Search dblp for Publications

export results for "toc:db/journals/clsr/clsr23.bht:"

 download as .bib file

@article{DBLP:journals/clsr/000207,
  author       = {David Bainbridge},
  title        = {Court of Appeal parts company with the {EPO} on software patents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {199--204},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.001},
  doi          = {10.1016/J.CLSR.2007.01.001},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000207.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/000207a,
  author       = {David Bainbridge},
  title        = {Criminal law tackles computer fraud and misuse},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {276--281},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.001},
  doi          = {10.1016/J.CLSR.2007.03.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000207a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/000207b,
  author       = {David Bainbridge},
  title        = {Groundless threats and the Internet},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {282--284},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.002},
  doi          = {10.1016/J.CLSR.2007.03.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000207b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C07,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - Co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {27--31},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.010},
  doi          = {10.1016/J.CLSR.2006.11.010},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C07a,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {{UK} to finally implement the {WEEE} Directive},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {73--76},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.007},
  doi          = {10.1016/J.CLSR.2006.11.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C07b,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - Co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {143--147},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.012},
  doi          = {10.1016/J.CLSR.2007.01.012},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C07c,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - Co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {233--237},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.015},
  doi          = {10.1016/J.CLSR.2007.03.015},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C07c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C07d,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - Co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {317--321},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.06.001},
  doi          = {10.1016/J.CLSR.2007.06.001},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C07d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C07e,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - Co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {404--408},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.08.001},
  doi          = {10.1016/J.CLSR.2007.08.001},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C07e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C07f,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - Co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {501--505},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.10.003},
  doi          = {10.1016/J.CLSR.2007.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C07f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0005HG07,
  author       = {Mark Taylor and
                  John Haggerty and
                  David Gresty},
  title        = {The legal aspects of corporate computer forensic investigations},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {562--566},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.002},
  doi          = {10.1016/J.CLSR.2007.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0005HG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ayoade07,
  author       = {John Ayoade},
  title        = {Roadmap to solving security and privacy concerns in {RFID} systems},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {555--561},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.005},
  doi          = {10.1016/J.CLSR.2007.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ayoade07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/BoardmanM07,
  author       = {Ruth Boardman and
                  Siobhan McManus},
  title        = {Court of Appeal considers the meaning of 'processing' under the Data
                  Protection Act - \emph{Johnson v. Medical Defence Union (No 2) {[2007]}
                  {EWCA} Civ 262}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {466--470},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.005},
  doi          = {10.1016/J.CLSR.2007.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/BoardmanM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Chaudri07,
  author       = {Abida Chaudri},
  title        = {Internet domain names and the interaction with intellectual property},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {62--66},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.001},
  doi          = {10.1016/J.CLSR.2006.11.001},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Chaudri07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Chaudri07a,
  author       = {Abida Chaudri},
  title        = {Internet domain names and the interaction with intellectual property},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {270--275},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.010},
  doi          = {10.1016/J.CLSR.2007.03.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Chaudri07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/ChurchK07,
  author       = {Peter Church and
                  Georgina Kon},
  title        = {Google at the heart of a data protection storm},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {461--465},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.006},
  doi          = {10.1016/J.CLSR.2007.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/ChurchK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Cleff07,
  author       = {Evelyne Beatrix Cleff},
  title        = {Implementing the legal criteria of meaningful consent in the concept
                  of mobile advertising},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {262--269},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.005},
  doi          = {10.1016/J.CLSR.2007.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Cleff07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Conradi07,
  author       = {Mike Conradi},
  title        = {Legal developments in {IT} security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {365--369},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.005},
  doi          = {10.1016/J.CLSR.2007.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Conradi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/CraghillW07,
  author       = {Jane Craghill and
                  Mark Watts},
  title        = {Gowers review - Intellectual property},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {205--207},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.009},
  doi          = {10.1016/J.CLSR.2007.01.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/CraghillW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Crichard07,
  author       = {Mark Crichard},
  title        = {{OK} ! So we now have a final decision, or do we? - \emph{Douglas
                  {\&} Ors v. Hello! Ltd {\&} Ors} {[2007]} {UKHL} 21 {(2} May
                  2007)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {378--380},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.004},
  doi          = {10.1016/J.CLSR.2007.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Crichard07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/CrichardS07,
  author       = {Mark Crichard and
                  Emily Southon},
  title        = {Second hand software - The risks},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {375--377},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.003},
  doi          = {10.1016/J.CLSR.2007.05.003},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/CrichardS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/EckhardtLS07,
  author       = {Jens Eckhardt and
                  Martin Lundborg and
                  Claudia Schlipp},
  title        = {Digital rights management {(DRM)} and the development of mobile content
                  in Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {543--549},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.008},
  doi          = {10.1016/J.CLSR.2007.09.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/EckhardtLS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/FreedmanH07,
  author       = {Clive Freedman and
                  Jake Hardy},
  title        = {J Pereira Fernandes {SA} v. Mehta: {A} 21st century email meets a
                  17th century statute},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {77--81},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.09.002},
  doi          = {10.1016/J.CLSR.2006.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/FreedmanH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ganley07,
  author       = {Paul Ganley},
  title        = {Copyright and {IPTV}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {248--261},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.005},
  doi          = {10.1016/J.CLSR.2007.01.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ganley07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greenleaf07,
  author       = {Graham Greenleaf},
  title        = {Australia's proposed {ID} card: Still quacking like a duck},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {156--166},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.002},
  doi          = {10.1016/J.CLSR.2007.01.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greenleaf07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greenleaf07a,
  author       = {Graham Greenleaf},
  title        = {'Access all areas': Function creep guaranteed in Australia's {ID}
                  Card Bill (No. 1)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {332--341},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.006},
  doi          = {10.1016/J.CLSR.2007.05.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greenleaf07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greguras07,
  author       = {Fred Greguras},
  title        = {Intellectual property strategy and best practices for R{\&}D services
                  in China},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {449--452},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.003},
  doi          = {10.1016/J.CLSR.2007.07.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greguras07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HallidayACJ07,
  author       = {David Halliday and
                  Miriam Andrews and
                  Paul Collins and
                  Elizabeth Jones},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} {\&} telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {138--142},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.011},
  doi          = {10.1016/J.CLSR.2007.01.011},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HallidayACJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HallidayAM07,
  author       = {David Halliday and
                  Miriam Andrews and
                  Tabeebah Malik},
  title        = {Baker {\&} McKenzie's annual review of developments in {EU} law
                  relating to IP, {IT} {\&} telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {21--26},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.12.002},
  doi          = {10.1016/J.CLSR.2006.12.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HallidayAM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HallidayDK07,
  author       = {David Halliday and
                  Michael Dizon and
                  Helen Kemmitt},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} and telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {227--232},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.014},
  doi          = {10.1016/J.CLSR.2007.03.014},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HallidayDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Harrington07,
  author       = {Justin Harrington},
  title        = {The games people play: \emph{Nova Productions v Mazooma} {[2007]}
                  {EWCA} Civ 219 in the Court of the Appeal},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {471--475},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.004},
  doi          = {10.1016/J.CLSR.2007.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Harrington07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KemmittMDMT07,
  author       = {Helen Kemmitt and
                  Tabeebah Malik and
                  Michael Dizon and
                  Paul McGrath and
                  Mandy Tang},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} and telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {313--316},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.007},
  doi          = {10.1016/J.CLSR.2007.05.007},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KemmittMDMT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KennedyD07,
  author       = {Gabriela Kennedy and
                  Sarah Doyle},
  title        = {A snapshot of legal developments and industry issues relevant to information
                  technology, media and telecommunications in key jurisdictions across
                  the Asia Pacific - Co-ordinated by Lovells and contributed to by other
                  leading law firms in the region},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {148--155},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.007},
  doi          = {10.1016/J.CLSR.2007.01.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KennedyD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KennedyD07a,
  author       = {Gabriela Kennedy and
                  Sarah Doyle},
  title        = {A snapshot of legal developments and industry issues relevant to information
                  technology, media and telecommunications law in key jurisdictions
                  across the Asia Pacific - Co-ordinated by Lovells and contributed
                  to by other leading law firms in the region},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {238--247},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.012},
  doi          = {10.1016/J.CLSR.2007.03.012},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KennedyD07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KennedyD07b,
  author       = {Gabriela Kennedy and
                  Sarah Doyle},
  title        = {A snapshot of legal developments and industry issues relevant to information
                  technology, media and telecommunications law in key jurisdictions
                  across the Asia Pacific - Co-ordinated by Lovells and contributed
                  to by other leading law firms in the region},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {322--331},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.008},
  doi          = {10.1016/J.CLSR.2007.05.008},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KennedyD07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KennedyD07c,
  author       = {Gabriela Kennedy and
                  Sarah Doyle},
  title        = {A snapshot of legal developments and industry issues relevant to information
                  technology, media and telecommunications law in key jurisdictions
                  across the Asia Pacific - co-ordinated by Lovells and contributed
                  to by other leading law firms in the region},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {409--414},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.009},
  doi          = {10.1016/J.CLSR.2007.07.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KennedyD07c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KennedyD07d,
  author       = {Gabriela Kennedy and
                  Sarah Doyle},
  title        = {A snapshot of legal developments and industry issues relevant to information
                  technology, media and telecommunications law in key jurisdictions
                  across the Asia Pacific - Co-ordinated by Lovells and contributed
                  to by other leading law firms in the region},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {506--513},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.009},
  doi          = {10.1016/J.CLSR.2007.09.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KennedyD07d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kierkegaard07,
  author       = {Sylvia Mercado Kierkegaard},
  title        = {Harmonising the regulatory regime for cross-border payment services},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {177--187},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.003},
  doi          = {10.1016/J.CLSR.2006.11.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kierkegaard07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kierkegaard07a,
  author       = {Sylvia Kierkegaard},
  title        = {Charging up the batteries: Squeezing more capacity and power into
                  the new {EU} Battery Directive},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {357--364},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.001},
  doi          = {10.1016/J.CLSR.2007.05.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kierkegaard07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KleveMN07,
  author       = {Pieter Kleve and
                  Richard V. de Mulder and
                  Kees van Noortwijk},
  title        = {Information technology in intellectual property law - Problem solving
                  or window dressing?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {427--435},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.009},
  doi          = {10.1016/J.CLSR.2007.03.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KleveMN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Laurent07,
  author       = {Philippe Laurent},
  title        = {Google News banned by Brussels High Court - \emph{Copiepresse {SCRL}
                  v. Google Inc.} - Prohibitory injunction of the President of the High
                  Court of Brussels, 5 September 2006},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {82--85},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.004},
  doi          = {10.1016/J.CLSR.2006.11.004},
  timestamp    = {Sun, 11 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Laurent07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Laurent07a,
  author       = {Philippe Laurent},
  title        = {Brussels High Court confirms Google News' ban - \emph{Copiepresse
                  {SCRL} v. Google Inc.} - Prohibitory injunction/stop order of the
                  President of the High Court of Brussels, 13 February 2007 [opposition
                  procedure against the first default stop order by the same President]},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {290--293},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.011},
  doi          = {10.1016/J.CLSR.2007.03.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Laurent07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Morse07,
  author       = {Edward A. Morse},
  title        = {The Internet gambling conundrum: Extraterritorial impacts of {U.S.}
                  laws on Internet businesses},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {529--536},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.007},
  doi          = {10.1016/J.CLSR.2007.09.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Morse07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/NaylorJ07,
  author       = {David Naylor and
                  Andrew Jaworski},
  title        = {Linking your way to liability? - \emph{Cooper v. Universal Music Australia
                  Ltd} {[2006]}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {285--289},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.007},
  doi          = {10.1016/J.CLSR.2007.03.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/NaylorJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/OlsenM07,
  author       = {Thomas Olsen and
                  Tobias Mahler},
  title        = {Risk, responsibility and compliance in 'Circles of Trust' - Part {I}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {342--351},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.009},
  doi          = {10.1016/J.CLSR.2007.05.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/OlsenM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/OlsenM07a,
  author       = {Thomas Olsen and
                  Tobias Mahler},
  title        = {Identity management and data protection law: Risk, responsibility
                  and compliance in 'Circles of Trust' - Part {II}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {415--426},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.001},
  doi          = {10.1016/J.CLSR.2007.07.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/OlsenM07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Otter07,
  author       = {Thomas Otter},
  title        = {Data protection law: The Cinderella of the software industry?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {67--72},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.005},
  doi          = {10.1016/J.CLSR.2006.11.005},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Otter07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rawson07,
  author       = {Stephen Rawson},
  title        = {VoIP services: Regulatory perspectives from developing countries},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {188--193},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.006},
  doi          = {10.1016/J.CLSR.2007.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rawson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/ReesH07,
  author       = {Philip Rees and
                  Dominic Hodgkinson},
  title        = {Binding Corporate Rules: {A} simpler clearer vision?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {352--356},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.004},
  doi          = {10.1016/J.CLSR.2007.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/ReesH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Reid07,
  author       = {Alan S. Reid},
  title        = {Is society smart enough to deal with smart cards?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {53--61},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.006},
  doi          = {10.1016/J.CLSR.2006.11.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Reid07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Sentencing policy in the information society:
                  Sentencing in the Age of Information - from Faust to Macintosh, Katja
                  Franko Aas, Glasshouse Press (2005), {(205} pp., soft-cover), {ISBN:}
                  1904385389},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {86},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.005},
  doi          = {10.1016/J.CLSR.2006.10.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07a,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Cyber law: Cyber Consumer Law and Unfair Trading
                  Practices, Cristina Coteanu, Ashgate Publishing Limited (2005), {(256}
                  pp., hard-back, {\textsterling}57.50), {ISBN:} 0 7546 2417X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {86},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.006},
  doi          = {10.1016/J.CLSR.2006.10.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07b,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Internet regulation: Self-regulation and the Internet,
                  Monroe E. Price, Stefaan G. Verhulst, Kluwer Law International (2005),
                  {(208} pp., hard-cover, Eur 110; {\textdollar} 118; {\textsterling}
                  77), {ISBN:} 90 411 2306 7},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {86--87},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.007},
  doi          = {10.1016/J.CLSR.2006.10.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07c,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Managing Risk: Technology and Communications,
                  Jonathan Armstrong, Mark Rhys-Jones, Daniel Dresner, LexisNexis, {UK}
                  (2004), {(209} pp., soft-cover), {ISBN:} 0 7545 2468 {X}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {87},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.008},
  doi          = {10.1016/J.CLSR.2006.10.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07d,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Economics and copyright: Developments in the Economics
                  of Copyright - Research and analysis, Lisa N. Takeyama, Wendy J. Gordon,
                  Ruth Towse (Eds.), Edward Elgar Publishers (2005), {(197} pp., hard-cover,
                  {\textsterling}55.00), {ISBN:} 1 84376 930 1},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {87},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.010},
  doi          = {10.1016/J.CLSR.2006.10.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07e,
  author       = {Stephen Saxby},
  title        = {Importance of {UK} public sector information highlighted in new report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {123--124},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.008},
  doi          = {10.1016/J.CLSR.2007.01.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07f,
  author       = {Stephen Saxby},
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {125--137},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.010},
  doi          = {10.1016/J.CLSR.2007.01.010},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07g,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Digital copyright law: Simon Stokes, Digital Copyright
                  Law and Practice, 2nd ed., Hart Publishing (2005), {(195} pp., {\textsterling}35.00),
                  {ISBN:} 1 84113 514 3},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {208},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.009},
  doi          = {10.1016/J.CLSR.2006.10.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07h,
  author       = {Stephen Saxby},
  title        = {Passports in an identity crisis},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {209--210},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.013},
  doi          = {10.1016/J.CLSR.2007.03.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07i,
  author       = {Stephen Saxby},
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {211--226},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.008},
  doi          = {10.1016/J.CLSR.2007.03.008},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07j,
  author       = {Stephen Saxby},
  title        = {Parliamentary Committee strongly criticises {EU/US} Passenger Name
                  Record Agreement},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {295--296},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.06.003},
  doi          = {10.1016/J.CLSR.2007.06.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07k,
  author       = {Stephen Saxby},
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {297--312},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.06.002},
  doi          = {10.1016/J.CLSR.2007.06.002},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07l,
  author       = {Stephen Saxby},
  title        = {Public sector information gets a strategic review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {381--382},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.007},
  doi          = {10.1016/J.CLSR.2007.07.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07m,
  author       = {Stephen Saxby},
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {383--398},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.008},
  doi          = {10.1016/J.CLSR.2007.07.008},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07n,
  author       = {Stephen Saxby},
  title        = {House of Lords challenges Government and industry policy on Internet
                  security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {477--478},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.010},
  doi          = {10.1016/J.CLSR.2007.09.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby07o,
  author       = {Stephen Saxby},
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {479--494},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.10.002},
  doi          = {10.1016/J.CLSR.2007.10.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby07o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Schmidt07,
  author       = {Aernout Schmidt},
  title        = {{IT} and the judiciary in the Netherlands - {A} state of affairs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {453--460},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.006},
  doi          = {10.1016/J.CLSR.2007.03.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Schmidt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/SmallHHTGK07,
  author       = {Harry Small and
                  David Halliday and
                  Deena Hazini and
                  Siu Ha Tang and
                  Tanya Grunenberg and
                  Helen Kemmitt},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} {\&} telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {399--403},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.08.002},
  doi          = {10.1016/J.CLSR.2007.08.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/SmallHHTGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/SmallHHTT07,
  author       = {Harry Small and
                  David Halliday and
                  Deena Hazini and
                  Siu Ha Tang and
                  Mandy Tang},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} and telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {495--500},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.10.001},
  doi          = {10.1016/J.CLSR.2007.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/SmallHHTT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Steennot07,
  author       = {Reinhard Steennot},
  title        = {Offering financial services over the Internet: What is possible and
                  how to protect consumers?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {537--542},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.03.003},
  doi          = {10.1016/J.CLSR.2007.03.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Steennot07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Svantesson07,
  author       = {Dan Jerker B. Svantesson},
  title        = {Conflict of laws issues associated with an action for interference
                  with privacy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {523--528},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.003},
  doi          = {10.1016/J.CLSR.2007.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Svantesson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Tang07,
  author       = {Zheng Tang},
  title        = {An effective dispute resolution system for electronic consumer contracts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {42--52},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.11.002},
  doi          = {10.1016/J.CLSR.2006.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Tang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ter07,
  author       = {Kah Leng Ter},
  title        = {Wireless Internet access and potential liabilities},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {550--554},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.001},
  doi          = {10.1016/J.CLSR.2007.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ter07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Turle07,
  author       = {Marcus Turle},
  title        = {Freedom of information and the public interest test},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {167--176},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.003},
  doi          = {10.1016/J.CLSR.2007.01.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Turle07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Turle07a,
  author       = {Marcus Turle},
  title        = {Freedom of information and data protection law - {A} conflict or reconciliation?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {6},
  pages        = {514--522},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.09.006},
  doi          = {10.1016/J.CLSR.2007.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Turle07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/TyackeW07,
  author       = {Nicholas Tyacke and
                  Timothy Webb},
  title        = {The patentability of business methods in Australia and the United
                  States - The difficulties continue},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {4},
  pages        = {370--374},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.05.002},
  doi          = {10.1016/J.CLSR.2007.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/TyackeW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wang07,
  author       = {Minyan Wang},
  title        = {Do the regulations on electronic signatures facilitate international
                  electronic commerce? {A} critical review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {1},
  pages        = {32--41},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2006.09.006},
  doi          = {10.1016/J.CLSR.2006.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/WorthyF07,
  author       = {John Worthy and
                  Martin Fanning},
  title        = {Denial-of-Service: Plugging the legal loopholes?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {2},
  pages        = {194--198},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.01.004},
  doi          = {10.1016/J.CLSR.2007.01.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/WorthyF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X07,
  title        = {\emph{Book review}: Misuse of public office: Corruption and misuse
                  of public office, Colin Nicholls, Tim Daniel, Martin Polaine, John
                  Hatchard, Oxford University Press (2006), {(822} pp., hard-cover,
                  {\textsterling}125.00), {ISBN:} 0 19 927458 4},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {294},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.02.001},
  doi          = {10.1016/J.CLSR.2007.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X07a,
  title        = {\emph{Book review}: Intellectual property law - China: China intellectual
                  property law guide, Debra Menon, 1st ed., Kluwer Law International
                  (2005), (hard-cover, Euro 150.00; US{\textdollar} 192.00), {ISBN:}
                  90 411 2419 5},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {3},
  pages        = {294},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.02.005},
  doi          = {10.1016/J.CLSR.2007.02.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X07b,
  title        = {\emph{Book review}: Cybercrime and jurisdiction ? a global survey,
                  Bert-Jaap Koops, Susan W. Brenner (Eds.), {T.M.C.} Asser Press (2006),
                  {(355} pp., hard-cover, {\textsterling}55.00; US{\textdollar} 95.00),
                  {ISBN:} 90 6704 221 8},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {476},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.clsr.2007.02.006},
  doi          = {10.1016/J.CLSR.2007.02.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Adrian07,
  title        = {{RETRACTED:} I{\texttrademark}: Avatars as trade marks},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {23},
  number       = {5},
  pages        = {436--448},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1016/j.clsr.2007.07.002},
  doi          = {10.1016/J.CLSR.2007.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Adrian07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics