Search dblp for Publications

export results for "toc:db/journals/clsr/clsr3.bht:"

 download as .bib file

@article{DBLP:journals/clsr/Bergsten88,
  author       = {Eric Bergsten},
  title        = {International trade procedures},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {23--29},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90132-X},
  doi          = {10.1016/0267-3649(88)90132-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bergsten88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/BloomBecker88,
  author       = {Buck BloomBecker},
  title        = {{US} computer security legislation {H.R.} 145: {A} step toward greater
                  computer security?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {130--31},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90115-X},
  doi          = {10.1016/0267-3649(88)90115-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/BloomBecker88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/DannD88,
  author       = {Derek Dann and
                  Jill Dann},
  title        = {{MILCOMP} 87 Military computers, graphics and software a review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {42--43},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90124-0},
  doi          = {10.1016/0267-3649(88)90124-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/DannD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88h,
  author       = {David Davies},
  title        = {Risk management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {35--36},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90135-5},
  doi          = {10.1016/0267-3649(88)90135-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Dedman88,
  author       = {Richard Dedman},
  title        = {Legal protection of software in the United Kingdom},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {10--14},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90107-0},
  doi          = {10.1016/0267-3649(88)90107-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Dedman88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Dilloway88,
  author       = {Cliff Dilloway},
  title        = {Arbitration - {IBM} v {FUJITSU} Ltd},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {32--34},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90134-3},
  doi          = {10.1016/0267-3649(88)90134-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Dilloway88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Dunkel88,
  author       = {Arthur Dunkel},
  title        = {General agreement on tariffs and trade},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {30--32},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90133-1},
  doi          = {10.1016/0267-3649(88)90133-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Dunkel88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves88c,
  author       = {David W. Greaves},
  title        = {{US} case law and legislative developments},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {34--35},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90118-5},
  doi          = {10.1016/0267-3649(88)90118-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves88d,
  author       = {David W. Greaves},
  title        = {Computer disputes - {A} new perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {39},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90121-5},
  doi          = {10.1016/0267-3649(88)90121-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves88d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves88e,
  author       = {David W. Greaves},
  title        = {Case law update},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {37},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90137-9},
  doi          = {10.1016/0267-3649(88)90137-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves88e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves88f,
  author       = {David W. Greaves},
  title        = {{US} case low developments},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {37--38},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90138-0},
  doi          = {10.1016/0267-3649(88)90138-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves88f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greenleaf88,
  author       = {Graham Greenleaf},
  title        = {Privacy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {6--8},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90128-8},
  doi          = {10.1016/0267-3649(88)90128-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greenleaf88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hammond88,
  author       = {Grant Hammond},
  title        = {The development of trade secrets law in Canada},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {14--16},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90108-2},
  doi          = {10.1016/0267-3649(88)90108-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hammond88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HarveyN88,
  author       = {Sharon Harvey and
                  Julian Newman},
  title        = {Contracts by electronic mail},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {2--6},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90127-6},
  doi          = {10.1016/0267-3649(88)90127-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HarveyN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hennessy88,
  author       = {Chris Hennessy},
  title        = {Contingency planning and disaster recovery for computer systems},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {38--39},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90120-3},
  doi          = {10.1016/0267-3649(88)90120-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hennessy88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton88d,
  author       = {Yvo Henniker{-}Heaton},
  title        = {A look behind the news 1988 - New year's resolutions: {A} data processing
                  manager reveals all},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {28--29},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90113-6},
  doi          = {10.1016/0267-3649(88)90113-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hughes88b,
  author       = {Pamela Hughes},
  title        = {The 'need to know' principle of computer security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {29--30},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90114-8},
  doi          = {10.1016/0267-3649(88)90114-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hughes88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hughes88c,
  author       = {Pamela Hughes},
  title        = {Fourth National Computer Security Conference, Windsor, {U.K}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {43--44},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90125-2},
  doi          = {10.1016/0267-3649(88)90125-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hughes88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Morris88,
  author       = {John Morris},
  title        = {Source code maintenance and Escrow},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {11--16},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90130-6},
  doi          = {10.1016/0267-3649(88)90130-6},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/clsr/Morris88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Robertson88,
  author       = {Ranald Robertson},
  title        = {Strict liability under the consumer protection act 1987 - Some implications
                  for producers of computer based products},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {16--20},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90109-4},
  doi          = {10.1016/0267-3649(88)90109-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Robertson88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby88a,
  author       = {Stephen Saxby},
  title        = {Law report - Canada},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {32--34},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90117-3},
  doi          = {10.1016/0267-3649(88)90117-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby88b,
  author       = {Stephen Saxby},
  title        = {Information technology and the courts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {40--41},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90122-7},
  doi          = {10.1016/0267-3649(88)90122-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sterling88b,
  author       = {J. A. L. Sterling},
  title        = {Copyright legislation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {2--9},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90106-9},
  doi          = {10.1016/0267-3649(88)90106-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sterling88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Walden88b,
  author       = {Ian Walden},
  title        = {Conference review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {38--40},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90139-2},
  doi          = {10.1016/0267-3649(88)90139-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Walden88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wernick88,
  author       = {Alan S. Wernick},
  title        = {Intellectual property bankruptcy protection},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {8--11},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90129-X},
  doi          = {10.1016/0267-3649(88)90129-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wernick88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wright88,
  author       = {R. W. Wright},
  title        = {{R.W.} Wright: Address to {ITAC} conference a litigation solicitor's
                  view},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {41--42},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90123-9},
  doi          = {10.1016/0267-3649(88)90123-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wright88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac88b,
  author       = {Bernard P. Zajac Jr.},
  title        = {The latest news from the {US}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {5},
  pages        = {31--32},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90116-1},
  doi          = {10.1016/0267-3649(88)90116-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac88c,
  author       = {Bernard P. Zajac Jr.},
  title        = {{US} focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {6},
  pages        = {36},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90136-7},
  doi          = {10.1016/0267-3649(88)90136-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Appleton87,
  author       = {John E. Appleton},
  title        = {Law reports update},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {37--39},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90029-X},
  doi          = {10.1016/0267-3649(87)90029-X},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Appleton87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bergsten87,
  author       = {Eric E. Bergsten},
  title        = {International trade procedures},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {4--7},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90017-3},
  doi          = {10.1016/0267-3649(87)90017-3},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bergsten87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Brown87,
  author       = {Roger Brown},
  title        = {Privacy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {8--11},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90018-5},
  doi          = {10.1016/0267-3649(87)90018-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Brown87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Butler87,
  author       = {R. E. Butler},
  title        = {{ISDN} - Major obstacles stand in the way},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {6},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90033-1},
  doi          = {10.1016/0267-3649(87)90033-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Butler87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Byrne87,
  author       = {Noel Byrne},
  title        = {Commercial agreements and competition law: Practice and procedure
                  in the {UK} and {EEC:} Dr Nicholas Green published by Graham {\&}
                  Trotman, 1986. {ISBN} 0860107884. Price {\textsterling}89},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {31--32},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90044-6},
  doi          = {10.1016/0267-3649(87)90044-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Byrne87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Dann87,
  author       = {Jill Dann},
  title        = {Defence review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {17--18},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90056-2},
  doi          = {10.1016/0267-3649(87)90056-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Dann87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies87a,
  author       = {David Davies},
  title        = {Anatomy of a disaster},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {13--14},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90021-5},
  doi          = {10.1016/0267-3649(87)90021-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies87b,
  author       = {David Davies},
  title        = {Security focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {35--36},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90027-6},
  doi          = {10.1016/0267-3649(87)90027-6},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies87b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies87c,
  author       = {David Davies},
  title        = {It can't happen to us: {A} selection of recent computing losses},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {36--37},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90028-8},
  doi          = {10.1016/0267-3649(87)90028-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies87c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies87d,
  author       = {David Davies},
  title        = {Protection against director's failure},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {37},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90064-1},
  doi          = {10.1016/0267-3649(87)90064-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies87d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies87e,
  author       = {David Davies},
  title        = {The consumer protection act British computer society, 24 September
                  1987},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {38--40},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90065-3},
  doi          = {10.1016/0267-3649(87)90065-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies87e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Dilloway87,
  author       = {C. C. Dilloway},
  title        = {A case study in a computer arbitration},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {12--13},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90075-6},
  doi          = {10.1016/0267-3649(87)90075-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Dilloway87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Farquhar87,
  author       = {William Farquhar},
  title        = {Risk management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {14--17},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90077-X},
  doi          = {10.1016/0267-3649(87)90077-X},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Farquhar87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Freed87,
  author       = {Roy N. Freed},
  title        = {Is software copyright becoming unfair competition law?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {10--12},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90036-7},
  doi          = {10.1016/0267-3649(87)90036-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Freed87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves87b,
  author       = {David W. Greaves},
  title        = {Computer disputes: Have the courts become too user-friendly?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {13--14},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90076-8},
  doi          = {10.1016/0267-3649(87)90076-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves87b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves87c,
  author       = {David W. Greaves},
  title        = {Law reports update - recent legislative and judicial developments
                  in the {US}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {25--27},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90042-2},
  doi          = {10.1016/0267-3649(87)90042-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves87c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves87d,
  author       = {David W. Greaves},
  title        = {The 1987 computer law symposium 28 and 29 April 1987, London. {A}
                  two day course organised by legal studies and services ltd},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {34--35},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90046-X},
  doi          = {10.1016/0267-3649(87)90046-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves87d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves87e,
  author       = {David W. Greaves},
  title        = {Legal liability for expert systems - 14 May 87 London. {A} one day
                  conference organised by learned information ltd},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {35--36},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90047-1},
  doi          = {10.1016/0267-3649(87)90047-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves87e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greguras87a,
  author       = {Fred Greguras},
  title        = {National security decision directive 145},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {25},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90081-1},
  doi          = {10.1016/0267-3649(87)90081-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greguras87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton87a,
  author       = {Yvo Henniker{-}Heaton},
  title        = {Security awareness},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {2--3},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90070-7},
  doi          = {10.1016/0267-3649(87)90070-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton87b,
  author       = {Yvo Henniker{-}Heaton},
  title        = {Electronic risks in banking and commerce, the gloucester hotel, London.
                  {A} two day course organised by {IBC} technical services, March 1987},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {32--34},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90045-8},
  doi          = {10.1016/0267-3649(87)90045-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton87c,
  author       = {Yvo Henniker{-}Heaton},
  title        = {Computer security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {12--13},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90020-3},
  doi          = {10.1016/0267-3649(87)90020-3},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton87d,
  author       = {Yvo Henniker{-}Heaton},
  title        = {Risk management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {13--15},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90054-9},
  doi          = {10.1016/0267-3649(87)90054-9},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hernandez87,
  author       = {Ruel T. Hernandez},
  title        = {Information law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {2--8},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90051-3},
  doi          = {10.1016/0267-3649(87)90051-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hernandez87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hughes87,
  author       = {Pamela Hughes},
  title        = {Computer security - 3 day seminar 20-22/5/87. {EMAP}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {36},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90048-3},
  doi          = {10.1016/0267-3649(87)90048-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hughes87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hughes87a,
  author       = {Pamela Hughes},
  title        = {Radio frequency interference - myths, realities and a practical approach},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {15--17},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90055-0},
  doi          = {10.1016/0267-3649(87)90055-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hughes87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kelman87a,
  author       = {Alistair Kelman},
  title        = {Read all about yourself},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {11--12},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90019-7},
  doi          = {10.1016/0267-3649(87)90019-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kelman87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/LarnerD87,
  author       = {Steven Larner and
                  Sandy Douglas},
  title        = {Settling disputes in the computer industry},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {10--12},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90074-4},
  doi          = {10.1016/0267-3649(87)90074-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/LarnerD87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Marshall87a,
  author       = {David V. Marshall},
  title        = {Electronic share dealing - The legal issues},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {21--23},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90079-3},
  doi          = {10.1016/0267-3649(87)90079-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Marshall87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Marshall87b,
  author       = {David V. Marshall},
  title        = {Electronic share dealing - the legal issues},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {18--19},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90038-0},
  doi          = {10.1016/0267-3649(87)90038-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Marshall87b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Marshall87c,
  author       = {David V. Marshall},
  title        = {Electronic share dealing - The legal issues},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {18--20},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90057-4},
  doi          = {10.1016/0267-3649(87)90057-4},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Marshall87c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Middleton87,
  author       = {Rowan Middleton},
  title        = {Computer security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {23--24},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90040-9},
  doi          = {10.1016/0267-3649(87)90040-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Middleton87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Millard87,
  author       = {Christopher Millard},
  title        = {Software licensing},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {8--11},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90052-5},
  doi          = {10.1016/0267-3649(87)90052-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Millard87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Pendleton87,
  author       = {Michael D. Pendleton},
  title        = {Hong Kong Focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {20--22},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90058-6},
  doi          = {10.1016/0267-3649(87)90058-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Pendleton87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Regberg87,
  author       = {Marc Regberg},
  title        = {Trends in communication technology: Impacts on the right to control
                  publication and performance},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {2--6},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90032-X},
  doi          = {10.1016/0267-3649(87)90032-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Regberg87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby87a,
  author       = {Stephen Saxby},
  title        = {Semi-conductor chips},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {3--6},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90071-9},
  doi          = {10.1016/0267-3649(87)90071-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby87b,
  author       = {Stephen Saxby},
  title        = {Computer evidence},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {6--9},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90072-0},
  doi          = {10.1016/0267-3649(87)90072-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby87b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby87c,
  author       = {Stephen Saxby},
  title        = {Current awareness},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {26--32},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90082-3},
  doi          = {10.1016/0267-3649(87)90082-3},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby87c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby87d,
  author       = {Stephen Saxby},
  title        = {Recent decisions in the {US} courts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {34--36},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90084-7},
  doi          = {10.1016/0267-3649(87)90084-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby87d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sims87,
  author       = {John Sims},
  title        = {New approaches to dispute resolution},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {9--10},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90073-2},
  doi          = {10.1016/0267-3649(87)90073-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sims87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sterling87,
  author       = {J. A. L. Sterling},
  title        = {Copyright in computer programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {13--17},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90037-9},
  doi          = {10.1016/0267-3649(87)90037-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sterling87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sterling87a,
  author       = {J. A. L. Sterling},
  title        = {Copyright in computer programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {21--28},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90024-0},
  doi          = {10.1016/0267-3649(87)90024-0},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sterling87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Thorne87,
  author       = {Clive D. Thorne},
  title        = {Copyright legislation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {12},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90053-7},
  doi          = {10.1016/0267-3649(87)90053-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Thorne87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wasik87,
  author       = {Martin Wasik},
  title        = {Computer crime},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {23--24},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90059-8},
  doi          = {10.1016/0267-3649(87)90059-8},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wasik87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X87,
  title        = {Telecommunications and employment: An interview with Mr. {R.E.} Butler,
                  Secretary-General of the international telecommunication union},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {6--10},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90034-3},
  doi          = {10.1016/0267-3649(87)90034-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X87a,
  title        = {Communication technology},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {2--4},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90016-1},
  doi          = {10.1016/0267-3649(87)90016-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac87a,
  author       = {Bernard P. Zajac Jr.},
  title        = {{US} focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {1},
  pages        = {23--24},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90080-X},
  doi          = {10.1016/0267-3649(87)90080-X},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac87a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac87b,
  author       = {Bernard P. Zajac Jr.},
  title        = {{US} focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {2},
  pages        = {24--27},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90041-0},
  doi          = {10.1016/0267-3649(87)90041-0},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac87b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac87c,
  author       = {Bernard P. Zajac Jr.},
  title        = {Computer crime - what to do before it happens},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {14--18},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90022-7},
  doi          = {10.1016/0267-3649(87)90022-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac87c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac87d,
  author       = {Bernard P. Zajac Jr.},
  title        = {{US} focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {3},
  pages        = {28--29},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90025-2},
  doi          = {10.1016/0267-3649(87)90025-2},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac87d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac87e,
  author       = {Bernard P. Zajac Jr.},
  title        = {{US} focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {3},
  number       = {4},
  pages        = {24--26},
  year         = {1987},
  url          = {https://doi.org/10.1016/0267-3649(87)90060-4},
  doi          = {10.1016/0267-3649(87)90060-4},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac87e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics