![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computer Law & Security Review, Volume 20
Volume 20, Number 1, January 2004
- Stephen Saxby:
It's an e-Xmas and a spam new year. 3 - Andrew Sharpe:
Regulation of electronic communications networks and services in the UK - Part II. 4-11 - Alexander Batteson:
Draft directive on the patentability of computer-implemented inventions: The European Parliament's amendments - have the proposals been wrecked? 12-16 - Trevor Cook:
UK implementation of the Copyright in the Information Society Directive. 17-21 - Jean-Marc Dinant, Ewout Keuleers:
Data protection: Multi-application smart cards: the use of global unique identifiers for cross-profiling purposes - Part II: towards a privacy enhancing smart card engineering. 22-28 - Jan Grijpink:
Identity fraud as a challenge to the constitutional state. 29-36 - Derrick Grover:
Dual encryption and plausible deniability. 37-40 - Marc Dautlich:
Penetration testing - the legal implications. 41-43 - Malcolm Bain, Brian Subirana:
Towards legal programming: The incorporation of legal criteria in software agent design - Current proposals and future prospects. 44-52 - Phillip Rees:
Distance marketing of financial services - the regulatory mire. 53-56 - Justin Harrington:
An introduction to charging mechanisms in IT procurements. 57-60 - David Halliday, Miriam Andrews, Jo McGarvey, Kate Stephen:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 61-64 - Stephen Saxby:
News and comment on recent developments from around the world. 65-79
Volume 20, Number 2, March 2004
- Stephen Saxby:
Distance selling comes of age. 83 - Talitha Nabbali, Mark Perry
:
Going for the throat: Carnivore in an ECHELON world - Part II. 84-97 - María Verónica Pérez Asinari, Yves Poullet:
The airline passenger data disclosure case and the EU-US debate. 98-116 - Md. Abdul Jalil, Leo D. Pointon:
Developments in electronic contract laws: A Malaysian perspective. 117-124 - Paul Mann:
Cybersecurity - the CTOSE project. 125-126 - Colleen Donovan:
Implementation of the e-Privacy Directive in the UK - understanding the new rules. 127-132 - Marcus Turle:
Durant v FSA - Court of Appeal's radical judgment on the Data Protection Act. 133-136 - Cameron Craig:
Zeta-Jones - so what's the damage? 137-138 - Miriam Andrews, David Halliday, Steve Holmes:
Baker & McKenzie's annual review of developments in EU law relating to IP, IT & telecommunications. 139-145 - Stephen Saxby:
News and comment on recent developments from around the world. 146-157
Volume 20, Number 3, May 2004
- Stephen Saxby:
EU gets tough on intellectual property piracy. 163 - Stephen Mason:
Validating identity for the electronic environment. 164-170 - Benjamin Wright:
Internet break-ins: new legal liability. 171-174 - Simon Chalton:
The Court of Appeal's interpretation of "personal data" in Durant v FSA - a welcome clarification, or a cat amongst the data protection pigeons? 175-181 - Alexander Zinser:
International data transfers between the United States and the European Union: are the procedural provisions of the Safe Harbor solution adequate? 182-184 - Hans-Werner Moritz:
The DaimlerChrysler codes of conduct: the ideal way for global companies to export personal data from Germany to countries outside the EU/EEA? 185-193 - Munir Abu Bakar, Siti Hajar Mohd. Yasin:
Access to communications data by public authorities. 194-199 - Joanne Harland:
Japan's new privacy legislation: are you ready? 200-203 - Kit Burden:
"The voice of reason" ... finding middle ground in IT contracts. 204-205 - Dennis W. K. Khong
:
The problem of spam law: a comment on the Malaysian communications and multimedia commission's discussion paper on regulating unsolicited commercial messages. 206-212 - David Halliday, Miriam Andrews, Jonathan Sharp, Lily Williams, Harry Small, Don Jerrard:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 213-218 - Stephen Saxby:
News and comment on recent developments from around the world. 219-235
Volume 20, Number 4, July 2004
- Stephen Saxby:
Planning for digital television services gathers pace. 267 - David Taylor:
Internet Service Providers (ISPs) and their responsibility for content under the new French legal regime. 268-272 - Mark Turner, Dominic Callaghan:
Software licensing under the competition law spotlight - the new technology transfer block exemption. 273-280 - Thierry Maillard, Teddy Furon:
Towards digital rights and exemptions management systems. 281-287 - Jörg Hladjk:
The protection of databases under US and EU law - Sui generis right as an appropriate concept? - Part I - US law. 288-292 - Andrés Guadamuz González
:
PayPal: the legal status of C2C payment systems. 293-299 - Simon Chalton:
It is impossible to control information by law, but the law can control the way people use information. 300-305 - Nick Graham:
Data protection and business sales - risks and solutions? 306-309 - Pierluigi Perri, Stefano Zanero
:
Lessons learned from the Italian law on privacy - Part I. 310-313 - Marcus Turle:
Press reigned in by House of Lords decision. 314-316 - Colleen Donovan:
Personal data and ancillary information. 317-320 - Abida Chaudri, Ville Patja:
Windows v Lindows - have Microsoft won the battle only to lose the war? 321-323 - David Halliday, Miriam Andrews, Robert Coffey, Jonathan Sharp, Lily Williams:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 324-331 - Stephen Saxby:
News and comment on recent developments from around the world. 332-348
Volume 20, Number 5, September 2004
- Stephen Saxby:
Data protection law under scrutiny. 355 - Will James, Joel Smith, Herbert Smith:
Is further legislation really necessary to level the playing field? A UK perspective. 356-363 - David Bainbridge:
Using technology to protect copyright works. 364-369 - María Verónica Pérez Asinari, Yves Poullet:
Airline passengers' data: adoption of an adequacy decision by the European Commission. How will the story end? 370-376 - Jörg Hladjk:
The protection of databases under EU and US law - the sui generis right as an appropriate concept? Part II. 377-383 - Pierluigi Perri, Stefano Zanero
:
Lessons learned from the Italian law on privacy - Part II. 384-389 - Nick Nykodym, Robert Taylor:
The world's current legislative efforts against cyber crime. 390-395 - Kah Leng Ter:
Who bears the risk of mistake? 396-399 - Alice Hardy, Heather Rowe:
When it is and isn't mobile. 400-401 - Abida Chaudri:
Metatags and banner advertisements - do they infringe trade mark rights? 402-404 - Charlie Everitt:
Database rights: The Advocate General issues her opinion in British Horseracing Board v. William Hill. 405-407 - Satish Khandke:
Sports body scores victory - Morris Communications Corp. v. PGA Tour (11thCir. CA). 408-410 - David Halliday, Miriam Andrews, Emily Keim, Amit Khanna, Harry Small:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 411-414 - Stephen Saxby:
News and comment on recent developments from around the world. 415-429 - Book review: Managing Communications: Managing Communications in a Crises Peter Ruff and Khalid Asis, 2004, hard-cover, Gower Press, 176 pp., £55.00, ISBN 0 566 08294 2. 430
- Book review: Cryptography: Malicious Cryptography ? Exposing Cryptovirology Dr. Adam L. Young and Dr. Moti Yung, 2004, soft-cover, Wiley Publishing Inc., 392 pp., £29.99, ISBN 0 7645 4975 8.. 430
- Book review: Exploiting holes in software security: The Shellcoder's Handbook - Discovery and exploiting security holes, Koziol, Litchfield, Aitel, Anley, Eren, Mehta and Hassell, 2004, soft-cover, Wiley Publishing Inc., 620 pp., £33.99, ISBN 0 7645 4468 3. 430
- Book review: Security in data communications: Security in Fixed and Wireless Networks ? An introduction to securing data communications Gunter Schafer, 2003, hard-cover, Wiley Publishing, 382 pp., £65.00, ISBN 0 470 86370 6. 431
- Book review: Computer Law: Computer Law 5th Edition, edited by Chris Reed and John Angel, 2003, soft-cover, Oxford University Press, 501 pp., £32.50 ISBN 0 19 926 350 7. 431
- Book review: Computer Law: Introduction to Computer Law 5th Edition, David Bainbridge, 2004, soft-cover, Pearson Education, 553 pp., £29.99, ISBN 0 582 47365 9. 431
Volume 20, Number 6, November 2004
- Stephen Saxby:
EU sets out plans for Europe's information economy. 435 - Patricia Akester:
Authorship and authenticity in cyberspace. 436-444 - Yijun Tian:
Business implications of anti-circumvention legislation and recommendations. 445-452 - Nicholas Tyacke, Rohan Higgins:
Searching for trouble - keyword advertising and trade mark infringement. 453-465 - Paul O'Hare:
Allocating risk in IT contracts: A review of the case law on the enforceability of limitations and exclusions under the Unfair Contract Terms Act 1977. 466-471 - Tania S. L. Cheng:
Recent international attempts to can spam. 472-479 - Andrew McGinty, Donald Da Bona:
3G Licensing in China: a waiting game. 480-481 - Pat Treacy, Thomas Heide:
Compulsory licences of IP rights: easier to get after the IMS health decision? 482-485 - Colleen Donovan:
Data Protection and the retention of personal data - how long is too long? 486-487 - Harry Small, David Halliday, Miriam Andrews, Emily Keim, Robert Coffey:
Baker & McKenzie's column tracking recent developments in EU law relating to IP, IT & telecommunications. 488-492 - Stephen Saxby:
News and comment on recent developments from around the world. 493-510 - Book review: Copyright law: world copyright law, J.A.L. Sterling, 2003, hard-cover, Sweet & Maxwell, 1357 pp., £235, &&332, ISBN 0 421 79070 9. 511
- Book review: Telecommunications law: Professor E. Lloyd and Professor David Mellor, 2003, soft-cover, LexisNexis Butterworths, 320pp., £26.95, ISBN 0 406 94799 6. 511
- Book review: Telecoms law: telecommunications law, volumes I and II, second edition, David Gillies and Roger J.W. Marshal, 2003, hard-cover, Butterworth, LexisNexis, 518pp., £225, ISBN Vol. I - 0 406 96873 X; Vol. II - 0 406 96874 8. 511
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.