


default search action
Computer Law & Security Review, Volume 13
Volume 13, Number 1, January 1997
- Stephen Saxby:

The times they are A-changing. 2 - Eric R. Verheul, Bert-Jaap Koops, Henk van Tilborg:

Binding cryptography - A fraud-detectible alternative to Key-Escrow proposals. 3-14 - Peter Stone:

Lessons from America: Filtration of functionality from software copyright. 15-21 - Simon Newman:

Rights, freedoms and phonograms: Moral rights and adaptation rights in music and other copyright works. 22-28 - J. Dianne Brinson:

Multimedia Law and Business Handbook, J. Dianne Brinson, Mark F. Radcliffe. Ladera Press, NY (1996), 468, ISBN 096 391 7323 US $44.95. 28 - Robyn Durie:

The internet, trademarks and domain names. 29-33 - Lena Peters:

The future Unidroit database on uniform law. 34-41 - Joseph Norton:

Cross-Border Electronic Banking - Challenges and Opportunities, Joseph Norton, Chris Reed, Ian Walden (Eds.). Lloyds of London Press (1995), 303, 185044 8485. 41 - Simone van der Hof:

First results of The Dutch National Programme on Information Technology and Law. 42-45 - David Bainbridge:

Intellectual Property, 3rd Edition, David Bainbridge. Pitman Publishing (1996), 572, 0273 622 79X £27.99 soft-cover. 45 - Robert McCallough:

St Albans City and district council and International Computers Limited - "St Albans and Beyond". 46-48 - Glenn P. Jenkins:

Information Technology and Innovation in Tax Administration, Glenn P. Jenkins (Ed.). Kluwer Law International (1996), 213, NLG 125.00/US $84.00/£56.00, ISBN: 90 411 09668. 72
Volume 13, Number 2, March 1997
- Stephen Saxby:

Measured progress in geneva. 74 - Gillian Bull:

Market data rights bingo. 75-86 - Robert P. Bigelow:

A report from the United States - part II. 87-95 - Simon Newman:

Intellectual property law: Part II - The moral right of the author: The view from France, Germany and the United Kingdom. 96-101 - Clive Seddon:

IT project management: Partnering IT projects. 102-109 - James M. McCauley:

Internet regulation - I: Legal ethics and the internet: A US perspective. 110-114 - Kah Leng Ter:

Internet regulation II: Internet regulation in singapore. 115-119 - Andrew Charlesworth:

Law report - I: Glencore international A.G. and another v bank of China [1996] 1 Lloyd's law reports 135. (CA) decision of 8 november 1995. 120-122 - Conor Ward:

Law report - II: Online newspaper's hypertext links to rival prohibited. 123 - Jackie Wilson:

Electronic document management: Electronic documents. 124-125 - Mark D. Powell:

Technology transfer: The european commission's technology transfer regulation. 126-131
Volume 13, Number 3, May 1997
- Stephen Saxby:

Electronic commerce a step closer following adoption of OECD cryptography guidelines. 150
- Ulrich Sieber:

Criminal liability for the transfer of data in international networks - new challenges for the internet - part I. 151-157 - Irini E. Vassilaki:

Multimedia crime: Multimedia crime - Emergence, phenomena and legal questions of "metacomputer crime". 158-162
- David Flint:

Internet domain names: Proposal for a cybermark. 163-166 - Chris Reed:

Copyright in WWW pages: News from Shetland copyright in links to World Wide Web pages. 167-175 - Matthew Godfrey-Faussett:

Outsourcing: Telecommunications outsourcing - A legal perspective. 176-181 - Justice Michael Kirby:

Cryptography policy: OECD cryptography guidelines in context. 182-186 - David Wiseman:

Conference review: Legal aspects of global communications. 197-200 - Christopher Rees:

Computer Evidence: A Forensic Investigations Handbook by Edward Wilding Published by Sweet & Maxwell. 219
Volume 13, Number 4, July 1997
- Stephen Saxby:

Computer misuse act questioned again. 222 - Ulrich Sieber:

Criminal liability for the transfer of data in international networks - New challenges for the internet - Part II: Precedents. 223-233 - Cécile de Terwangne, Sophie Louveaux:

Data protection and online networks. 234-246 - Robert J. Hart:

The case for patent protection for computer program-related inventions. 247-252 - Stephan Beutler:

The protection of multimedia products under international copyright law. 253-260 - Steve A. Mandell, Edwin Y. Szeto, Eileen P. Cohen:

US update: Legal status of safeguarding proprietary information. 261-265 - Benjamin Wright:

Electronic commerce legislation - Frequently asked questions. 266-268 - Jackie Wilson:

In the matter of application no 9204959.2 by Fujitsu Ltd. 269-271 - Helena Davies:

Business transfers and outsourcing: The Süzen and Betts cases. 272-273 - Heather Rowe:

British telecom's operating licence - The new fair trading condition. 274-275 - Steve Orlowski:

OECD cryptography policy guidelines. 276-278
Volume 13, Number 5, September 1997
- Stephen Saxby:

Editorial. 302 - Andrew Horrocks, Kit Burden:

Domain names: Domain names - Fighting for identity. 303-306 - Heather Rosenblatt:

Protocol to the berne convention: The wipo diplomatic conference - the birth of two new treaties. 307-311 - Ulrich Sieber:

Internet law: Criminal liability for the transfer of data in international networks - New challenges for the internet - Part III: Precedents. 312-318 - Stephan Beutler:

Multimedia law: The protection of multimedia products under international copyright law - Part II. 319-324 - Assafa Endeshaw:

Commercial law: Assimilating software to 'goods' by analogy. 325-330 - Michael Sinclair:

IT management: Providing for information technology on sale of a business. 331-335 - David Davies, Aon Bain Hogg:

Risk management: Holistic risk management. 336-339 - Alexander de Daranyi:

Software law - Switzerland: An introduction to software protection under swiss law. 340-343 - Stuart MacDonald, Bernard Lefang:

Patent information survey: Information for innovation: Surveys of innovating and patenting small firms. 344-348 - Stephen Digby:

EURIM report: EURIM - European informatics market - The next phase. 349-351 - David Bainbridge:

Law report - I: Cannot employees also be hackers? 352-354 - Mark Taylor:

Law report- II: Pitman training ltd and ptc oxford ltd v nominet uk and pearson professional ltd. 355-356 - Gillian Bull:

Conference review: Cyberl@W, IBC UK conferences limited, Monday 23 June 1997, Strand Palace Hotel, London. 381-382 - Heather Rowe:

The report by the centre for the study of financial innovation (CSFI) on "the internet & financial services". 383-386 - Heather Rowe:

The laws of the internet by Clive Gringras of Nabarro Nathanson. 387
Volume 13, Number 6, November 1997
- Stephen Saxby:

Editorial. 390 - Heather Rowe:

It issues in monetary union: European monetary union - so why is it a technology issue? 391-397 - Robert T. J. Bond:

European union directive on the legal protection of databases. 401-412 - Ulrich Sieber:

Internet law: Criminal liability for the transfer of data in international networks - new challenges for the internet - part IV: Precedents. 413-418 - Simon Chalton:

Data protection: Data protection: The government's legislative proposals. 425-428 - Simon Davies:

Privacy law - Australia: The Australian federal government has abandoned its election promise to enact privacy legislation for business. 429-430 - Harry Small:

Commerce in cyberspace - I: Marketing on the internet. 431-435 - Scott Glickson:

Commerce in cyberspace - II: Point, click, and buy: Contracting for online products and services. 436-441 - David Judah:

Liability in cyberspace - I: Defamation in cyberspace. 442-446 - Jared Silverman:

Liability in cyberspace - II: Disclosure and securities fraud on the internet. 447-450 - Michael D. Scott:

Liability in cyberspace - III: Creating a corporate internet acceptable use policy. 451-453 - Dave Birch:

Secure electronic commerce - I: The certificate business public key infrastructure will be big business. 454-456 - Michael S. Baum:

Secure electronic commerce - II: The ABA digital signature guidelines. 457-458

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














