and systematically leveraging existing legal document corpora to enhance consistency and quality in legal documentation. In this paper, we propose a document builder architecture, called JusBuild, designed to assist and support legal practitioners in drafting new legal documents. JusBuild supports the document assembly process by relying on a predefined legal document template and on a corpus of past legal documents. The key features of JusBuild are: (i) the use of a Conditional Random Field (CRF) model for the supervised segmentation of legal documents into functional sections according to a document template; (ii) a vector database storing segmented sections and their semantically meaningful vector representations for efficiently performing semantic search for suggestions retrieval; (iii) the suggestion, at drafting time, of relevant precedent sections retrieved from the vector database and of new, AI-generated sections, using a Large Language Model and Retrieval-Augmented Generation (RAG). A featuring design choice of JusBuild is the “human-in-the-loop” approach, which allows the user (judge) to exercise his/her decision-making freedom and full control in the formulation of the provision in working with the suggestions provided by JusBuild. Thanks to the flexible nature of the architecture, adaptable to a large number of legal contexts, with different document structures and legal matters, JusBuild makes contextualized content generation accurate and efficient for legal practitioners. The application of JusBuild to legal document building in the Italian legal context is discussed. JusBuild validation is provided by considering datasets that differ for document template, language, and judicial matter, to test its applicability and adaptability to different contexts.
法律文档构建是指在数字自动化工具的支持下,按照预定义的模式生成法律文本文档的过程。这种制度必须平衡两项基本要求:在保持司法自主和决策权的同时,提供有针对性的起草协助;有系统地利用现有法律文件语料库,提高法律文件的一致性和质量。在本文中,我们提出了一个名为JusBuild的文档构建器架构,旨在帮助和支持法律从业者起草新的法律文件。JusBuild通过依赖预定义的法律文档模板和过去法律文档的语料库来支持文档组装过程。JusBuild的主要特点是:(i)使用条件随机场(CRF)模型,根据文件模板将法律文件监督分割为功能部分;(ii)一个向量数据库,存储分段的部分及其语义上有意义的向量表示,以便有效地执行语义搜索以检索建议;(iii)在起草时,建议使用大型语言模型和检索增强生成(RAG)从矢量数据库检索相关的先例章节和人工智能生成的新章节。JusBuild的一个特色设计选择是“human-in-the-loop”的方式,用户(裁判)在与JusBuild提供的建议合作的过程中,在条款的制定过程中享有完全的决策权和控制权。由于架构的灵活性,适用于大量的法律语境,不同的文档结构和法律事项,JusBuild为法律从业者提供准确高效的情境化内容生成。讨论了JusBuild在意大利法律语境下法律文书构建中的应用。JusBuild验证是通过考虑文档模板、语言和司法事项不同的数据集来提供的,以测试其对不同上下文的适用性和适应性。
{"title":"Enhancing legal document building with Retrieval-Augmented Generation","authors":"Matteo Buffa ,&nbsp;Alfio Ferrara ,&nbsp;Sergio Picascia ,&nbsp;Davide Riva ,&nbsp;Silvana Castano","doi":"10.1016/j.clsr.2025.106229","DOIUrl":"10.1016/j.clsr.2025.106229","url":null,"abstract":"<div><div>Legal document building refers to the process of producing a legal textual document following a predefined schema with the support of digital, automated tools. Such systems must balance two fundamental requirements: providing targeted drafting assistance while preserving judicial autonomy and decision-making authority, and systematically leveraging existing legal document corpora to enhance consistency and quality in legal documentation. In this paper, we propose a document builder architecture, called JusBuild, designed to assist and support legal practitioners in drafting new legal documents. JusBuild supports the document assembly process by relying on a predefined legal document template and on a corpus of past legal documents. The key features of JusBuild are: (i) the use of a Conditional Random Field (CRF) model for the supervised segmentation of legal documents into functional sections according to a document template; (ii) a vector database storing segmented sections and their semantically meaningful vector representations for efficiently performing semantic search for suggestions retrieval; (iii) the suggestion, at drafting time, of relevant precedent sections retrieved from the vector database and of new, AI-generated sections, using a Large Language Model and Retrieval-Augmented Generation (RAG). A featuring design choice of JusBuild is the “human-in-the-loop” approach, which allows the user (judge) to exercise his/her decision-making freedom and full control in the formulation of the provision in working with the suggestions provided by JusBuild. Thanks to the flexible nature of the architecture, adaptable to a large number of legal contexts, with different document structures and legal matters, JusBuild makes contextualized content generation accurate and efficient for legal practitioners. The application of JusBuild to legal document building in the Italian legal context is discussed. JusBuild validation is provided by considering datasets that differ for document template, language, and judicial matter, to test its applicability and adaptability to different contexts.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106229"},"PeriodicalIF":3.2,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145578862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Raising the bar: Assessing historical cryptocurrency exchange practices in light of the EU’s MiCA and DORA regulation 提高标准:根据欧盟的MiCA和DORA法规评估历史上的加密货币交易实践
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-11-01 DOI: 10.1016/j.clsr.2025.106227
Marilyne Ordekian , Ingolf Becker , Tyler Moore , Marie Vasek
Centralized cryptocurrency exchanges have quickly become internal components of the digital finance ecosystem, mirroring traditional institutions by offering custody, investments, and transactional services. Despite their increasing prominence, the regulatory oversight has historically been fragmented and inadequate, leaving them largely relying on self-regulation. The resulting environment has been marked by exchange collapses, connections to criminal activities, cyber attacks, and poor operational security. High-profile failures, such as Mt. Gox and FTX, highlight the systemic risks and failure of internal governance models to properly mitigate or protect user funds from cascading risks or security breaches. In response, the European Union introduced the Markets in Crypto-Assets (MiCA) regulation and the Digital Operational Resilience Act (DORA), intending to standardize regulatory oversight and enhance user protection.
This paper presents the first comprehensive interdisciplinary analysis of centralized exchanges under the MiCA and DORA frameworks. Drawing on methods from both law and computer science, we systematically translate regulatory requirements into measurable compliance standards, and develop a novel doctrinal and empirical methodology to evaluate current self-regulatory practices of 75 centralized exchanges operating in Europe. Through a detailed analysis of 143 exchange legal documents, we identify major compliance gaps and regulatory uncertainties. Our findings indicate significant shortcomings in exchange practices relating to asset custody, cybersecurity, and liability. This suggests that serious efforts are needed to change these practices and ensure their alignment with regulatory requirements. Our framework enables a systemic comparison between regulation and practice, and establishes a baseline for evaluating the effectiveness of regulatory measures. This approach can be replicated to study other self-regulating emerging sectors.
集中式加密货币交易所已迅速成为数字金融生态系统的内部组成部分,通过提供托管、投资和交易服务来反映传统机构。尽管它们的地位日益突出,但从历史上看,它们的监管是分散的、不充分的,这使得它们在很大程度上依赖于自我监管。由此产生的环境以交易所崩溃、与犯罪活动联系、网络攻击和运营安全性差为特征。Mt. Gox和FTX等引人注目的失败突显了系统风险和内部治理模式的失败,无法适当减轻或保护用户资金免受级联风险或安全漏洞的影响。作为回应,欧盟推出了加密资产市场(MiCA)法规和数字运营弹性法案(DORA),旨在规范监管监督并加强用户保护。本文首次对MiCA和DORA框架下的集中式交换进行了全面的跨学科分析。利用法律和计算机科学的方法,我们系统地将监管要求转化为可衡量的合规标准,并开发了一种新的理论和经验方法来评估目前在欧洲运营的75个集中交易所的自我监管实践。通过对143份交易所法律文件的详细分析,我们发现了主要的合规缺口和监管不确定性。我们的研究结果表明,在与资产托管、网络安全和责任相关的交易所实践中存在重大缺陷。这表明,需要认真努力改变这些做法,并确保它们与监管要求保持一致。我们的框架能够对监管和实践进行系统比较,并为评估监管措施的有效性建立基线。这种方法可以复制到其他自我监管的新兴行业。
{"title":"Raising the bar: Assessing historical cryptocurrency exchange practices in light of the EU’s MiCA and DORA regulation","authors":"Marilyne Ordekian ,&nbsp;Ingolf Becker ,&nbsp;Tyler Moore ,&nbsp;Marie Vasek","doi":"10.1016/j.clsr.2025.106227","DOIUrl":"10.1016/j.clsr.2025.106227","url":null,"abstract":"<div><div>Centralized cryptocurrency exchanges have quickly become internal components of the digital finance ecosystem, mirroring traditional institutions by offering custody, investments, and transactional services. Despite their increasing prominence, the regulatory oversight has historically been fragmented and inadequate, leaving them largely relying on self-regulation. The resulting environment has been marked by exchange collapses, connections to criminal activities, cyber attacks, and poor operational security. High-profile failures, such as Mt. Gox and FTX, highlight the systemic risks and failure of internal governance models to properly mitigate or protect user funds from cascading risks or security breaches. In response, the European Union introduced the Markets in Crypto-Assets (MiCA) regulation and the Digital Operational Resilience Act (DORA), intending to standardize regulatory oversight and enhance user protection.</div><div>This paper presents the first comprehensive interdisciplinary analysis of centralized exchanges under the MiCA and DORA frameworks. Drawing on methods from both law and computer science, we systematically translate regulatory requirements into measurable compliance standards, and develop a novel doctrinal and empirical methodology to evaluate current self-regulatory practices of 75 centralized exchanges operating in Europe. Through a detailed analysis of 143 exchange legal documents, we identify major compliance gaps and regulatory uncertainties. Our findings indicate significant shortcomings in exchange practices relating to asset custody, cybersecurity, and liability. This suggests that serious efforts are needed to change these practices and ensure their alignment with regulatory requirements. Our framework enables a systemic comparison between regulation and practice, and establishes a baseline for evaluating the effectiveness of regulatory measures. This approach can be replicated to study other self-regulating emerging sectors.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106227"},"PeriodicalIF":3.2,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The copyrightability of AI-generated content: A doctrinal exploration of the pioneering chinese judicial practice 人工智能生成内容的可版权性:中国开创性司法实践的理论探索
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-11-01 DOI: 10.1016/j.clsr.2025.106236
Shujie Feng
The tremendous capacity of AI to generate abundant content at minimum cost will revolutionize all creative endeavors in the literary, artistic and industrial sectors. Whether to protect AI-generated content (AIGC) as copyrightable work is a challenging question common to all countries. While most countries remain attached to the traditional copyright doctrine of absolute human authorship and reluctant to extend copyright protection to AIGC over which AI users have no sufficient control, Chinese courts have recognized the copyrightability of AIGC once AI users’ intellectual investment in the creation process can be shown. This paper explains the political motivation behind the innovative approach of Chinese judges and its favorable support from Chinese scholars, clarifies the Chinese judicial practice, analyzes the significance of its underlying doctrine and evaluates the possible consequences of the Chinese solution for the market. It concludes that the Chinese judicial practice is not a deviation from traditional copyright doctrine, but rather provides a solution to make the traditional standard of human authorship more accessible. The Chinese solution is efficient because it avoids the difficult distinction between users’ and AI’s contribution to AIGC, and it is inclusive of creators assisted by AI as it values the creative genius of humankind instead of physical operation. With that said, for a better balance of interests between prior copyright owners on AIGC and posterior creators, the criteria as well as the burden and standard of proof for determining copyright infringement should be adjusted to protect freedom of creation by human beings.
人工智能以最低成本生成丰富内容的巨大能力,将彻底改变文学、艺术和工业领域的所有创造性努力。是否将人工智能生成的内容作为可版权作品加以保护,是各国共同面临的一个具有挑战性的问题。虽然大多数国家仍然坚持绝对的人类作者身份的传统版权原则,不愿将版权保护扩展到人工智能用户无法充分控制的AIGC,但一旦人工智能用户在创作过程中的智力投入能够得到证明,中国法院就承认了AIGC的可版权性。本文解释了中国法官创新方法背后的政治动机及其受到中国学者的支持,澄清了中国的司法实践,分析了其基本原则的意义,并评估了中国解决市场问题的可能后果。中国的司法实践并不是对传统著作权原则的背离,而是提供了一种解决方案,使传统的人类作者身份标准更容易获得。中国的解决方案是有效的,因为它避免了用户和人工智能对AIGC的贡献的难以区分,而且它包括人工智能协助的创造者,因为它重视人类的创造天才而不是物理操作。因此,为了更好地平衡AIGC上的在先著作权人和后发创作者之间的利益,应当调整判定侵权的标准、举证责任和标准,以保护人类的创作自由。
{"title":"The copyrightability of AI-generated content: A doctrinal exploration of the pioneering chinese judicial practice","authors":"Shujie Feng","doi":"10.1016/j.clsr.2025.106236","DOIUrl":"10.1016/j.clsr.2025.106236","url":null,"abstract":"<div><div>The tremendous capacity of AI to generate abundant content at minimum cost will revolutionize all creative endeavors in the literary, artistic and industrial sectors. Whether to protect AI-generated content (AIGC) as copyrightable work is a challenging question common to all countries. While most countries remain attached to the traditional copyright doctrine of absolute human authorship and reluctant to extend copyright protection to AIGC over which AI users have no sufficient control, Chinese courts have recognized the copyrightability of AIGC once AI users’ intellectual investment in the creation process can be shown. This paper explains the political motivation behind the innovative approach of Chinese judges and its favorable support from Chinese scholars, clarifies the Chinese judicial practice, analyzes the significance of its underlying doctrine and evaluates the possible consequences of the Chinese solution for the market. It concludes that the Chinese judicial practice is not a deviation from traditional copyright doctrine, but rather provides a solution to make the traditional standard of human authorship more accessible. The Chinese solution is efficient because it avoids the difficult distinction between users’ and AI’s contribution to AIGC, and it is inclusive of creators assisted by AI as it values the creative genius of humankind instead of physical operation. With that said, for a better balance of interests between prior copyright owners on AIGC and posterior creators, the criteria as well as the burden and standard of proof for determining copyright infringement should be adjusted to protect freedom of creation by human beings.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106236"},"PeriodicalIF":3.2,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145623493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-regulating principles for system safety: Agency by design 系统安全协同调节原则:设计代理
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-10-25 DOI: 10.1016/j.clsr.2025.106224
Benjamin Farrand
Safety in the context of user-focused systems is something that is increasingly being legislated for, albeit in ways that often present them as passive recipients of goods and services. However, an effective safety regime for technological solutions is one that empowers users, providing them with a sense of agency, particularly in the context of vulnerable user groups.
This article argues that we are better able to secure this empowerment through the adoption of Agency by Design principles in the design, implementation, use, and updating of technologies. These principles can form the basis for best practices and international standards as part of a co-regulatory regime, in which technology firms engage more effectively with their diverse users during the design stages of a technology, work with them to produce transparent and intelligible systems for user safety based on granular, user-defined tools, allowing for collaborative identification by users of security threats, with meaningful responses and comprehensive life-cycle policies for maintaining system security.
Using the case studies of intimate partner violence facilitated through smart home devices, the unauthorised use of data in Femtech applications, and the spread of disinformation on social media, this article argues that the adoption of these principles, working within a legal framework for ensuring compliance with international standards and best practices can more readily assure user agency and empowerment than existing approaches.
在以用户为中心的系统中,越来越多的人通过立法来保障安全,尽管其方式往往使用户成为商品和服务的被动接受者。但是,技术解决办法的有效安全制度是赋予用户权力,使他们有一种能动性,特别是在易受害用户群体的情况下。本文认为,通过在技术的设计、实现、使用和更新中采用设计代理原则,我们能够更好地确保这种授权。这些原则可以构成最佳实践和国际标准的基础,作为共同监管制度的一部分,在这种制度下,技术公司在技术设计阶段更有效地与不同的用户接触,与他们合作,基于细粒度的用户定义工具,为用户安全生产透明和可理解的系统,允许用户协作识别安全威胁。具有有意义的响应和用于维护系统安全性的全面生命周期策略。通过智能家居设备促进亲密伴侣暴力的案例研究,Femtech应用程序中未经授权使用数据以及社交媒体上虚假信息的传播,本文认为,采用这些原则,在确保遵守国际标准和最佳实践的法律框架内工作,比现有方法更容易确保用户代理和授权。
{"title":"Co-regulating principles for system safety: Agency by design","authors":"Benjamin Farrand","doi":"10.1016/j.clsr.2025.106224","DOIUrl":"10.1016/j.clsr.2025.106224","url":null,"abstract":"<div><div>Safety in the context of user-focused systems is something that is increasingly being legislated for, albeit in ways that often present them as passive recipients of goods and services. However, an effective safety regime for technological solutions is one that empowers users, providing them with a sense of agency, particularly in the context of vulnerable user groups.</div><div>This article argues that we are better able to secure this empowerment through the adoption of Agency by Design principles in the design, implementation, use, and updating of technologies. These principles can form the basis for best practices and international standards as part of a co-regulatory regime, in which technology firms engage more effectively with their diverse users during the design stages of a technology, work with them to produce transparent and intelligible systems for user safety based on granular, user-defined tools, allowing for collaborative identification by users of security threats, with meaningful responses and comprehensive life-cycle policies for maintaining system security.</div><div>Using the case studies of intimate partner violence facilitated through smart home devices, the unauthorised use of data in Femtech applications, and the spread of disinformation on social media, this article argues that the adoption of these principles, working within a legal framework for ensuring compliance with international standards and best practices can more readily assure user agency and empowerment than existing approaches.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106224"},"PeriodicalIF":3.2,"publicationDate":"2025-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposing ELDA methodology: Ethical and Legal by Design and Assessment for cybersecurity solutions 提出ELDA方法:网络安全解决方案的设计和评估的道德和法律
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-10-24 DOI: 10.1016/j.clsr.2025.106220
Federica Casarosa, Giovanni Comandé, Jacopo Fortuna
The Guidelines Ethical by Design and Ethics of Use Approaches for Artificial Intelligence have provided an extensive and detailed set of indications grounded on interdisciplinary debate regarding the use of artificial intelligence. This article aims to leverage the intellectual work leading to its ethical approaches to develop a framework adapted to the specificities of cybersecurity. The overall result of this paper is to propose Ethical and Legal by Design and Assessment Guidelines (ELDA) that integrate the ethics questions and the legal questions, arguing that an ethical by design approach cannot be sustained without its big brother: legal by design. Ethics by design can be a policy direction until there is a clearly emerging legal framework. Legal by design in technological domains is often taken for granted, better “assumed as granted” by the need to be lawful. Building on these premises, this text aims to provide initial advice on both perspectives when designing, developing, deploying, or using cybersecurity solutions, regardless of the sector of application.
《人工智能设计伦理指南》和《人工智能使用方法伦理指南》提供了一套广泛而详细的指标,这些指标基于关于人工智能使用的跨学科辩论。本文旨在利用导致其伦理方法的智力工作来开发适应网络安全特殊性的框架。本文的总体结果是提出了整合伦理问题和法律问题的设计与评估准则(ELDA),认为设计的伦理方法离不开它的老大哥:设计的法律。在出现明确的法律框架之前,设计伦理可以成为一种政策方向。在技术领域,设计的合法性常常被认为是理所当然的,更好的说法是“理所当然”,因为需要是合法的。建立在这些前提下,本文的目的是在设计,开发,部署或使用网络安全解决方案时提供初步建议,无论应用部门如何。
{"title":"Proposing ELDA methodology: Ethical and Legal by Design and Assessment for cybersecurity solutions","authors":"Federica Casarosa,&nbsp;Giovanni Comandé,&nbsp;Jacopo Fortuna","doi":"10.1016/j.clsr.2025.106220","DOIUrl":"10.1016/j.clsr.2025.106220","url":null,"abstract":"<div><div>The Guidelines Ethical by Design and Ethics of Use Approaches for Artificial Intelligence have provided an extensive and detailed set of indications grounded on interdisciplinary debate regarding the use of artificial intelligence. This article aims to leverage the intellectual work leading to its ethical approaches to develop a framework adapted to the specificities of cybersecurity. The overall result of this paper is to propose Ethical and Legal by Design and Assessment Guidelines (ELDA) that integrate the ethics questions and the legal questions, arguing that an ethical by design approach cannot be sustained without its big brother: legal by design. Ethics by design can be a policy direction until there is a clearly emerging legal framework. Legal by design in technological domains is often taken for granted, better “assumed as granted” by the need to be lawful. Building on these premises, this text aims to provide initial advice on both perspectives when designing, developing, deploying, or using cybersecurity solutions, regardless of the sector of application.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106220"},"PeriodicalIF":3.2,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The European Data Protection Board - a (non)consensual and (un)accountable role? 欧洲数据保护委员会——一个(非)共识和(非)负责任的角色?
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-10-23 DOI: 10.1016/j.clsr.2025.106217
Lisette Mustert, Cristiana Santos
The European Data Protection Board (EDPB) aims to ensure consistent enforcement of data protection laws across the EU through the adoption of guidelines and opinions. However, two challenges have been identified. First, the EDPB’s proactive engagement in issuing guidance is sometimes inconsistent, which can lead to discrepancies in the application of data protection laws across the EU, particularly as national Data Protection Authorities (DPAs) issue their own guidelines, creating a fragmented landscape. Second, uncertainty remains regarding the consistency of the EDPB’s guidance due to its non-binding nature, which leads to varying interpretations of the GDPR. These challenges raise concerns about the EDPB’s ability to ensure compliance with its mandate. This paper examines whether the EDPB is sufficiently independent when drafting guidance and whether it can be held accountable through political, legal, administrative, or social oversight. This paper argues that while the EDPB should maintain complete independence to fully utilize its technical expertise, it should still be subject to ex post accountability mechanisms. However, certain forms of accountability pose a risk to the Board’s independence. A comparative analysis highlights both horizontal and vertical misalignments between EDPB and national guidelines, suggesting that the EDPB’s role in providing cohesive guidance could be strengthened.
欧洲数据保护委员会(EDPB)旨在通过采纳指导方针和意见,确保在整个欧盟范围内一致地执行数据保护法。然而,已经确定了两个挑战。首先,EDPB在发布指导意见方面的积极参与有时并不一致,这可能导致整个欧盟数据保护法的应用存在差异,特别是当各国数据保护机构(dpa)发布自己的指导意见时,造成了一个碎片化的局面。其次,由于EDPB的非约束性,其指导方针的一致性仍然存在不确定性,这导致了对GDPR的不同解释。这些挑战引起了人们对EDPB是否有能力确保履行其职责的关注。本文考察了EDPB在起草指导意见时是否足够独立,以及是否可以通过政治、法律、行政或社会监督对其问责。本文认为,虽然电建局应保持完全的独立性,以充分利用其技术专长,但它仍应受到事后问责机制的约束。但是,某些形式的问责制对审计委员会的独立性构成威胁。一项比较分析突出了EDPB与国家指南之间的横向和纵向偏差,表明EDPB在提供有凝聚力的指导方面的作用可以得到加强。
{"title":"The European Data Protection Board - a (non)consensual and (un)accountable role?","authors":"Lisette Mustert,&nbsp;Cristiana Santos","doi":"10.1016/j.clsr.2025.106217","DOIUrl":"10.1016/j.clsr.2025.106217","url":null,"abstract":"<div><div>The European Data Protection Board (EDPB) aims to ensure consistent enforcement of data protection laws across the EU through the adoption of guidelines and opinions. However, two challenges have been identified. First, the EDPB’s proactive engagement in issuing guidance is sometimes inconsistent, which can lead to discrepancies in the application of data protection laws across the EU, particularly as national Data Protection Authorities (DPAs) issue their own guidelines, creating a fragmented landscape. Second, uncertainty remains regarding the consistency of the EDPB’s guidance due to its non-binding nature, which leads to varying interpretations of the GDPR. These challenges raise concerns about the EDPB’s ability to ensure compliance with its mandate. This paper examines whether the EDPB is sufficiently independent when drafting guidance and whether it can be held accountable through political, legal, administrative, or social oversight. This paper argues that while the EDPB should maintain complete independence to fully utilize its technical expertise, it should still be subject to <em>ex post</em> accountability mechanisms. However, certain forms of accountability pose a risk to the Board’s independence. A comparative analysis highlights both horizontal and vertical misalignments between EDPB and national guidelines, suggesting that the EDPB’s role in providing cohesive guidance could be strengthened.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106217"},"PeriodicalIF":3.2,"publicationDate":"2025-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithms for group recognition? Ensuring lawful and rights-based use of new technologies in group refugee recognition 群体识别算法?确保在群体难民识别中合法和基于权利的使用新技术
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-10-22 DOI: 10.1016/j.clsr.2025.106222
Meltem Ineli-Ciger , Nikolas Feith Tan
This article explores the potential role of new technologies, including Artificial Intelligence (AI), in group-based refugee recognition procedures. While the use of new technologies in individual refugee status determination has attracted significant scholarly interest, their application in the context of group recognition remains largely underexamined. This article argues that group recognition procedures grounded in pre-defined, objective eligibility criteria, rather than assessments of individual credibility or well-founded fear, offer a more structured and legally consistent framework for technological integration. Building on this insight, the article proposes a model for Dynamic Autonomy Group Recognition. In this model, AI tools support the identification of individuals who fall within a recognised group by verifying identity, matching applicants against legally defined group criteria and flagging potential exclusion concerns. Crucially, however, all negative or exclusion decisions remain subject to mandatory human review. The article analyses both the opportunities and risks of this approach and argues that, if carefully designed and properly regulated, Dynamic Autonomy Group Recognition may offer a lawful, principled, and operationally effective means of managing the protection obligations of states, particularly in large-scale displacement.
本文探讨了包括人工智能(AI)在内的新技术在基于群体的难民识别程序中的潜在作用。虽然在确定个人难民地位方面使用新技术引起了重大的学术兴趣,但它们在群体识别方面的应用仍未得到充分研究。本文认为,基于预先定义的、客观的资格标准的群体识别程序,而不是对个人可信度或有充分根据的恐惧的评估,为技术整合提供了一个更有结构和法律上一致的框架。在此基础上,本文提出了一个动态自治群体识别模型。在这个模型中,人工智能工具通过验证身份,将申请人与法律定义的群体标准进行匹配,并标记潜在的排斥问题,来支持识别属于公认群体的个人。然而,至关重要的是,所有负面或排除的决定仍然需要强制性的人工审查。本文分析了这种方法的机遇和风险,并认为,如果精心设计和适当监管,动态自治群体承认可以提供一种合法的、原则性的和操作上有效的方法来管理国家的保护义务,特别是在大规模流离失所的情况下。
{"title":"Algorithms for group recognition? Ensuring lawful and rights-based use of new technologies in group refugee recognition","authors":"Meltem Ineli-Ciger ,&nbsp;Nikolas Feith Tan","doi":"10.1016/j.clsr.2025.106222","DOIUrl":"10.1016/j.clsr.2025.106222","url":null,"abstract":"<div><div>This article explores the potential role of new technologies, including Artificial Intelligence (AI), in group-based refugee recognition procedures. While the use of new technologies in individual refugee status determination has attracted significant scholarly interest, their application in the context of group recognition remains largely underexamined. This article argues that group recognition procedures grounded in pre-defined, objective eligibility criteria, rather than assessments of individual credibility or well-founded fear, offer a more structured and legally consistent framework for technological integration. Building on this insight, the article proposes a model for <em>Dynamic Autonomy Group Recognition</em>. In this model, AI tools support the identification of individuals who fall within a recognised group by verifying identity, matching applicants against legally defined group criteria and flagging potential exclusion concerns. Crucially, however, all negative or exclusion decisions remain subject to mandatory human review. The article analyses both the opportunities and risks of this approach and argues that, if carefully designed and properly regulated, <em>Dynamic Autonomy Group Recognition</em> may offer a lawful, principled, and operationally effective means of managing the protection obligations of states, particularly in large-scale displacement.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"59 ","pages":"Article 106222"},"PeriodicalIF":3.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145362492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1