Search dblp for Publications

export results for "toc:db/journals/clsr/clsr4.bht:"

 download as .bib file

@article{DBLP:journals/clsr/Andersen89,
  author       = {Mads Bryde Andersen},
  title        = {Current legal protection for computer programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {17--21},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90009-5},
  doi          = {10.1016/0267-3649(89)90009-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Andersen89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bigelow89,
  author       = {Robert P. Bigelow},
  title        = {Computer security, crime and privacy - {US} status report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {10--16},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90008-3},
  doi          = {10.1016/0267-3649(89)90008-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bigelow89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Chalton89,
  author       = {Simon Chalton},
  title        = {Product testing: liability, acceptance, contract terms},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {23--26},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90142-8},
  doi          = {10.1016/0267-3649(89)90142-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Chalton89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies89,
  author       = {David Davies},
  title        = {Dramatic review: "The hacker and the malevolent employee"; performed
                  at {COMPSEC} '88},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {8},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90134-9},
  doi          = {10.1016/0267-3649(89)90134-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies89a,
  author       = {David Davies},
  title        = {Continuing the series by David Davies Part {IV:} Why have a strategy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {15--17},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90138-6},
  doi          = {10.1016/0267-3649(89)90138-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves89,
  author       = {David W. Greaves},
  title        = {Eurodynamics systems PLC-V-general automation ltd. (As yet unreported
                  - September 1988)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {40--41},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90154-4},
  doi          = {10.1016/0267-3649(89)90154-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves89a,
  author       = {David W. Greaves},
  title        = {Licensing and protection of computer software in Europe: The impact
                  of 1992},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {42--43},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90022-8},
  doi          = {10.1016/0267-3649(89)90022-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greenleaf89,
  author       = {Graham Greenleaf},
  title        = {Politics triumphs in Australia's new data protection law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {7--9},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90005-8},
  doi          = {10.1016/0267-3649(89)90005-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greenleaf89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Korn89,
  author       = {Anthony Korn},
  title        = {Data protection in Ireland: The Netherlands and Switzerland: Privacy
                  Laws and Business Seminar, Mayfair Hotel, London, Wednesday, 19 October
                  1988},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {28},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90145-3},
  doi          = {10.1016/0267-3649(89)90145-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Korn89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Millard89,
  author       = {Christopher Millard},
  title        = {Software escrow arrangements and the insolvency act 1986},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {18--20},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90140-4},
  doi          = {10.1016/0267-3649(89)90140-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Millard89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby89,
  author       = {Stephen Saxby},
  title        = {European Study Conferences Ltd: The Royal Automobile Club, London,
                  Thursday, 13 October 1988},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {42--43},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90157-X},
  doi          = {10.1016/0267-3649(89)90157-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby89a,
  author       = {Stephen Saxby},
  title        = {{EDI} '88 - The second {UK} national conference on paperless trade},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {38--41},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90020-4},
  doi          = {10.1016/0267-3649(89)90020-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Shpizner89,
  author       = {Michael J. Shpizner},
  title        = {Congress passes new legislation protecting licensees of intellectual
                  property},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {27--28},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90144-1},
  doi          = {10.1016/0267-3649(89)90144-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Shpizner89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Smith89,
  author       = {Martin R. Smith},
  title        = {The people risks},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {2--6},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90002-2},
  doi          = {10.1016/0267-3649(89)90002-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Smith89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sutcliffe89,
  author       = {John Sutcliffe},
  title        = {Welfare benefits adviser: a local government expert system application},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {22--23},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90010-1},
  doi          = {10.1016/0267-3649(89)90010-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sutcliffe89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Tantum89,
  author       = {Mark Tantum},
  title        = {Section 69 and all that},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {13--14},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90136-2},
  doi          = {10.1016/0267-3649(89)90136-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Tantum89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Walden89,
  author       = {Ian Walden},
  title        = {The 1988 conference for data commissioners},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {6},
  pages        = {36--38},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90019-8},
  doi          = {10.1016/0267-3649(89)90019-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Walden89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wasik89,
  author       = {Martin Wasik},
  title        = {The law commission's working paper on computer misuse},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {2--4},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90131-3},
  doi          = {10.1016/0267-3649(89)90131-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wasik89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wasik89a,
  author       = {Martin Wasik},
  title        = {{CBI} Conference on combating computer crime - increasing computer
                  security: Centre Point, London, 27th October 1988},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {4},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90132-5},
  doi          = {10.1016/0267-3649(89)90132-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wasik89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X89,
  title        = {Custom software source code ownership and access},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {21--22},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90141-6},
  doi          = {10.1016/0267-3649(89)90141-6},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/clsr/X89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac89,
  author       = {Bernard P. Zajac Jr.},
  title        = {Virus hits major {US} computer network},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {5},
  pages        = {34--35},
  year         = {1989},
  url          = {https://doi.org/10.1016/0267-3649(89)90150-7},
  doi          = {10.1016/0267-3649(89)90150-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Archer88,
  author       = {Quentin Archer},
  title        = {Database law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {20--24},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90096-9},
  doi          = {10.1016/0267-3649(88)90096-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Archer88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Arossa88,
  author       = {Lydia Arossa},
  title        = {Software and computer services - {A} report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {3},
  pages        = {2--5},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90025-8},
  doi          = {10.1016/0267-3649(88)90025-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Arossa88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Barger88,
  author       = {Robert W. Barger},
  title        = {Arbitration of computer disputes in the United States: {A} status
                  report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {3},
  pages        = {18--19},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90037-4},
  doi          = {10.1016/0267-3649(88)90037-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Barger88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Beker88,
  author       = {Henry Beker},
  title        = {Keeping security in perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {3},
  pages        = {23--26},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90040-4},
  doi          = {10.1016/0267-3649(88)90040-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Beker88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bequai88,
  author       = {August Bequai},
  title        = {Computer/telecommunications security - {A} role for management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {17--18},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90094-5},
  doi          = {10.1016/0267-3649(88)90094-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bequai88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Cohen88,
  author       = {Harry Cohen},
  title        = {Points raised in the consultation process},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {3--5},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90004-0},
  doi          = {10.1016/0267-3649(88)90004-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Cohen88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88,
  author       = {David Davies},
  title        = {Computer abuse},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {2--4},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90081-7},
  doi          = {10.1016/0267-3649(88)90081-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88a,
  author       = {David Davies},
  title        = {Risk management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {13--18},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90091-X},
  doi          = {10.1016/0267-3649(88)90091-X},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88b,
  author       = {David Davies},
  title        = {"The computer" - The changing risk},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {27--28},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90015-5},
  doi          = {10.1016/0267-3649(88)90015-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88c,
  author       = {David Davies},
  title        = {Anatomy of a disaster},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {28},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90016-7},
  doi          = {10.1016/0267-3649(88)90016-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88d,
  author       = {David Davies},
  title        = {Lloyds Cash Management Systems {(CMS)} cover},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {37},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90019-2},
  doi          = {10.1016/0267-3649(88)90019-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88e,
  author       = {David Davies},
  title        = {Successful uses of technology in business},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {41--43},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90022-2},
  doi          = {10.1016/0267-3649(88)90022-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88f,
  author       = {David Davies},
  title        = {The fourth in a series of reports by David Davies analysing the experiences
                  of those involved in a computer disaster},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {2--4},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90143-4},
  doi          = {10.1016/0267-3649(88)90143-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies88g,
  author       = {David Davies},
  title        = {High technology risks - The limitations of insurance},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {32--33},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90151-3},
  doi          = {10.1016/0267-3649(88)90151-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies88g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Gray88,
  author       = {Brian W. Gray},
  title        = {Copyright in computer software - Present United States/Canadian law
                  and impact of bill {C60}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {11--15},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90008-8},
  doi          = {10.1016/0267-3649(88)90008-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Gray88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves88,
  author       = {David W. Greaves},
  title        = {{US} focus},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {33--37},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90100-8},
  doi          = {10.1016/0267-3649(88)90100-8},
  timestamp    = {Wed, 14 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves88a,
  author       = {David W. Greaves},
  title        = {Computer software - Protection/liability/law/forms: {L.J.} Kutten
                  (Clark Boardman Co. Ltd., New York, New York 1907)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {3},
  pages        = {5},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90026-X},
  doi          = {10.1016/0267-3649(88)90026-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves88b,
  author       = {David W. Greaves},
  title        = {The {EC} green paper - {A} comment},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {5},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90144-6},
  doi          = {10.1016/0267-3649(88)90144-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/GregurasK88,
  author       = {Fred Greguras and
                  Martin Kalin},
  title        = {Resales and reexports of {U.S.} commodities and technical data under
                  the {U.S.} export administration act},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {16},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90009-X},
  doi          = {10.1016/0267-3649(88)90009-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/GregurasK88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Grover88,
  author       = {Derrick Grover},
  title        = {Methods for measuring program copying and adaptation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {23--25},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90013-1},
  doi          = {10.1016/0267-3649(88)90013-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Grover88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HartA88,
  author       = {Robert Hart and
                  John E. Appleton},
  title        = {Submission from the British Computer Society},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {5--10},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90145-8},
  doi          = {10.1016/0267-3649(88)90145-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HartA88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton88,
  author       = {Yvo Henniker{-}Heaton},
  title        = {Fraud investigation - {A} perspective on the role of the police},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {7--8},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90086-6},
  doi          = {10.1016/0267-3649(88)90086-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton88a,
  author       = {Yvo Henniker{-}Heaton},
  title        = {The corporate security policy - Part three},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {14--15},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90092-1},
  doi          = {10.1016/0267-3649(88)90092-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton88b,
  author       = {Yvo Henniker{-}Heaton},
  title        = {{COMPACS} '88},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {39--41},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90021-0},
  doi          = {10.1016/0267-3649(88)90021-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Henniker-Heaton88c,
  author       = {Yvo Henniker{-}Heaton},
  title        = {The security of network systems - {A} review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {34--35},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90152-5},
  doi          = {10.1016/0267-3649(88)90152-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hughes88,
  author       = {Gordon Hughes},
  title        = {Mindless computers in Australia},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {25--27},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90014-3},
  doi          = {10.1016/0267-3649(88)90014-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hughes88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hughes88a,
  author       = {Pamela Hughes},
  title        = {{NCC} information technology conference 1988},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {38},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90020-9},
  doi          = {10.1016/0267-3649(88)90020-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hughes88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kyer88,
  author       = {C. Attorney Ian Kyer},
  title        = {Copyright law reform - Canada},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {24--26},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90097-0},
  doi          = {10.1016/0267-3649(88)90097-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kyer88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Larner88,
  author       = {Steven Larner},
  title        = {Computer contracts - negotiating for success},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {19--20},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90095-7},
  doi          = {10.1016/0267-3649(88)90095-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Larner88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lewis88,
  author       = {David P. Lewis},
  title        = {Protecting your confidential information},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {28--31},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90150-1},
  doi          = {10.1016/0267-3649(88)90150-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lewis88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Long88,
  author       = {Colin Long},
  title        = {Liability for telecommunication services},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {20},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90011-8},
  doi          = {10.1016/0267-3649(88)90011-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Long88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Maclean88,
  author       = {A. D. Maclean},
  title        = {Computers in criminal justice - Realising the potential},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {3},
  pages        = {15--17},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90036-2},
  doi          = {10.1016/0267-3649(88)90036-2},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Maclean88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Maclean88a,
  author       = {A. D. Maclean},
  title        = {Computers in criminal justice - Realising the potential: Part {II:}
                  The future},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {25--26},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90149-5},
  doi          = {10.1016/0267-3649(88)90149-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Maclean88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Meijboom88,
  author       = {Alfred Meijboom},
  title        = {Recent developments regarding protection of topographies of semiconductor
                  products},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {10--11},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90007-6},
  doi          = {10.1016/0267-3649(88)90007-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Meijboom88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Moores88,
  author       = {Bob Moores},
  title        = {Professional data storage: The decision criteria},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {15--16},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90093-3},
  doi          = {10.1016/0267-3649(88)90093-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Moores88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby88,
  author       = {Stephen Saxby},
  title        = {Litigation: Reports on recent cases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {41--44},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90155-0},
  doi          = {10.1016/0267-3649(88)90155-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Scherer88,
  author       = {Joachim Scherer},
  title        = {Telecommunications terminal equipment: {EEC} commission opens the
                  market},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {16--19},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90147-1},
  doi          = {10.1016/0267-3649(88)90147-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Scherer88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sterling88,
  author       = {J. A. L. Sterling},
  title        = {Legislation update},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {42--43},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90103-3},
  doi          = {10.1016/0267-3649(88)90103-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sterling88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sterling88a,
  author       = {J. A. L. Sterling},
  title        = {The copyright, designs and patents bill 1987},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {3},
  pages        = {11--12},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90031-3},
  doi          = {10.1016/0267-3649(88)90031-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sterling88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Street88,
  author       = {Susan Street},
  title        = {Fraud},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {6--11},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90085-4},
  doi          = {10.1016/0267-3649(88)90085-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Street88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Tantum88,
  author       = {Mark Tantum},
  title        = {When a loss becomes a crime},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {3},
  pages        = {13--14},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90033-7},
  doi          = {10.1016/0267-3649(88)90033-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Tantum88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Walden88,
  author       = {Ian Walden},
  title        = {Conference review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {43--44},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90104-5},
  doi          = {10.1016/0267-3649(88)90104-5},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Walden88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Walden88a,
  author       = {Ian Walden},
  title        = {{MP} seeks measure for better data protection law - {A} review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {2},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90002-7},
  doi          = {10.1016/0267-3649(88)90002-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Walden88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wasik88,
  author       = {Martin Wasik},
  title        = {Documents on fraud issues},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {1},
  pages        = {9--11},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90088-X},
  doi          = {10.1016/0267-3649(88)90088-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wasik88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac88,
  author       = {Bernard P. Zajac Jr.},
  title        = {Computer viruses: The new global threat (part {II)}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {2},
  pages        = {30--31},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90017-9},
  doi          = {10.1016/0267-3649(88)90017-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac88a,
  author       = {Bernard P. Zajac Jr.},
  title        = {The legal implications of viruses},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {4},
  number       = {4},
  pages        = {36--37},
  year         = {1988},
  url          = {https://doi.org/10.1016/0267-3649(88)90153-7},
  doi          = {10.1016/0267-3649(88)90153-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}