Sophie Stalla-Bourdillon

Orcid: 0000-0003-3715-1219

According to our database1, Sophie Stalla-Bourdillon authored at least 36 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Explainability-by-Design: A Methodology to Support Explanations in Decision-Making Systems.
CoRR, 2022

A taxonomy of explanations to support Explainability-by-Design.
CoRR, 2022

User Configurable Privacy Requirements Elicitation in Cyber-Physical Systems.
Proceedings of the UMAP '22: 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain, July 4, 2022

Provisioning Security in a Next Generation Mobility as a Service System.
Proceedings of the 7th International Conference on Internet of Things, 2022

2021
A Maturity Spectrum for Data Institutions.
IEEE Secur. Priv., 2021

Addressing Regulatory Requirements on Explanations for Automated Decisions with Provenance - A Case Study.
Digit. Gov. Res. Pract., 2021

The dual function of explanations: Why it is useful to compute explanations.
Comput. Law Secur. Rev., 2021

The role of the Council of Europe on the 40th anniversary of Convention 108.
Comput. Law Secur. Rev., 2021

HSCT 2021 - Joined Up Data Equals Better Care: Facilitating Health and Social Care Transformation through Trustworthy and Collaborative Data Sharing: Welcome and Workshop Summary.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021

Connecting Regulatory Requirements to Audit Outcomes: A Model-driven Approach to Auditable Compliance.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, 2021

2020
Explanations for AI: Computable or Not?
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020

2019
Rethinking the "release and forget" Ethos of the Freedom of Information Act 2000: Why Developments in the Field of Anonymisaton Necessitate the Development of a New Approach to Disclosing Data.
Eur. J. Law Technol., 2019

The years to come.
Comput. Law Secur. Rev., 2019

2018
The GDPR: A game changer for electronic identification schemes? The case study of Gov.UK Verify.
Comput. Law Secur. Rev., 2018

Data Protection by Design for Cross-Border Electronic Identification: Does the eIDAS Interoperability Framework Need to Be Modernised?
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

2017
Identity Assurance in the UK: technical implementation and legal implications under eIDAS.
J. Web Sci., 2017

iCLIC Data Mining and Data Sharing workshop: The present and future of data mining and data sharing in the EU.
Comput. Law Secur. Rev., 2017

An academic perspective on the copyright reform.
Comput. Law Secur. Rev., 2017

Nobody puts data in a corner? Why a new approach to categorising personal data is required for the obligation to inform.
Comput. Law Secur. Rev., 2017

2016
An Extended Investigation of the Similarity Between Privacy Policies of Social Networking Sites as a Precursor for Standardization.
J. Web Sci., 2016

Data Mining and Automated Discrimination: A Mixed Legal/Technical Perspective.
IEEE Intell. Syst., 2016

Observing and Recommending from a Social Web with Biases.
CoRR, 2016

A content-linking-context model for "notice-and-take-down" procedures.
Proceedings of the 8th ACM Conference on Web Science, 2016

Identity assurance in the UK: technical implementation and legal implications under the eIDAS regulation.
Proceedings of the 8th ACM Conference on Web Science, 2016

What's in a name: the conflicting views of pseudonymisation under eIDAS and the General Data Protection Regulation.
Proceedings of the Open Identity Summit 2016, 13-14 October 2016, Rome, Italy, 2016


2015
Digital identity and French personality rights - A way forward in recognising and protecting an individual's rights in his/her digital identity.
Comput. Law Secur. Rev., 2015

Malicious web pages: What if hosting providers could actually do something...
Comput. Law Secur. Rev., 2015

Investigating Similarity Between Privacy Policies of Social Networking Sites as a Precursor for Standardization.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

2014
Privacy vs. Security
Springer Briefs in Cybersecurity, Springer, ISBN: 978-1-4471-6530-9, 2014

From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy ... The case of deep packet inspection technologies.
Comput. Law Secur. Rev., 2014

Corrigendum to 'Online monitoring, filtering, blocking ....What is the difference? Where to draw the line?' [2013] 29 CLSR 702-712.
Comput. Law Secur. Rev., 2014

2013
Online monitoring, filtering, blocking ....What is the difference? Where to draw the line?
Comput. Law Secur. Rev., 2013

2011
On networks and states - The global politics of Internet governance.
Comput. Law Secur. Rev., 2011

2010
The flip side of ISP's liability regimes: The ambiguous protection of fundamental rights and liberties in private digital spaces.
Comput. Law Secur. Rev., 2010

Chilling ISPs... when private regulators act without adequate public framework...
Comput. Law Secur. Rev., 2010


  Loading...