Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr23.bht:"
@article{DBLP:journals/clsr/000207, author = {David Bainbridge}, title = {Court of Appeal parts company with the {EPO} on software patents}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {199--204}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.001}, doi = {10.1016/J.CLSR.2007.01.001}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/000207a, author = {David Bainbridge}, title = {Criminal law tackles computer fraud and misuse}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {276--281}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.001}, doi = {10.1016/J.CLSR.2007.03.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000207a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/000207b, author = {David Bainbridge}, title = {Groundless threats and the Internet}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {282--284}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.002}, doi = {10.1016/J.CLSR.2007.03.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000207b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C07, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - Co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {27--31}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.010}, doi = {10.1016/J.CLSR.2006.11.010}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C07a, author = {Mark Turner and Dominic Callaghan}, title = {{UK} to finally implement the {WEEE} Directive}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {73--76}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.007}, doi = {10.1016/J.CLSR.2006.11.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C07b, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - Co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {143--147}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.012}, doi = {10.1016/J.CLSR.2007.01.012}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C07c, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - Co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {233--237}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.015}, doi = {10.1016/J.CLSR.2007.03.015}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C07c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C07d, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - Co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {317--321}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.06.001}, doi = {10.1016/J.CLSR.2007.06.001}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C07d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C07e, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - Co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {404--408}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.08.001}, doi = {10.1016/J.CLSR.2007.08.001}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C07e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C07f, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - Co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {501--505}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.10.003}, doi = {10.1016/J.CLSR.2007.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C07f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0005HG07, author = {Mark Taylor and John Haggerty and David Gresty}, title = {The legal aspects of corporate computer forensic investigations}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {562--566}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.002}, doi = {10.1016/J.CLSR.2007.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0005HG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ayoade07, author = {John Ayoade}, title = {Roadmap to solving security and privacy concerns in {RFID} systems}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {555--561}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.005}, doi = {10.1016/J.CLSR.2007.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ayoade07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/BoardmanM07, author = {Ruth Boardman and Siobhan McManus}, title = {Court of Appeal considers the meaning of 'processing' under the Data Protection Act - \emph{Johnson v. Medical Defence Union (No 2) {[2007]} {EWCA} Civ 262}}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {466--470}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.005}, doi = {10.1016/J.CLSR.2007.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/BoardmanM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Chaudri07, author = {Abida Chaudri}, title = {Internet domain names and the interaction with intellectual property}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {62--66}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.001}, doi = {10.1016/J.CLSR.2006.11.001}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Chaudri07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Chaudri07a, author = {Abida Chaudri}, title = {Internet domain names and the interaction with intellectual property}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {270--275}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.010}, doi = {10.1016/J.CLSR.2007.03.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Chaudri07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/ChurchK07, author = {Peter Church and Georgina Kon}, title = {Google at the heart of a data protection storm}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {461--465}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.006}, doi = {10.1016/J.CLSR.2007.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/ChurchK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Cleff07, author = {Evelyne Beatrix Cleff}, title = {Implementing the legal criteria of meaningful consent in the concept of mobile advertising}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {262--269}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.005}, doi = {10.1016/J.CLSR.2007.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Cleff07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Conradi07, author = {Mike Conradi}, title = {Legal developments in {IT} security}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {365--369}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.005}, doi = {10.1016/J.CLSR.2007.05.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Conradi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/CraghillW07, author = {Jane Craghill and Mark Watts}, title = {Gowers review - Intellectual property}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {205--207}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.009}, doi = {10.1016/J.CLSR.2007.01.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/CraghillW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Crichard07, author = {Mark Crichard}, title = {{OK} ! So we now have a final decision, or do we? - \emph{Douglas {\&} Ors v. Hello! Ltd {\&} Ors} {[2007]} {UKHL} 21 {(2} May 2007)}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {378--380}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.004}, doi = {10.1016/J.CLSR.2007.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Crichard07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/CrichardS07, author = {Mark Crichard and Emily Southon}, title = {Second hand software - The risks}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {375--377}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.003}, doi = {10.1016/J.CLSR.2007.05.003}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/CrichardS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/EckhardtLS07, author = {Jens Eckhardt and Martin Lundborg and Claudia Schlipp}, title = {Digital rights management {(DRM)} and the development of mobile content in Europe}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {543--549}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.008}, doi = {10.1016/J.CLSR.2007.09.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/EckhardtLS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/FreedmanH07, author = {Clive Freedman and Jake Hardy}, title = {J Pereira Fernandes {SA} v. Mehta: {A} 21st century email meets a 17th century statute}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {77--81}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.09.002}, doi = {10.1016/J.CLSR.2006.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/FreedmanH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ganley07, author = {Paul Ganley}, title = {Copyright and {IPTV}}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {248--261}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.005}, doi = {10.1016/J.CLSR.2007.01.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ganley07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greenleaf07, author = {Graham Greenleaf}, title = {Australia's proposed {ID} card: Still quacking like a duck}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {156--166}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.002}, doi = {10.1016/J.CLSR.2007.01.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greenleaf07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greenleaf07a, author = {Graham Greenleaf}, title = {'Access all areas': Function creep guaranteed in Australia's {ID} Card Bill (No. 1)}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {332--341}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.006}, doi = {10.1016/J.CLSR.2007.05.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greenleaf07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greguras07, author = {Fred Greguras}, title = {Intellectual property strategy and best practices for R{\&}D services in China}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {449--452}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.003}, doi = {10.1016/J.CLSR.2007.07.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greguras07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/HallidayACJ07, author = {David Halliday and Miriam Andrews and Paul Collins and Elizabeth Jones}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} {\&} telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {138--142}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.011}, doi = {10.1016/J.CLSR.2007.01.011}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/HallidayACJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/HallidayAM07, author = {David Halliday and Miriam Andrews and Tabeebah Malik}, title = {Baker {\&} McKenzie's annual review of developments in {EU} law relating to IP, {IT} {\&} telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {21--26}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.12.002}, doi = {10.1016/J.CLSR.2006.12.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/HallidayAM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/HallidayDK07, author = {David Halliday and Michael Dizon and Helen Kemmitt}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} and telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {227--232}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.014}, doi = {10.1016/J.CLSR.2007.03.014}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/HallidayDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Harrington07, author = {Justin Harrington}, title = {The games people play: \emph{Nova Productions v Mazooma} {[2007]} {EWCA} Civ 219 in the Court of the Appeal}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {471--475}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.004}, doi = {10.1016/J.CLSR.2007.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Harrington07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KemmittMDMT07, author = {Helen Kemmitt and Tabeebah Malik and Michael Dizon and Paul McGrath and Mandy Tang}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} and telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {313--316}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.007}, doi = {10.1016/J.CLSR.2007.05.007}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KemmittMDMT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KennedyD07, author = {Gabriela Kennedy and Sarah Doyle}, title = {A snapshot of legal developments and industry issues relevant to information technology, media and telecommunications in key jurisdictions across the Asia Pacific - Co-ordinated by Lovells and contributed to by other leading law firms in the region}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {148--155}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.007}, doi = {10.1016/J.CLSR.2007.01.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KennedyD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KennedyD07a, author = {Gabriela Kennedy and Sarah Doyle}, title = {A snapshot of legal developments and industry issues relevant to information technology, media and telecommunications law in key jurisdictions across the Asia Pacific - Co-ordinated by Lovells and contributed to by other leading law firms in the region}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {238--247}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.012}, doi = {10.1016/J.CLSR.2007.03.012}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KennedyD07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KennedyD07b, author = {Gabriela Kennedy and Sarah Doyle}, title = {A snapshot of legal developments and industry issues relevant to information technology, media and telecommunications law in key jurisdictions across the Asia Pacific - Co-ordinated by Lovells and contributed to by other leading law firms in the region}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {322--331}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.008}, doi = {10.1016/J.CLSR.2007.05.008}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KennedyD07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KennedyD07c, author = {Gabriela Kennedy and Sarah Doyle}, title = {A snapshot of legal developments and industry issues relevant to information technology, media and telecommunications law in key jurisdictions across the Asia Pacific - co-ordinated by Lovells and contributed to by other leading law firms in the region}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {409--414}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.009}, doi = {10.1016/J.CLSR.2007.07.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KennedyD07c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KennedyD07d, author = {Gabriela Kennedy and Sarah Doyle}, title = {A snapshot of legal developments and industry issues relevant to information technology, media and telecommunications law in key jurisdictions across the Asia Pacific - Co-ordinated by Lovells and contributed to by other leading law firms in the region}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {506--513}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.009}, doi = {10.1016/J.CLSR.2007.09.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KennedyD07d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kierkegaard07, author = {Sylvia Mercado Kierkegaard}, title = {Harmonising the regulatory regime for cross-border payment services}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {177--187}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.003}, doi = {10.1016/J.CLSR.2006.11.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kierkegaard07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kierkegaard07a, author = {Sylvia Kierkegaard}, title = {Charging up the batteries: Squeezing more capacity and power into the new {EU} Battery Directive}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {357--364}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.001}, doi = {10.1016/J.CLSR.2007.05.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kierkegaard07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KleveMN07, author = {Pieter Kleve and Richard V. de Mulder and Kees van Noortwijk}, title = {Information technology in intellectual property law - Problem solving or window dressing?}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {427--435}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.009}, doi = {10.1016/J.CLSR.2007.03.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KleveMN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Laurent07, author = {Philippe Laurent}, title = {Google News banned by Brussels High Court - \emph{Copiepresse {SCRL} v. Google Inc.} - Prohibitory injunction of the President of the High Court of Brussels, 5 September 2006}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {82--85}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.004}, doi = {10.1016/J.CLSR.2006.11.004}, timestamp = {Sun, 11 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Laurent07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Laurent07a, author = {Philippe Laurent}, title = {Brussels High Court confirms Google News' ban - \emph{Copiepresse {SCRL} v. Google Inc.} - Prohibitory injunction/stop order of the President of the High Court of Brussels, 13 February 2007 [opposition procedure against the first default stop order by the same President]}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {290--293}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.011}, doi = {10.1016/J.CLSR.2007.03.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Laurent07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Morse07, author = {Edward A. Morse}, title = {The Internet gambling conundrum: Extraterritorial impacts of {U.S.} laws on Internet businesses}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {529--536}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.007}, doi = {10.1016/J.CLSR.2007.09.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Morse07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/NaylorJ07, author = {David Naylor and Andrew Jaworski}, title = {Linking your way to liability? - \emph{Cooper v. Universal Music Australia Ltd} {[2006]}}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {285--289}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.007}, doi = {10.1016/J.CLSR.2007.03.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/NaylorJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/OlsenM07, author = {Thomas Olsen and Tobias Mahler}, title = {Risk, responsibility and compliance in 'Circles of Trust' - Part {I}}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {342--351}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.009}, doi = {10.1016/J.CLSR.2007.05.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/OlsenM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/OlsenM07a, author = {Thomas Olsen and Tobias Mahler}, title = {Identity management and data protection law: Risk, responsibility and compliance in 'Circles of Trust' - Part {II}}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {415--426}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.001}, doi = {10.1016/J.CLSR.2007.07.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/OlsenM07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Otter07, author = {Thomas Otter}, title = {Data protection law: The Cinderella of the software industry?}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {67--72}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.005}, doi = {10.1016/J.CLSR.2006.11.005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Otter07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rawson07, author = {Stephen Rawson}, title = {VoIP services: Regulatory perspectives from developing countries}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {188--193}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.006}, doi = {10.1016/J.CLSR.2007.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rawson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/ReesH07, author = {Philip Rees and Dominic Hodgkinson}, title = {Binding Corporate Rules: {A} simpler clearer vision?}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {352--356}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.004}, doi = {10.1016/J.CLSR.2007.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/ReesH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Reid07, author = {Alan S. Reid}, title = {Is society smart enough to deal with smart cards?}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {53--61}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.006}, doi = {10.1016/J.CLSR.2006.11.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Reid07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07, author = {Stephen Saxby}, title = {\emph{Book review}: Sentencing policy in the information society: Sentencing in the Age of Information - from Faust to Macintosh, Katja Franko Aas, Glasshouse Press (2005), {(205} pp., soft-cover), {ISBN:} 1904385389}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {86}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.10.005}, doi = {10.1016/J.CLSR.2006.10.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07a, author = {Stephen Saxby}, title = {\emph{Book review}: Cyber law: Cyber Consumer Law and Unfair Trading Practices, Cristina Coteanu, Ashgate Publishing Limited (2005), {(256} pp., hard-back, {\textsterling}57.50), {ISBN:} 0 7546 2417X}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {86}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.10.006}, doi = {10.1016/J.CLSR.2006.10.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07b, author = {Stephen Saxby}, title = {\emph{Book review}: Internet regulation: Self-regulation and the Internet, Monroe E. Price, Stefaan G. Verhulst, Kluwer Law International (2005), {(208} pp., hard-cover, Eur 110; {\textdollar} 118; {\textsterling} 77), {ISBN:} 90 411 2306 7}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {86--87}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.10.007}, doi = {10.1016/J.CLSR.2006.10.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07c, author = {Stephen Saxby}, title = {\emph{Book review}: Managing Risk: Technology and Communications, Jonathan Armstrong, Mark Rhys-Jones, Daniel Dresner, LexisNexis, {UK} (2004), {(209} pp., soft-cover), {ISBN:} 0 7545 2468 {X}}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {87}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.10.008}, doi = {10.1016/J.CLSR.2006.10.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07d, author = {Stephen Saxby}, title = {\emph{Book review}: Economics and copyright: Developments in the Economics of Copyright - Research and analysis, Lisa N. Takeyama, Wendy J. Gordon, Ruth Towse (Eds.), Edward Elgar Publishers (2005), {(197} pp., hard-cover, {\textsterling}55.00), {ISBN:} 1 84376 930 1}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {87}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.10.010}, doi = {10.1016/J.CLSR.2006.10.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07e, author = {Stephen Saxby}, title = {Importance of {UK} public sector information highlighted in new report}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {123--124}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.008}, doi = {10.1016/J.CLSR.2007.01.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07f, author = {Stephen Saxby}, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {125--137}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.010}, doi = {10.1016/J.CLSR.2007.01.010}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07g, author = {Stephen Saxby}, title = {\emph{Book review}: Digital copyright law: Simon Stokes, Digital Copyright Law and Practice, 2nd ed., Hart Publishing (2005), {(195} pp., {\textsterling}35.00), {ISBN:} 1 84113 514 3}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {208}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.10.009}, doi = {10.1016/J.CLSR.2006.10.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07h, author = {Stephen Saxby}, title = {Passports in an identity crisis}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {209--210}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.013}, doi = {10.1016/J.CLSR.2007.03.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07i, author = {Stephen Saxby}, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {211--226}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.008}, doi = {10.1016/J.CLSR.2007.03.008}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07j, author = {Stephen Saxby}, title = {Parliamentary Committee strongly criticises {EU/US} Passenger Name Record Agreement}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {295--296}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.06.003}, doi = {10.1016/J.CLSR.2007.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07k, author = {Stephen Saxby}, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {297--312}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.06.002}, doi = {10.1016/J.CLSR.2007.06.002}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07l, author = {Stephen Saxby}, title = {Public sector information gets a strategic review}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {381--382}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.007}, doi = {10.1016/J.CLSR.2007.07.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07m, author = {Stephen Saxby}, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {383--398}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.07.008}, doi = {10.1016/J.CLSR.2007.07.008}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07n, author = {Stephen Saxby}, title = {House of Lords challenges Government and industry policy on Internet security}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {477--478}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.010}, doi = {10.1016/J.CLSR.2007.09.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby07o, author = {Stephen Saxby}, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {479--494}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.10.002}, doi = {10.1016/J.CLSR.2007.10.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby07o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Schmidt07, author = {Aernout Schmidt}, title = {{IT} and the judiciary in the Netherlands - {A} state of affairs}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {453--460}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.006}, doi = {10.1016/J.CLSR.2007.03.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Schmidt07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/SmallHHTGK07, author = {Harry Small and David Halliday and Deena Hazini and Siu Ha Tang and Tanya Grunenberg and Helen Kemmitt}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} {\&} telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {399--403}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.08.002}, doi = {10.1016/J.CLSR.2007.08.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/SmallHHTGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/SmallHHTT07, author = {Harry Small and David Halliday and Deena Hazini and Siu Ha Tang and Mandy Tang}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} and telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {495--500}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.10.001}, doi = {10.1016/J.CLSR.2007.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/SmallHHTT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Steennot07, author = {Reinhard Steennot}, title = {Offering financial services over the Internet: What is possible and how to protect consumers?}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {537--542}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.03.003}, doi = {10.1016/J.CLSR.2007.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Steennot07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Svantesson07, author = {Dan Jerker B. Svantesson}, title = {Conflict of laws issues associated with an action for interference with privacy}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {523--528}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.003}, doi = {10.1016/J.CLSR.2007.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Svantesson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Tang07, author = {Zheng Tang}, title = {An effective dispute resolution system for electronic consumer contracts}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {42--52}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.11.002}, doi = {10.1016/J.CLSR.2006.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Tang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ter07, author = {Kah Leng Ter}, title = {Wireless Internet access and potential liabilities}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {550--554}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.001}, doi = {10.1016/J.CLSR.2007.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ter07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Turle07, author = {Marcus Turle}, title = {Freedom of information and the public interest test}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {167--176}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.003}, doi = {10.1016/J.CLSR.2007.01.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Turle07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Turle07a, author = {Marcus Turle}, title = {Freedom of information and data protection law - {A} conflict or reconciliation?}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {6}, pages = {514--522}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.09.006}, doi = {10.1016/J.CLSR.2007.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Turle07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/TyackeW07, author = {Nicholas Tyacke and Timothy Webb}, title = {The patentability of business methods in Australia and the United States - The difficulties continue}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {4}, pages = {370--374}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.05.002}, doi = {10.1016/J.CLSR.2007.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/TyackeW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wang07, author = {Minyan Wang}, title = {Do the regulations on electronic signatures facilitate international electronic commerce? {A} critical review}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {1}, pages = {32--41}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2006.09.006}, doi = {10.1016/J.CLSR.2006.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/WorthyF07, author = {John Worthy and Martin Fanning}, title = {Denial-of-Service: Plugging the legal loopholes?}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {2}, pages = {194--198}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.01.004}, doi = {10.1016/J.CLSR.2007.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/WorthyF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X07, title = {\emph{Book review}: Misuse of public office: Corruption and misuse of public office, Colin Nicholls, Tim Daniel, Martin Polaine, John Hatchard, Oxford University Press (2006), {(822} pp., hard-cover, {\textsterling}125.00), {ISBN:} 0 19 927458 4}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {294}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.02.001}, doi = {10.1016/J.CLSR.2007.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X07a, title = {\emph{Book review}: Intellectual property law - China: China intellectual property law guide, Debra Menon, 1st ed., Kluwer Law International (2005), (hard-cover, Euro 150.00; US{\textdollar} 192.00), {ISBN:} 90 411 2419 5}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {3}, pages = {294}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.02.005}, doi = {10.1016/J.CLSR.2007.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X07b, title = {\emph{Book review}: Cybercrime and jurisdiction ? a global survey, Bert-Jaap Koops, Susan W. Brenner (Eds.), {T.M.C.} Asser Press (2006), {(355} pp., hard-cover, {\textsterling}55.00; US{\textdollar} 95.00), {ISBN:} 90 6704 221 8}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {476}, year = {2007}, url = {https://doi.org/10.1016/j.clsr.2007.02.006}, doi = {10.1016/J.CLSR.2007.02.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Adrian07, title = {{RETRACTED:} I{\texttrademark}: Avatars as trade marks}, journal = {Comput. Law Secur. Rev.}, volume = {23}, number = {5}, pages = {436--448}, year = {2007}, note = {Withdrawn.}, url = {https://doi.org/10.1016/j.clsr.2007.07.002}, doi = {10.1016/J.CLSR.2007.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Adrian07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.