Samson Esayas
TitleCited byYear
A walk in to the cloud and cloudy it remains: The challenges and prospects of ‘processing’and ‘transferring’personal data
SY Esayas
Computer Law & Security Review 28 (6), 662-678, 2012
212012
The role of anonymisation and pseudonymisation under the EU data privacy rules: beyond the ‘all or nothing’approach
S Esayas
European Journal of Law and Technology 6 (2), 2015
182015
Is a picture worth a thousand terms? Visualising contract terms and data protection requirements for cloud computing users
S Esayas, T Mahler, K McGillivray
International Conference on Web Engineering, 39-56, 2016
62016
Breach Notification Requirements Under the European Union Legal Framework: Convergence, Conflicts, and Complexity in Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 …
S Esayas
J. Marshall J. Info. Tech. & Privacy L. 31, i, 2014
62014
Breach Notification Requirements Under the European Union Legal Framework: Convergence, Conflicts, and Complexity in Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 …
S Esayas
J. Marshall J. Info. Tech. & Privacy L. 31, i, 2014
62014
Competition in dissimilarity: Lessons in privacy from the Facebook/WhatsApp merger
S Esayas
University of Oslo Faculty of Law Research Paper, 2017
42017
Modelling compliance risk: a structured approach
S Esayas, T Mahler
Artificial Intelligence and Law 23 (3), 271-300, 2015
22015
Structuring Compliance Risk Identification Using the CORAS Approach: Compliance as an Asset
SY Esayas
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
22014
Utilizing security risk analysis and security testing in the legal domain
SY Esayas
International Workshop on Risk Assessment and Risk-driven Testing, 51-67, 2013
22013
The idea of ‘emergent properties’ in data privacy: towards a holistic approach
SY Esayas
International Journal of Law and Information Technology 25 (2), 139-178, 2017
12017
An integrated method for compliance and risk assessment: experiences from a case study
S Esayas, T Mahler
Communications and Network Security (CNS), 2015 IEEE Conference, Florence …, 2015
12015
Digital platforms under fire: What Australia can learn from recent developments in Europe
S Esayas, D Svantesson
Alternative Law Journal 43 (4), 275-282, 2018
2018
The Proposed Australian Consumer Data Right: A European Comparison
S Esayas, A Daly
2018
Privacy as a Non-Price Competition Parameter: Theories of Harm in Mergers
S Esayas
2018
Competition in (data) privacy:‘zero’-price markets, market power, and the role of competition law
SY Esayas
International Data Privacy Law 8 (3), 181-199, 2018
2018
Privacy-as-a-Quality Parameter: Some Reflections on the Scepticism
S Esayas
Faculty of Law, Stockholm University Research Paper, 2017
2017
An integrated method for compliance and risk assessment
S Esayas, T Mahler, F Seehusen, F Bjørnstad, V Brubakk
2015 IEEE Conference on Communications and Network Security (CNS), 568-576, 2015
2015
Running Out of Address Space: The Depletion of IPv4 Addresses and What It Entails for Developing Countries
S Esayas
Available at SSRN 2402697, 2014
2014
The IP Address Divide: The Quest of Developing Countries for an ITU-Based Distribution Regime
SY Esayas
Journal of Information Technology & Politics 11 (1), 102-122, 2014
2014
Cross-border flow of personal data in the Cloud: A European Perspective
SY Esayas
2011
The system can't perform the operation now. Try again later.
Articles 1–20