Search dblp for Publications

export results for "toc:db/journals/clsr/clsr10.bht:"

 download as .bib file

@article{DBLP:journals/clsr/000294,
  author       = {David Bainbridge},
  title        = {Innovations (mail order) {LTD} v data protection registrar - data
                  protection tribunal, 29 September 1993 (case {DA/92} 31/49/1)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {260--261},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90019-1},
  doi          = {10.1016/0267-3649(94)90019-1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000294.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bequai94,
  author       = {August Bequai},
  title        = {Update on {US} congressional efforts to regulate electronic monitoring},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {4},
  pages        = {203--205},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90046-9},
  doi          = {10.1016/0267-3649(94)90046-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bequai94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/BridgeL94,
  author       = {Richard McD. Bridge and
                  Shelley Lane},
  title        = {Format rights},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {277},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90024-8},
  doi          = {10.1016/0267-3649(94)90024-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/BridgeL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Brown94,
  author       = {Jeremy R. C. Brown},
  title        = {Technology licensing},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {3},
  pages        = {110--120},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90055-8},
  doi          = {10.1016/0267-3649(94)90055-8},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Brown94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Brown94a,
  author       = {Jeremy R. C. Brown},
  title        = {Reconsideration of licence agreements in Europe: Implications of the
                  '1991' programme, the single market, {EC} enlargement and the {EEA}
                  treaty for technology transfer - part {II} Jeremy Brown's analysis
                  of {EC} licensing policy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {222--225},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90002-7},
  doi          = {10.1016/0267-3649(94)90002-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Brown94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Brown94b,
  author       = {Jeremy R. C. Brown},
  title        = {Technology licensing},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {282--284},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90116-3},
  doi          = {10.1016/0267-3649(94)90116-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Brown94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/BrownlowR94,
  author       = {Peter Brownlow and
                  John Reynolds},
  title        = {Copyright protection for printed circuit board designs - diagrams
                  as literary works},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {258--259},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90018-3},
  doi          = {10.1016/0267-3649(94)90018-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/BrownlowR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bull94,
  author       = {Gillian Bull},
  title        = {Licensing and distribution of market data},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {50--55},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90095-7},
  doi          = {10.1016/0267-3649(94)90095-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bull94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Castell94,
  author       = {Stephen Castell},
  title        = {Digital broadcasting},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {307--310},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90122-8},
  doi          = {10.1016/0267-3649(94)90122-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Castell94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Condat94,
  author       = {Jean{-}Bernard Condat},
  title        = {Toll fraud on french {PBX} systems},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {89--91},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90106-6},
  doi          = {10.1016/0267-3649(94)90106-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Condat94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies94,
  author       = {Simon Davies},
  title        = {The Fifteenth Annual Conference of Privacy and Data Protection Commissioners},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {36--37},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90089-2},
  doi          = {10.1016/0267-3649(94)90089-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies94a,
  author       = {David Davies},
  title        = {Managing crisis - a live simulation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {108},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90114-7},
  doi          = {10.1016/0267-3649(94)90114-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies94b,
  author       = {David Davies},
  title        = {Computer insurance},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {313--316},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90124-4},
  doi          = {10.1016/0267-3649(94)90124-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Freeman94,
  author       = {Harvey Freeman},
  title        = {Satellite services - the future of the signatory affairs office},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {243--244},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90006-X},
  doi          = {10.1016/0267-3649(94)90006-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Freeman94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Graham94,
  author       = {Rory Graham},
  title        = {Database law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {3},
  pages        = {127--130},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90058-2},
  doi          = {10.1016/0267-3649(94)90058-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Graham94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hart94,
  author       = {Robert Hart},
  title        = {Software patentability},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {296--303},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90119-8},
  doi          = {10.1016/0267-3649(94)90119-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hart94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Heather94,
  author       = {Michael A. Heather},
  title        = {Challenges for the law from cyberspace and virtual worlds},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {17--21},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90078-7},
  doi          = {10.1016/0267-3649(94)90078-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Heather94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kirby94,
  author       = {Michael Kirby},
  title        = {Biotechnology and the law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {2--9},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90075-2},
  doi          = {10.1016/0267-3649(94)90075-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kirby94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Klaveness94,
  author       = {J{\o}rgen Klaveness},
  title        = {Practical use of spreadsheets in the analysis of bankruptcies},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {92--93},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90108-2},
  doi          = {10.1016/0267-3649(94)90108-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Klaveness94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kyer94,
  author       = {C. Ian Kyer},
  title        = {Software piracy {\&} corporate compliance},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {245--246},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90008-6},
  doi          = {10.1016/0267-3649(94)90008-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kyer94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lea94,
  author       = {Gary Lea},
  title        = {Passing off and the protection of program look {\&} feel},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {82--83},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90102-3},
  doi          = {10.1016/0267-3649(94)90102-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lea94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lea94a,
  author       = {Gary Lea},
  title        = {Intellectual property},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {304--306},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90121-X},
  doi          = {10.1016/0267-3649(94)90121-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lea94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lloyd94,
  author       = {Ian J. Lloyd},
  title        = {European information market},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {33--34},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90085-X},
  doi          = {10.1016/0267-3649(94)90085-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lloyd94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/London94,
  author       = {Wendy London},
  title        = {Information security {I}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {29--30},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90082-5},
  doi          = {10.1016/0267-3649(94)90082-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/London94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/London94a,
  author       = {Wendy R. London},
  title        = {Harmonization of {IT} laws},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {64--75},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90098-1},
  doi          = {10.1016/0267-3649(94)90098-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/London94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/London94b,
  author       = {Wendy London},
  title        = {{EC} information security legislation: Where now?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {226--233},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90003-5},
  doi          = {10.1016/0267-3649(94)90003-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/London94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lougher94,
  author       = {Guy Lougher},
  title        = {Commercial agency contracts: implementation of the {EC} directive},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {94--95},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90109-0},
  doi          = {10.1016/0267-3649(94)90109-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lougher94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MandevilleLM94,
  author       = {Thomas Mandeville and
                  Donald McLean Lamberton and
                  Stuart MacDonald},
  title        = {Marketing public sector information: Some issues},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {234--237},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90004-3},
  doi          = {10.1016/0267-3649(94)90004-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/MandevilleLM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Marsh94,
  author       = {David Marsh},
  title        = {{EDI} 1993; The {UK} National {EDI} Conference; Birmingham October
                  4th - 7th},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {35},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90087-6},
  doi          = {10.1016/0267-3649(94)90087-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Marsh94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/McCallough94,
  author       = {Robert McCallough},
  title        = {Evidential issues in cases of infringement of copyright in software},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {3},
  pages        = {134--135},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90060-4},
  doi          = {10.1016/0267-3649(94)90060-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/McCallough94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/McEvoy94,
  author       = {Neil A. McEvoy},
  title        = {Information security {II}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {31--32},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90083-3},
  doi          = {10.1016/0267-3649(94)90083-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/McEvoy94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Palos94,
  author       = {Gyorgy Palos},
  title        = {The impact of the Hungarian - {USA} agreement on the Hungarian intellectual
                  property law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {4},
  pages        = {185--188},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90036-1},
  doi          = {10.1016/0267-3649(94)90036-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Palos94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ross94,
  author       = {Alastair Ross},
  title        = {The essentials of {EDI} law - {A} Straightforward legal framework
                  to protect your business: Peter Jones and David Marsh 1993 Softcover
                  141p},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {91},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90107-4},
  doi          = {10.1016/0267-3649(94)90107-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ross94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rowe94,
  author       = {Heather Rowe},
  title        = {Data protection},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {47},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90092-2},
  doi          = {10.1016/0267-3649(94)90092-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rowe94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rowe94a,
  author       = {Heather Rowe},
  title        = {Draft {UK} data protection bill},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {280},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90028-0},
  doi          = {10.1016/0267-3649(94)90028-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rowe94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sarakinov94,
  author       = {Georgi Sarakinov},
  title        = {New law on copyright and neighbouring rights in Bulgaria},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {4},
  pages        = {189--190},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90037-X},
  doi          = {10.1016/0267-3649(94)90037-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sarakinov94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Smith94,
  author       = {Graham J. H. Smith},
  title        = {When is a computer not a computer?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {84--85},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90103-1},
  doi          = {10.1016/0267-3649(94)90103-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Smith94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/SpelmanM94,
  author       = {Katherine C. Spelman and
                  John Moss},
  title        = {The intellectual property inventory: Why do it?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {1},
  pages        = {22--24},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90079-5},
  doi          = {10.1016/0267-3649(94)90079-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/SpelmanM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Strivens94,
  author       = {Robert Strivens},
  title        = {{EC} competition law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {3},
  pages        = {121--122},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90056-6},
  doi          = {10.1016/0267-3649(94)90056-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Strivens94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sympson94,
  author       = {Moira Sympson},
  title        = {999 !: My computer's stopped breathing !},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {76--81},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90099-X},
  doi          = {10.1016/0267-3649(94)90099-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sympson94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Tapper94,
  author       = {Colin Tapper},
  title        = {The law commission's report on the reform of the hearsay rule: Its
                  impact upon the reception of computer output},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {86--88},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90105-8},
  doi          = {10.1016/0267-3649(94)90105-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Tapper94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Vassilaki94,
  author       = {Irini E. Vassilaki},
  title        = {Interception of telecommunications for criminal investigation - a
                  comparative analysis},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {5},
  pages        = {238--242},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90005-1},
  doi          = {10.1016/0267-3649(94)90005-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Vassilaki94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ward94,
  author       = {Conor Ward},
  title        = {Cheating at cards, plastic fraud: Sharp Practices and naive systems:
                  Naive Systems by Bryan Clough, 1994, Soft Cover, 154pp., {ISBN} 090
                  792 3283},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {284},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90117-1},
  doi          = {10.1016/0267-3649(94)90117-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ward94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Worthy94,
  author       = {John Worthy},
  title        = {Software law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {3},
  pages        = {123--126},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90057-4},
  doi          = {10.1016/0267-3649(94)90057-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Worthy94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wright94,
  author       = {Benjamin Wright},
  title        = {Electronic commerce},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {311--312},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90123-6},
  doi          = {10.1016/0267-3649(94)90123-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wright94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac94,
  author       = {Bernard P. Zajac Jr.},
  title        = {Clinton administration proposes national telecommunications policy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {2},
  pages        = {96},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90110-4},
  doi          = {10.1016/0267-3649(94)90110-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac94a,
  author       = {Bernard P. Zajac Jr.},
  title        = {{US} focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {10},
  number       = {6},
  pages        = {322--323},
  year         = {1994},
  url          = {https://doi.org/10.1016/0267-3649(94)90128-7},
  doi          = {10.1016/0267-3649(94)90128-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics