Search dblp for Publications

export results for "toc:db/journals/clsr/clsr12.bht:"

 download as .bib file

@article{DBLP:journals/clsr/000296,
  author       = {David L. Hayes},
  title        = {A comprehensive current analysis of software look and feel protection
                  - Part {III} - Recent 'look' cases plus commencement of analysis of
                  the 'feel' cases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {66--79},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80096-5},
  doi          = {10.1016/S0267-3649(00)80096-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000296.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {1},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80087-4},
  doi          = {10.1016/S0267-3649(00)80087-4},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96a,
  title        = {International legal protection for software},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {2--13},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80088-6},
  doi          = {10.1016/S0267-3649(00)80088-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96aa,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {117--131},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80108-9},
  doi          = {10.1016/S0267-3649(00)80108-9},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ab,
  title        = {Communicating Britain's future},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {132},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80109-0},
  doi          = {10.1016/S0267-3649(00)80109-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ac,
  title        = {A comprehensive analysis of software look and feel protection - Part
                  {IV} - Continued analysis of the 'feel' cases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {133},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90012-6},
  doi          = {10.1016/S0267-3649(96)90012-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ad,
  title        = {Experimental use and patents: By David Gilat, Volume 16, {IIC} Studies
                  in Industrial Property and Copyright Law, 1995, soft-cover, {VCH}
                  Publishers Inc., DM128/SFr128, 141 pp., {ISBN} 3527286608},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {134--142},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84619-X},
  doi          = {10.1016/0267-3649(96)84619-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ae,
  title        = {The {EC} legal advisory Board's reply to the green paper on copyright
                  and related rights in the information society},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {142},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90013-8},
  doi          = {10.1016/S0267-3649(96)90013-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96af,
  title        = {Public administration and information technology: By Jon Bing and
                  Dag Wiese Schartum, 1995, soft-cover, Tano Press, 295 pp., NOK238,
                  - {ISBN} 8251834163},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {143--149},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90014-X},
  doi          = {10.1016/S0267-3649(96)90014-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ag,
  title        = {Public policy and legal regulation of the information market in the
                  digital network environment: By Stephen Saxby, soft-cover, Tano Press,
                  184 pp., NOK238, - {ISBN} 8251834449},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {149},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90015-1},
  doi          = {10.1016/S0267-3649(96)90015-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ah,
  title        = {Statement of William J. Cook before the house judiciary committee
                  courts and intellectual property subcommittee continued hearing on
                  the {NII} copyright protection act - 8 February 1996},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {149},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90016-3},
  doi          = {10.1016/S0267-3649(96)90016-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ah.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ai,
  title        = {International year book of law, computers and technology, volumes
                  {VII-IX:} Edited by Kenneth Russell, 1993-1995, hard-cover, Carfax
                  Publishing Company, 275 pp. (Vol VII), 362 pp. (Vol {VIII)} and 241
                  pp. (Vol IX), {ISBN} 0902 879 057 (Vol VII); 0902 879 502 (Vol {VIII)}
                  and 0902 879 60X (Vol {IX)}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {150--156},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90017-5},
  doi          = {10.1016/S0267-3649(96)90017-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ai.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96aj,
  title        = {Protection of computer programs in Ireland},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {156},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90018-7},
  doi          = {10.1016/S0267-3649(96)90018-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96aj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ak,
  title        = {European information and communication technologies},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {157--159},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84620-6},
  doi          = {10.1016/0267-3649(96)84620-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ak.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96al,
  title        = {The data protection directive: {A} legal analysis},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {159},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90019-9},
  doi          = {10.1016/S0267-3649(96)90019-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96al.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96am,
  title        = {Data protection in health and telematics projects compliance with
                  legal and ethical requirements\({}^{\mbox{1}}\)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {160--168},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84621-8},
  doi          = {10.1016/0267-3649(96)84621-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96am.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96an,
  title        = {Peddling big brother},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {169--176},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84622-X},
  doi          = {10.1016/0267-3649(96)84622-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96an.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ao,
  title        = {Infonortics has published two new indepth briefings on different aspects
                  of electronic publishing. The first is: The legal and regulatory environment
                  for electronic information: 2nd Edition, by Charles Oppenheim, 1995,
                  soft-cover, Infonortics, 132 pp., {\textsterling}95/US{\textdollar}150,
                  {ISBN} 18736699239},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {177--179},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84623-1},
  doi          = {10.1016/0267-3649(96)84623-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ao.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ap,
  title        = {The second text is: Publishing on the internet - {A} new medium for
                  a new millennium: By Stephen {E} Arnold, 1996, soft-cover, Infonortics,
                  157 pp., {\textsterling}95/US {\textdollar}150, {ISBN} 187369928X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {179},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90020-5},
  doi          = {10.1016/S0267-3649(96)90020-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ap.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96aq,
  title        = {Electronic cash strikes a sour note for privacy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {180--181},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84624-3},
  doi          = {10.1016/0267-3649(96)84624-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96aq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ar,
  title        = {{OECD} publications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {181},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90021-7},
  doi          = {10.1016/S0267-3649(96)90021-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ar.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96as,
  title        = {{EC} developments in it law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {182--184},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90022-9},
  doi          = {10.1016/S0267-3649(96)90022-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96as.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96at,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {3},
  pages        = {185--200},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90023-0},
  doi          = {10.1016/S0267-3649(96)90023-0},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96at.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96au,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {201},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90176-4},
  doi          = {10.1016/S0267-3649(96)90176-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96au.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96av,
  title        = {Doing business on the internet: The legal issues},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {202--213},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89608-7},
  doi          = {10.1016/0267-3649(96)89608-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96av.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96aw,
  title        = {A comprehensive analysis of software look and feel protection - part
                  v - continued analysis of the 'feel' cases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {214--225},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89609-9},
  doi          = {10.1016/0267-3649(96)89609-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96aw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ax,
  title        = {Intellectual property law: By Jon Holyoak and Paul Torremans, 1995,
                  soft-cover, Butterworth, 489 pp., {\textsterling}24.95, {ISBN} 040605245X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {225},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90177-6},
  doi          = {10.1016/S0267-3649(96)90177-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ax.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ay,
  title        = {Butterworths intellectual property law handbooks: 2nd Edition, consulting
                  editor Jeremy Phillips, 1994, soft-cover, Butterworths, 990 pp., {\textsterling}29.95,
                  {ISBN} 0406026742},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {225},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90178-8},
  doi          = {10.1016/S0267-3649(96)90178-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ay.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96az,
  title        = {Online distribution: Mechanical right, performing right, or both},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {226--232},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89610-5},
  doi          = {10.1016/0267-3649(96)89610-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96az.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96b,
  title        = {A comprehensive analysis of software 'look and feel' protection: Part
                  {II} - Apple v Microsoft - The ninth circuit's decision},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {14--27},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80089-8},
  doi          = {10.1016/S0267-3649(00)80089-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ba,
  title        = {Software and intellectual property protection: By Bernard {A} Galler,
                  1995, hard-cover, Quorum Book (the Eurospan Group), 205 pp., {\textsterling}49.50,
                  {ISBN} 0899309747},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {232},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90179-X},
  doi          = {10.1016/S0267-3649(96)90179-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ba.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bb,
  title        = {Developing the legislative framework for the information society},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {233--234},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90180-6},
  doi          = {10.1016/S0267-3649(96)90180-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bb.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bc,
  title        = {Privacy and data protection laws in Malta},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {235--236},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89611-7},
  doi          = {10.1016/0267-3649(96)89611-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bd,
  title        = {Changes to the duration of copyright},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {237--239},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89612-9},
  doi          = {10.1016/0267-3649(96)89612-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96be,
  title        = {{EURIM} - European informatics market - Still going strong},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {240--242},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89613-0},
  doi          = {10.1016/0267-3649(96)89613-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96be.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bf,
  title        = {New report correspondent},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {242},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90181-8},
  doi          = {10.1016/S0267-3649(96)90181-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bg,
  title        = {The proposed new telecommunications access regime for Australia -
                  Post July 1997},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {243--246},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89614-2},
  doi          = {10.1016/0267-3649(96)89614-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bh,
  title        = {Signing electronic tax returns with penop},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {247--248},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89615-4},
  doi          = {10.1016/0267-3649(96)89615-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bh.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bi,
  title        = {This is the latest edition of Baker {\&} McKenzie's column on
                  recent developments in {EC} law relating to {IT.} {A} summary of this
                  information in tabular form will be printed (with any updates) in
                  the next edition of {CLSR}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {249--250},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90182-X},
  doi          = {10.1016/S0267-3649(96)90182-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bi.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bj,
  title        = {Patent office seeks views on programme formats},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {251},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90183-1},
  doi          = {10.1016/S0267-3649(96)90183-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bk,
  title        = {Uk Home office consultation paper on the ec data protection directive},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {251--252},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89616-6},
  doi          = {10.1016/0267-3649(96)89616-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bk.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bl,
  title        = {The ec data protection directive - data protection registrar enters
                  debate},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {252},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90184-3},
  doi          = {10.1016/S0267-3649(96)90184-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bl.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bm,
  title        = {Data protection registrar launches internet home page},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {252},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90185-5},
  doi          = {10.1016/S0267-3649(96)90185-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bn,
  title        = {{CCTA} reports on {UK} national inventory project},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {252--253},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90186-7},
  doi          = {10.1016/S0267-3649(96)90186-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bo,
  title        = {Internet domain name registration services},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {253},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89617-8},
  doi          = {10.1016/0267-3649(96)89617-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bo.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bp,
  title        = {Intellectual property right infringement insurance cover},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {253},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)90187-9},
  doi          = {10.1016/0267-3649(96)90187-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bq,
  title        = {The audit commission joins fast corporate membership scheme},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {253},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)90188-0},
  doi          = {10.1016/0267-3649(96)90188-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96br,
  title        = {Industry leaders work towards it security dream},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {253--254},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90189-2},
  doi          = {10.1016/S0267-3649(96)90189-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96br.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bs,
  title        = {Patent office must respond to competetive challenge, says taylor},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {254},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90190-9},
  doi          = {10.1016/S0267-3649(96)90190-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bt,
  title        = {Keys to opening up the global superhighway},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {254},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90191-0},
  doi          = {10.1016/S0267-3649(96)90191-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bu,
  title        = {Telecommunications class licences},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {254--255},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89618-X},
  doi          = {10.1016/0267-3649(96)89618-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bu.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bv,
  title        = {Liberalization of international telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {255},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89619-1},
  doi          = {10.1016/0267-3649(96)89619-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bw,
  title        = {Mobile phone radio spectrum to the millennium},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {255--256},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89620-8},
  doi          = {10.1016/0267-3649(96)89620-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bx,
  title        = {New voice privacy facility for private mobile radio},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {256},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89622-1},
  doi          = {10.1016/0267-3649(96)89622-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bx.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96by,
  title        = {Telecommunications masts and planning law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {256},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89621-X},
  doi          = {10.1016/0267-3649(96)89621-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96by.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96bz,
  title        = {Oftel's submission to an enquiry by the office of fair trading as
                  part of the OFT's review of the pay-tv market},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {256},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)90192-2},
  doi          = {10.1016/0267-3649(96)90192-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96bz.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96c,
  title        = {The protection of technical innovations and designs in Germany: Obtainment
                  - Exploitation - Enforcement: By Wilfried Stockmair, 1994, soft-cover,
                  {VCH} Publications Inc, DM128, 265 pp., {ISBN} 352728656X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {27},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90152-1},
  doi          = {10.1016/S0267-3649(96)90152-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ca,
  title        = {Oftel's 1995 annual report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {256--257},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89623-3},
  doi          = {10.1016/0267-3649(96)89623-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ca.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cb,
  title        = {{BT} introduces interactive multimedia kiosks},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {257},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90193-4},
  doi          = {10.1016/S0267-3649(96)90193-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cb.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cc,
  title        = {{BT} launches high speed {ISDN} access to the internet},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {257},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90194-6},
  doi          = {10.1016/S0267-3649(96)90194-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cd,
  title        = {Court declines to interfere with export control designation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {257--259},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90195-8},
  doi          = {10.1016/S0267-3649(96)90195-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ce,
  title        = {Encryption-first amendment challenge to encryption control regulations
                  still on track},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {259--260},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90196-X},
  doi          = {10.1016/S0267-3649(96)90196-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ce.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cf,
  title        = {Appeal pending in shrink-wrap licence case},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {260},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90197-1},
  doi          = {10.1016/S0267-3649(96)90197-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cg,
  title        = {Free {CSI} report explores threats to secure electronic commerce},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {260--261},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90198-3},
  doi          = {10.1016/S0267-3649(96)90198-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ch,
  title        = {Regulation and the information superhighway},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {261},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89625-7},
  doi          = {10.1016/0267-3649(96)89625-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ch.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ci,
  title        = {Simpler legislation for the single market},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {261},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)90199-5},
  doi          = {10.1016/0267-3649(96)90199-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ci.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cj,
  title        = {State aid, smes and technology},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {261},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)90200-9},
  doi          = {10.1016/0267-3649(96)90200-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ck,
  title        = {{EC} telecoms council},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {261},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)90201-0},
  doi          = {10.1016/0267-3649(96)90201-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ck.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cl,
  title        = {Privacy in the european union},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {261},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)89624-5},
  doi          = {10.1016/0267-3649(96)89624-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cl.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cm,
  title        = {The fight againts fraud},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {261--262},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90202-2},
  doi          = {10.1016/S0267-3649(96)90202-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cn,
  title        = {A single market for commercial communications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {262},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90203-4},
  doi          = {10.1016/S0267-3649(96)90203-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96co,
  title        = {Opening up korea's telecoms market},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {262},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90204-6},
  doi          = {10.1016/S0267-3649(96)90204-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96co.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cp,
  title        = {Imprimatur-esprit project under way},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {262},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90205-8},
  doi          = {10.1016/S0267-3649(96)90205-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cq,
  title        = {The Computer Iaw and Security Report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {262},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90206-X},
  doi          = {10.1016/S0267-3649(96)90206-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cr,
  title        = {{OECD} releases internet pricing study},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {263},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90207-1},
  doi          = {10.1016/S0267-3649(96)90207-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cr.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cs,
  title        = {Unidroit proposes database on uniform law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {263--264},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90208-3},
  doi          = {10.1016/S0267-3649(96)90208-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ct,
  title        = {The open group introduces x/open security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {264},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90209-5},
  doi          = {10.1016/S0267-3649(96)90209-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ct.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cu,
  title        = {WTO's telecommunications negotiations bear fruit},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {264},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90210-1},
  doi          = {10.1016/S0267-3649(96)90210-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cu.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cv,
  title        = {World telecommunication day celebrates sport},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {264--265},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90211-3},
  doi          = {10.1016/S0267-3649(96)90211-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cw,
  title        = {Telecom interactive 97},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {265},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90212-5},
  doi          = {10.1016/S0267-3649(96)90212-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cx,
  title        = {Title: Why information systems fail: {A} case study approach: Author:
                  Chris Sauer, Publisher: Alfred Waller, {ISBN:} 1-872474-08-X: Price:
                  {\textsterling}17.95. Reviewer: Ian Beale},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {266},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90213-7},
  doi          = {10.1016/S0267-3649(96)90213-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cx.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cy,
  title        = {Computer contracts: By Richard Morgan and Graham Stedman, 5th Edition,
                  1995, hard-cover, {FT} Law {\&} Tax, 621 pp., {\textsterling}90.00,
                  {ISBN} 0752001612},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {267},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90214-9},
  doi          = {10.1016/S0267-3649(96)90214-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cy.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96cz,
  title        = {Intellectual property in Europe: By Guy Tritton, 1996, hard-cover,
                  Sweet {\&} Maxwell, 803 pp., {\textsterling}95.00, {ISBN} 0421542306},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {267},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90215-0},
  doi          = {10.1016/S0267-3649(96)90215-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96cz.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96d,
  title        = {The {EPS} {CD} and {CD-ROM} security conference 1995},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {28--36},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80090-4},
  doi          = {10.1016/S0267-3649(00)80090-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96da,
  title        = {The modern law of coprights and designs: Second Edition, by Laddie,
                  Prescott and Victoria, two volumes, 1995, hard-cover, 1472 pp. {\&}
                  764 pp., {\textsterling}295.00, ISBN, for Volume One: 0406049750,
                  or ISBN, for the complete set: 0406616973},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {268},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90216-2},
  doi          = {10.1016/S0267-3649(96)90216-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96da.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96db,
  title        = {Publishing and multimedia law: By Michael Henry, 1994, hard-cover,
                  Butterworths, 820 pp., {\textsterling}80.00, {ISBN} 040603768X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {4},
  pages        = {268},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90217-4},
  doi          = {10.1016/S0267-3649(96)90217-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96db.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dc,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {269},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90154-5},
  doi          = {10.1016/S0267-3649(96)90154-5},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dd,
  title        = {A comprehensive analysis of software look and feel protection - Part
                  {VI} - Continued analysis of the 'feel' cases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {270--276},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82046-2},
  doi          = {10.1016/0267-3649(96)82046-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96de,
  title        = {Kluwer published in 1995 two further texts within their computer/law
                  series which has now concluded: The first is: Advanced litigation
                  support {\&} document imaging, Edited by {V} Mital 1995, soft
                  cover, Kluwer Law International, 212 pp., {\textsterling}65; US{\textdollar}106;
                  {NLG} 145, {ISBN} 9041101136},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {276},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90155-7},
  doi          = {10.1016/S0267-3649(96)90155-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96de.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96df,
  title        = {The second text is the electronic superhighway - The shape of technology
                  and law to come: By Mackaay, Poulin and Trudel (EDS.), 1995, soft
                  cover, 193 pp., {\textsterling}62; US{\textdollar}97; NLG145, {ISBN}
                  9041101357},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {276},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90156-9},
  doi          = {10.1016/S0267-3649(96)90156-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96df.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dg,
  title        = {Liability for computer errors in online banking},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {277--283},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82047-4},
  doi          = {10.1016/0267-3649(96)82047-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dh,
  title        = {Telecommunications and audio-visual convergence: Regulatory issues},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {284--287},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82048-6},
  doi          = {10.1016/0267-3649(96)82048-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dh.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96di,
  title        = {Intellectual property rights and treatment of media},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {287--289},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82049-8},
  doi          = {10.1016/0267-3649(96)82049-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96di.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dj,
  title        = {Liability of providers of the electronic highway},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {290--293},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82050-4},
  doi          = {10.1016/0267-3649(96)82050-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dk,
  title        = {Emerging electronic highways - New challenges for politics and law:
                  By Bekkers, Koops and Nouwt, 1995, hard-cover, 187 pp., Dfl125.00
                  US{\textdollar}87.50 {\textsterling}56.50, {ISBN} 9041101837},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {293},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90157-0},
  doi          = {10.1016/S0267-3649(96)90157-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dk.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dl,
  title        = {International review of law, computers {\&} technology: 1996 soft
                  cover, Carfax, 186 pp., Institutional rate {EU} {\textsterling}152,
                  00, outside {EU} {\textsterling}162.00, North America {\textdollar}296;
                  personal rate {EU} {\textsterling}72.00, outside {EU} {\textsterling}74.00,
                  North America {\textdollar}146.00, {ISSN} 1360-0869},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {293},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90158-2},
  doi          = {10.1016/S0267-3649(96)90158-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dl.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dm,
  title        = {Certainty of rights in the information society - {A} discussion paper
                  on potential barriers to the creation of the information society},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {294--297},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82051-6},
  doi          = {10.1016/0267-3649(96)82051-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dn,
  title        = {Kluwer law international as part of its now defunct computer/law series
                  of monographs, has published two further texts dealing with different
                  aspects of the relationship between electronic technology and the
                  law: The first is Frame-Based Conceptual Modules of Statute Law by
                  Robert van Kralingen, 1995, soft cover, Kluwer Law International,
                  215 pp., {\textsterling}64; US{\textdollar}99; NLG145, {ISBN} 9041101284},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {297},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90159-4},
  doi          = {10.1016/S0267-3649(96)90159-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96do,
  title        = {The second text: Knowledge specification for multiple legal tasks
                  - {A} case study of the interaction problem in the legal domain: By
                  Pepijn Visser, 1995, soft cover, Kluwer Law International, 250 pp.,
                  {\textsterling}67; US{\textdollar}99; {NLG155}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {297},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90160-0},
  doi          = {10.1016/S0267-3649(96)90160-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96do.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dp,
  title        = {Is your software legal? Why worry?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {298--300},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82052-8},
  doi          = {10.1016/0267-3649(96)82052-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dq,
  title        = {The evolution of telecommunications regulation in the transition to
                  a competitive marketplace},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {301--305},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90161-2},
  doi          = {10.1016/S0267-3649(96)90161-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dr,
  title        = {This is the latest edition of Baker and McKenzie's column on recent
                  developments in {EC} law relating to {IT.} All entries which have
                  been updated since the last article are in bold. An updated summary
                  of this information in text form will be printed in the next edition
                  of \emph{CLSR}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {306--309},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90162-4},
  doi          = {10.1016/S0267-3649(96)90162-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dr.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ds,
  title        = {Digital information law - Electronic documents and requirements of
                  form: By Chris Reed, 1996, soft cover, Centre for Commercial Law Studies,
                  308 pp., {ISBN} 095106648X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {309},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90163-6},
  doi          = {10.1016/S0267-3649(96)90163-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ds.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dt,
  title        = {Beta computers (Europe) ltd v Adobe systems (Europe) ltd {[1996]}
                  {FSR} 367},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {310--312},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82053-X},
  doi          = {10.1016/0267-3649(96)82053-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96du,
  title        = {Internet and the law - Legal fundamentals for the internet user: By
                  Raymond A. Kurz, 1996, hard cover, Government Institute Inc., 248
                  pp., {ISBN} 0865875065},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {312},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90164-8},
  doi          = {10.1016/S0267-3649(96)90164-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96du.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dv,
  title        = {R v Brown {[1996]} 1 all {ER} 545 (house of lords)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {313--315},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82054-1},
  doi          = {10.1016/0267-3649(96)82054-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dw,
  title        = {European computer law: By the Information Technology Law Group / Europe,
                  1996, loose-leaf, Transnational Juris Publications, One Bridge Street
                  {NY} 10533 USA, US{\textdollar}225, {\textsterling}225, {ISBN} 0-571050-23-X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {315},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82055-3},
  doi          = {10.1016/0267-3649(96)82055-3},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dx,
  title        = {Data access corporation v powerflex, Bennett and {ORS}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {316--319},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82056-5},
  doi          = {10.1016/0267-3649(96)82056-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dx.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dy,
  title        = {Document image processing and data protection},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {320},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82057-7},
  doi          = {10.1016/0267-3649(96)82057-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dy.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96dz,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {321--335},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82058-9},
  doi          = {10.1016/0267-3649(96)82058-9},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96dz.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96e,
  title        = {Patents for computer software? No thank you},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {36},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80091-6},
  doi          = {10.1016/S0267-3649(00)80091-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ea,
  title        = {Software metering and commercial licensing policycialist group},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {5},
  pages        = {336},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)82059-0},
  doi          = {10.1016/0267-3649(96)82059-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ea.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96eb,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {337},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90024-2},
  doi          = {10.1016/S0267-3649(96)90024-2},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96eb.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ec,
  title        = {A comprehensive analysis of software look and feel protection - Part
                  {VII} - Concluding analysis of the 'feel' cases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {338--341},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90025-4},
  doi          = {10.1016/S0267-3649(96)90025-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ed,
  title        = {The future of copyright in a digital environment: By P. Bernt Hugenholtz
                  (ed.), 1996, soft-cover, 248 pp., Kluwer Law International, Dfl 135.00,
                  US{\textdollar}88.00, {UK} {\textsterling}59.50, {ISBN} 9041102671},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {341},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90026-6},
  doi          = {10.1016/S0267-3649(96)90026-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ed.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ee,
  title        = {Encryption and interception},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {342--348},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84927-2},
  doi          = {10.1016/0267-3649(96)84927-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ee.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ef,
  title        = {A survey of cryptography laws and regulations},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {349--355},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84928-4},
  doi          = {10.1016/0267-3649(96)84928-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ef.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96eg,
  title        = {Work in {WIPO} on possible new instruments on copyright and related
                  rights: Copy-protection systems and identification systems for use
                  in rights management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {356--360},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90027-8},
  doi          = {10.1016/S0267-3649(96)90027-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96eg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96eh,
  title        = {A report from the United States - Part 1},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {361--367},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84929-6},
  doi          = {10.1016/0267-3649(96)84929-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96eh.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ei,
  title        = {European computer law: By {IT} Law Group/Europe, 1996, loose-leaf
                  binder, Transnational Publishers Inc. US{\textdollar}225, {ISBN} 057105023X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {367},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90028-X},
  doi          = {10.1016/S0267-3649(96)90028-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ei.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ej,
  title        = {The "year 2000" and computer programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {368--371},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84930-2},
  doi          = {10.1016/0267-3649(96)84930-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ej.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ek,
  title        = {The promise and threat of internet telephony and regulation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {372--381},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84931-4},
  doi          = {10.1016/0267-3649(96)84931-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ek.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96el,
  title        = {Telecommunications law and practice: 2nd Edition, by Colin Long (plus
                  an international team of contributors), 1995, hard-cover, Sweet {\&}
                  Maxwell, 709 pp., {\textsterling}110.00, {ISBN} 0421505206},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {381},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90029-1},
  doi          = {10.1016/S0267-3649(96)90029-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96el.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96em,
  title        = {International information policy in conflict: Open and unrestricted
                  access versus government commercialization},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {382--389},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84932-6},
  doi          = {10.1016/0267-3649(96)84932-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96em.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96en,
  title        = {Law and the information superhighway: By Henry {H} Perritt Jr, 1996,
                  John Wiley and Sons Inc. 730 pp., {ISBN} 047112624},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {389},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90030-8},
  doi          = {10.1016/S0267-3649(96)90030-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96en.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96eo,
  title        = {Striking a balance on privacy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {390--391},
  year         = {1996},
  url          = {https://doi.org/10.1016/0267-3649(96)84933-8},
  doi          = {10.1016/0267-3649(96)84933-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96eo.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ep,
  title        = {Multimedia contracts: By {J} Dianne Brinson and Mark {F} Radcliffe,
                  1996, soft-cover, Ladera Press, US{\textdollar}79.95 (plus {US} {\textdollar}7
                  for shipping and handling)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {391},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90031-X},
  doi          = {10.1016/S0267-3649(96)90031-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ep.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96eq,
  title        = {St Albans city and district council (plaintiff) v international computers
                  limited (defendant)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {392--393},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90032-1},
  doi          = {10.1016/S0267-3649(96)90032-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96eq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96er,
  title        = {This is the latest edition of Baker {\&} McKenzie's column on
                  developments in {EC} law relating to {IT.} {A} summary of this information
                  in tabular form will be printed (with any updates) in the next edition
                  of \emph{CLSR}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {394--397},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90033-3},
  doi          = {10.1016/S0267-3649(96)90033-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96er.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96es,
  title        = {Wireless and satellite telecommunications - the technology, the market
                  and the regulations: By Dr Joseph {N} Pelton, 1995, hard-cover, Prentice
                  Hall, {\textsterling}45.95, {ISBN} 0131404938},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {397},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90034-5},
  doi          = {10.1016/S0267-3649(96)90034-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96es.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96et,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {398--411},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90035-7},
  doi          = {10.1016/S0267-3649(96)90035-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96et.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96eu,
  title        = {Technology: The law of exploitation and transfer: By Mark Anderson,
                  1996, soft-cover, Butterworths, 530 pp., {\textsterling}65.00, {ISBN}
                  0406013047},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {411},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90036-9},
  doi          = {10.1016/S0267-3649(96)90036-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96eu.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96ev,
  title        = {Special report - Internet law and regulation: By Graham {J} {H} Smith
                  (Ed.) of London solicitors, Bird {\&} Bird, 1996, {FT} Law and
                  Tax, {\textsterling}85.00, {ISBN} 07520-0286 4},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {6},
  pages        = {412},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90037-0},
  doi          = {10.1016/S0267-3649(96)90037-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96ev.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96f,
  title        = {Criminal procedural law and information technology the main features
                  of the council of Europe recommendation No. {R} {(95)13}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {37--42},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80092-8},
  doi          = {10.1016/S0267-3649(00)80092-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96g,
  title        = {{EC} developments in {IT} law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {43--51},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80093-X},
  doi          = {10.1016/S0267-3649(00)80093-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96h,
  title        = {Law on the electronic frontier: By Ian Lloyd and Moira Simpson, 1995,
                  soft-cover, Edinburgh University Press, {\textsterling}9.95, {ISBN}
                  0748605940},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {51},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90153-3},
  doi          = {10.1016/S0267-3649(96)90153-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96i,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {1},
  pages        = {52--64},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80094-1},
  doi          = {10.1016/S0267-3649(00)80094-1},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96j,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {65},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80095-3},
  doi          = {10.1016/S0267-3649(00)80095-3},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96k,
  title        = {The lawyer's guide to the internet: By {G} Burgess Allison, 1995,
                  softcover, American Bar Association section on law practice management,
                  347 pp., {\textdollar}29.95 + {\textdollar}4.95 handling, {ISBN} 1570731497},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {79},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90171-5},
  doi          = {10.1016/S0267-3649(96)90171-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96l,
  title        = {Comparison of patent and copyright protection for computer software
                  under {US} law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {80--87},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80097-7},
  doi          = {10.1016/S0267-3649(00)80097-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96m,
  title        = {The case against software patents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {88--89},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80098-9},
  doi          = {10.1016/S0267-3649(00)80098-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96n,
  title        = {Information in a digital age - The challenge to copyright},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {90--94},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80099-0},
  doi          = {10.1016/S0267-3649(00)80099-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96o,
  title        = {Exploiting commercial information: {A} legal status report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {95--100},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80100-4},
  doi          = {10.1016/S0267-3649(00)80100-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96p,
  title        = {Transatlantic cooperation and the microsoft case},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {101--103},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80101-6},
  doi          = {10.1016/S0267-3649(00)80101-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96q,
  title        = {Impact of the information society on privacy in the {UK}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {104--105},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80102-8},
  doi          = {10.1016/S0267-3649(00)80102-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96r,
  title        = {New report correspondent},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {105},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90172-7},
  doi          = {10.1016/S0267-3649(96)90172-7},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96s,
  title        = {This is the latest edition of the Baker {\&} McKenzie's column
                  on recent developments in {EC} law relating to {IT.} {A} summary of
                  this information in tabular form will be printed (with any updates)
                  in the next edition of \emph{CLSR}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {106--107},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80103-X},
  doi          = {10.1016/S0267-3649(00)80103-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96t,
  title        = {Research and invention in outer space: Liability and intellectual
                  property rights: Edited by Sa'id Mosteshar, 1995, hard-cover, Martinus
                  Nijhoff Publishers, 360 pp., price: dfl 250.00, US{\textdollar}160,
                  {\textsterling}105, {ISBN} 0792329821},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {107},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90173-9},
  doi          = {10.1016/S0267-3649(96)90173-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96u,
  title        = {Report on information superhighways issued by {ITU}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {108--109},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80104-1},
  doi          = {10.1016/S0267-3649(00)80104-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96v,
  title        = {Personal computers - more power; more risks},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {110--111},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80105-3},
  doi          = {10.1016/S0267-3649(00)80105-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96w,
  title        = {Lotus notes - a new security paradigm},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {112--114},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80106-5},
  doi          = {10.1016/S0267-3649(00)80106-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96x,
  title        = {Electronic payment and settlement of debt {IBC} legal studies and
                  services limited},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {115--116},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(00)80107-7},
  doi          = {10.1016/S0267-3649(00)80107-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96y,
  title        = {International technology transfers: Editor and contributing author,
                  Harry Rubin, 1995, hard-cover, Graham and Trotman/Martinus Nijhoff,
                  403 pp., price dfl255, US{\textdollar}145, {\textsterling}85, {ISBN}
                  1859661750},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {116},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90174-0},
  doi          = {10.1016/S0267-3649(96)90174-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X96z,
  title        = {The law of entertainment and broadcasting: By Vincent Nelson, 1995,
                  hard-cover, Sweet {\&} Maxwell, London, 559 pp., {\textsterling}79.00,
                  {ISBN} 0421501502},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {12},
  number       = {2},
  pages        = {116},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0267-3649(96)90175-2},
  doi          = {10.1016/S0267-3649(96)90175-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X96z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}