References
- 1Comite, M 2024 Prevent phishy business: comparing california’s and the united kingdom’s age-appropriate design code to protect youth from cybersecurity threats. University of Miami International and Comparative Law Review, 31(1).
https://repository.law.miami.edu/umiclr/vol31/iss1/9 . - 2Determann, L 2024
Chapter 7: Maintaining and auditing compliance . In: Determan’s Field Guide to Artificial IntelligenceLaw. Cheltenham, UK: Edward Elgar Publishing.https://www.elgaronline.com/monochap/book/9781035326969/book-part-9781035326969-15.xml . - 3Gujar, V and Singh, R P 2024 Innovative indoai’s smart asset tracking: securing efficiency, security & compliance in mobile work environments. IARJSET, 11(1): 56–65.
https://www.researchgate.net/publication/377414772 . - 4Help Net Security 2018 Only 20% of companies have fully completed theirGDPR implementations. July 16.
https://www.helpnetsecurity.com/2018/07/16/complete-gdpr-implementation/ last accessed, 20th June, 2024. - 5Ilori, T 2020 Data protection in Africa and the Covid-19 pandemic: Old problems, new challenges and multistakeholder solutions. Association for Progressive Communications. June, 15.
https://www.apc.org/en/pubs/data-protection-africa-and-covid-19-pandemic-old-problems-new-challenges-and-multistakeholder last accessed 20th June, 2024. - 6Information Commissioner’s Office 2018 ICO’s Guide to the General Data Protection Regulation. August, 2nd. Available at
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr last accessed, 19th June, 2024. - 7Jithish, J, Mahalingam, N and Seng, Y 2024 Empowering Smart Grid Security: Towards Federated Learning in 6G-Enabled Smart Grids using Cloud. January 11th. Available at
https://www.researchsquare.com/article/rs-3834382/latest last accessed, 19th June, 2024. - 8Mutimukwe, C, Kolkowska, E and Grönlund, Å 2019 Information privacy practices in e-government in an African least developing country, Rwanda. The Electronic Journal of Information Systems in Developing Countries, 85(2):
e12074 . DOI: 10.1002/isd2.12074 - 9Qamar, A, Javed, T and Beg, M O 2021 Detecting compliance of privacy policies with data protection laws. arXiv preprint. arXiv:2102.12362.
- 10Roegiest, A, Chitta, R, Donnelly, J, Lash, M, Vtyurina, A and Longtin, F 2023 Questions about contracts: Prompt templates for structured answer generation. Proceedings of the Natural Legal Language Processing Workshop Toronto, Canada,
December, 7th , pp. 62–72.https://aclanthology.org/2023.nllp-1.8.pdf . - 11Sorrell, G 2024 Privacy and Security in Focus: Comparative Study of the EU GDPR and UK data protection laws in safeguarding data in the digital age. January 2024. Available:
https://phaidra.univie.ac.at/detail/o:1941316 last accessed 20th June, 2024. - 12Tikkinen-Piri, C, Rohunen, A and Markkula, J 2018 EU general data protection regulation: Changes and implications for personal data collecting companies. Computer Law & Security Review, 34(1): 134–153. DOI: 10.1016/j.clsr.2017.05.015
- 13Xu, H and Ashley, K 2023 Argumentative segmentation enhancement for legal summarization. arXiv preprint.
arXiv:2307.05081 .
