default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr4.bht:"
@article{DBLP:journals/clsr/Andersen89, author = {Mads Bryde Andersen}, title = {Current legal protection for computer programs}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {17--21}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90009-5}, doi = {10.1016/0267-3649(89)90009-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Andersen89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bigelow89, author = {Robert P. Bigelow}, title = {Computer security, crime and privacy - {US} status report}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {10--16}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90008-3}, doi = {10.1016/0267-3649(89)90008-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bigelow89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Chalton89, author = {Simon Chalton}, title = {Product testing: liability, acceptance, contract terms}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {23--26}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90142-8}, doi = {10.1016/0267-3649(89)90142-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Chalton89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies89, author = {David Davies}, title = {Dramatic review: "The hacker and the malevolent employee"; performed at {COMPSEC} '88}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {8}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90134-9}, doi = {10.1016/0267-3649(89)90134-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies89a, author = {David Davies}, title = {Continuing the series by David Davies Part {IV:} Why have a strategy}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {15--17}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90138-6}, doi = {10.1016/0267-3649(89)90138-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves89, author = {David W. Greaves}, title = {Eurodynamics systems PLC-V-general automation ltd. (As yet unreported - September 1988)}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {40--41}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90154-4}, doi = {10.1016/0267-3649(89)90154-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves89a, author = {David W. Greaves}, title = {Licensing and protection of computer software in Europe: The impact of 1992}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {42--43}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90022-8}, doi = {10.1016/0267-3649(89)90022-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greenleaf89, author = {Graham Greenleaf}, title = {Politics triumphs in Australia's new data protection law}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {7--9}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90005-8}, doi = {10.1016/0267-3649(89)90005-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greenleaf89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Korn89, author = {Anthony Korn}, title = {Data protection in Ireland: The Netherlands and Switzerland: Privacy Laws and Business Seminar, Mayfair Hotel, London, Wednesday, 19 October 1988}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {28}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90145-3}, doi = {10.1016/0267-3649(89)90145-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Korn89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Millard89, author = {Christopher Millard}, title = {Software escrow arrangements and the insolvency act 1986}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {18--20}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90140-4}, doi = {10.1016/0267-3649(89)90140-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Millard89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby89, author = {Stephen Saxby}, title = {European Study Conferences Ltd: The Royal Automobile Club, London, Thursday, 13 October 1988}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {42--43}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90157-X}, doi = {10.1016/0267-3649(89)90157-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby89a, author = {Stephen Saxby}, title = {{EDI} '88 - The second {UK} national conference on paperless trade}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {38--41}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90020-4}, doi = {10.1016/0267-3649(89)90020-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Shpizner89, author = {Michael J. Shpizner}, title = {Congress passes new legislation protecting licensees of intellectual property}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {27--28}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90144-1}, doi = {10.1016/0267-3649(89)90144-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Shpizner89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Smith89, author = {Martin R. Smith}, title = {The people risks}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {2--6}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90002-2}, doi = {10.1016/0267-3649(89)90002-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Smith89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sutcliffe89, author = {John Sutcliffe}, title = {Welfare benefits adviser: a local government expert system application}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {22--23}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90010-1}, doi = {10.1016/0267-3649(89)90010-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sutcliffe89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Tantum89, author = {Mark Tantum}, title = {Section 69 and all that}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {13--14}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90136-2}, doi = {10.1016/0267-3649(89)90136-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Tantum89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Walden89, author = {Ian Walden}, title = {The 1988 conference for data commissioners}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {6}, pages = {36--38}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90019-8}, doi = {10.1016/0267-3649(89)90019-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Walden89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wasik89, author = {Martin Wasik}, title = {The law commission's working paper on computer misuse}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {2--4}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90131-3}, doi = {10.1016/0267-3649(89)90131-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wasik89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wasik89a, author = {Martin Wasik}, title = {{CBI} Conference on combating computer crime - increasing computer security: Centre Point, London, 27th October 1988}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {4}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90132-5}, doi = {10.1016/0267-3649(89)90132-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wasik89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X89, title = {Custom software source code ownership and access}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {21--22}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90141-6}, doi = {10.1016/0267-3649(89)90141-6}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/clsr/X89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac89, author = {Bernard P. Zajac Jr.}, title = {Virus hits major {US} computer network}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {5}, pages = {34--35}, year = {1989}, url = {https://doi.org/10.1016/0267-3649(89)90150-7}, doi = {10.1016/0267-3649(89)90150-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Archer88, author = {Quentin Archer}, title = {Database law}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {20--24}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90096-9}, doi = {10.1016/0267-3649(88)90096-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Archer88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Arossa88, author = {Lydia Arossa}, title = {Software and computer services - {A} report}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {3}, pages = {2--5}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90025-8}, doi = {10.1016/0267-3649(88)90025-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Arossa88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Barger88, author = {Robert W. Barger}, title = {Arbitration of computer disputes in the United States: {A} status report}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {3}, pages = {18--19}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90037-4}, doi = {10.1016/0267-3649(88)90037-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Barger88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Beker88, author = {Henry Beker}, title = {Keeping security in perspective}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {3}, pages = {23--26}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90040-4}, doi = {10.1016/0267-3649(88)90040-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Beker88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bequai88, author = {August Bequai}, title = {Computer/telecommunications security - {A} role for management}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {17--18}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90094-5}, doi = {10.1016/0267-3649(88)90094-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bequai88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Cohen88, author = {Harry Cohen}, title = {Points raised in the consultation process}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {3--5}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90004-0}, doi = {10.1016/0267-3649(88)90004-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Cohen88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88, author = {David Davies}, title = {Computer abuse}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {2--4}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90081-7}, doi = {10.1016/0267-3649(88)90081-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88a, author = {David Davies}, title = {Risk management}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {13--18}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90091-X}, doi = {10.1016/0267-3649(88)90091-X}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88b, author = {David Davies}, title = {"The computer" - The changing risk}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {27--28}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90015-5}, doi = {10.1016/0267-3649(88)90015-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88c, author = {David Davies}, title = {Anatomy of a disaster}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {28}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90016-7}, doi = {10.1016/0267-3649(88)90016-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88d, author = {David Davies}, title = {Lloyds Cash Management Systems {(CMS)} cover}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {37}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90019-2}, doi = {10.1016/0267-3649(88)90019-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88e, author = {David Davies}, title = {Successful uses of technology in business}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {41--43}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90022-2}, doi = {10.1016/0267-3649(88)90022-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88f, author = {David Davies}, title = {The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {2--4}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90143-4}, doi = {10.1016/0267-3649(88)90143-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88g, author = {David Davies}, title = {High technology risks - The limitations of insurance}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {32--33}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90151-3}, doi = {10.1016/0267-3649(88)90151-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Gray88, author = {Brian W. Gray}, title = {Copyright in computer software - Present United States/Canadian law and impact of bill {C60}}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {11--15}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90008-8}, doi = {10.1016/0267-3649(88)90008-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Gray88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves88, author = {David W. Greaves}, title = {{US} focus}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {33--37}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90100-8}, doi = {10.1016/0267-3649(88)90100-8}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves88a, author = {David W. Greaves}, title = {Computer software - Protection/liability/law/forms: {L.J.} Kutten (Clark Boardman Co. Ltd., New York, New York 1907)}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {3}, pages = {5}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90026-X}, doi = {10.1016/0267-3649(88)90026-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves88b, author = {David W. Greaves}, title = {The {EC} green paper - {A} comment}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {5}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90144-6}, doi = {10.1016/0267-3649(88)90144-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/GregurasK88, author = {Fred Greguras and Martin Kalin}, title = {Resales and reexports of {U.S.} commodities and technical data under the {U.S.} export administration act}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {16}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90009-X}, doi = {10.1016/0267-3649(88)90009-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/GregurasK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Grover88, author = {Derrick Grover}, title = {Methods for measuring program copying and adaptation}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {23--25}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90013-1}, doi = {10.1016/0267-3649(88)90013-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Grover88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/HartA88, author = {Robert Hart and John E. Appleton}, title = {Submission from the British Computer Society}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {5--10}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90145-8}, doi = {10.1016/0267-3649(88)90145-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/HartA88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton88, author = {Yvo Henniker{-}Heaton}, title = {Fraud investigation - {A} perspective on the role of the police}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {7--8}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90086-6}, doi = {10.1016/0267-3649(88)90086-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton88a, author = {Yvo Henniker{-}Heaton}, title = {The corporate security policy - Part three}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {14--15}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90092-1}, doi = {10.1016/0267-3649(88)90092-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton88b, author = {Yvo Henniker{-}Heaton}, title = {{COMPACS} '88}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {39--41}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90021-0}, doi = {10.1016/0267-3649(88)90021-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton88c, author = {Yvo Henniker{-}Heaton}, title = {The security of network systems - {A} review}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {34--35}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90152-5}, doi = {10.1016/0267-3649(88)90152-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hughes88, author = {Gordon Hughes}, title = {Mindless computers in Australia}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {25--27}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90014-3}, doi = {10.1016/0267-3649(88)90014-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hughes88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hughes88a, author = {Pamela Hughes}, title = {{NCC} information technology conference 1988}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {38}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90020-9}, doi = {10.1016/0267-3649(88)90020-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hughes88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kyer88, author = {C. Attorney Ian Kyer}, title = {Copyright law reform - Canada}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {24--26}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90097-0}, doi = {10.1016/0267-3649(88)90097-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kyer88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Larner88, author = {Steven Larner}, title = {Computer contracts - negotiating for success}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {19--20}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90095-7}, doi = {10.1016/0267-3649(88)90095-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Larner88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lewis88, author = {David P. Lewis}, title = {Protecting your confidential information}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {28--31}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90150-1}, doi = {10.1016/0267-3649(88)90150-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lewis88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Long88, author = {Colin Long}, title = {Liability for telecommunication services}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {20}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90011-8}, doi = {10.1016/0267-3649(88)90011-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Long88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Maclean88, author = {A. D. Maclean}, title = {Computers in criminal justice - Realising the potential}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {3}, pages = {15--17}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90036-2}, doi = {10.1016/0267-3649(88)90036-2}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Maclean88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Maclean88a, author = {A. D. Maclean}, title = {Computers in criminal justice - Realising the potential: Part {II:} The future}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {25--26}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90149-5}, doi = {10.1016/0267-3649(88)90149-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Maclean88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Meijboom88, author = {Alfred Meijboom}, title = {Recent developments regarding protection of topographies of semiconductor products}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {10--11}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90007-6}, doi = {10.1016/0267-3649(88)90007-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Meijboom88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Moores88, author = {Bob Moores}, title = {Professional data storage: The decision criteria}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {15--16}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90093-3}, doi = {10.1016/0267-3649(88)90093-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Moores88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby88, author = {Stephen Saxby}, title = {Litigation: Reports on recent cases}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {41--44}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90155-0}, doi = {10.1016/0267-3649(88)90155-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Scherer88, author = {Joachim Scherer}, title = {Telecommunications terminal equipment: {EEC} commission opens the market}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {16--19}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90147-1}, doi = {10.1016/0267-3649(88)90147-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Scherer88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sterling88, author = {J. A. L. Sterling}, title = {Legislation update}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {42--43}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90103-3}, doi = {10.1016/0267-3649(88)90103-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sterling88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sterling88a, author = {J. A. L. Sterling}, title = {The copyright, designs and patents bill 1987}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {3}, pages = {11--12}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90031-3}, doi = {10.1016/0267-3649(88)90031-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sterling88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Street88, author = {Susan Street}, title = {Fraud}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {6--11}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90085-4}, doi = {10.1016/0267-3649(88)90085-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Street88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Tantum88, author = {Mark Tantum}, title = {When a loss becomes a crime}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {3}, pages = {13--14}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90033-7}, doi = {10.1016/0267-3649(88)90033-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Tantum88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Walden88, author = {Ian Walden}, title = {Conference review}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {43--44}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90104-5}, doi = {10.1016/0267-3649(88)90104-5}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Walden88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Walden88a, author = {Ian Walden}, title = {{MP} seeks measure for better data protection law - {A} review}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {2}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90002-7}, doi = {10.1016/0267-3649(88)90002-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Walden88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wasik88, author = {Martin Wasik}, title = {Documents on fraud issues}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {1}, pages = {9--11}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90088-X}, doi = {10.1016/0267-3649(88)90088-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wasik88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac88, author = {Bernard P. Zajac Jr.}, title = {Computer viruses: The new global threat (part {II)}}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {2}, pages = {30--31}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90017-9}, doi = {10.1016/0267-3649(88)90017-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac88a, author = {Bernard P. Zajac Jr.}, title = {The legal implications of viruses}, journal = {Comput. Law Secur. Rev.}, volume = {4}, number = {4}, pages = {36--37}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90153-7}, doi = {10.1016/0267-3649(88)90153-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.