Stop the war!
Остановите войну!
for scientists:
default search action
Computer Law & Security Review, Volume 4
Volume 4, Number 1, May 1988
- David Davies:
Computer abuse. 2-4 - Susan Street:
Fraud. 6-11 - Yvo Henniker-Heaton:
Fraud investigation - A perspective on the role of the police. 7-8 - Martin Wasik:
Documents on fraud issues. 9-11 - David Davies:
Risk management. 13-18 - Yvo Henniker-Heaton:
The corporate security policy - Part three. 14-15 - Bob Moores:
Professional data storage: The decision criteria. 15-16 - August Bequai:
Computer/telecommunications security - A role for management. 17-18 - Steven Larner:
Computer contracts - negotiating for success. 19-20 - Quentin Archer:
Database law. 20-24 - C. Attorney Ian Kyer:
Copyright law reform - Canada. 24-26 - David W. Greaves:
US focus. 33-37 - J. A. L. Sterling:
Legislation update. 42-43 - Ian Walden:
Conference review. 43-44
Volume 4, Number 2, July 1988
- Ian Walden:
MP seeks measure for better data protection law - A review. 2 - Harry Cohen:
Points raised in the consultation process. 3-5 - Alfred Meijboom:
Recent developments regarding protection of topographies of semiconductor products. 10-11 - Brian W. Gray:
Copyright in computer software - Present United States/Canadian law and impact of bill C60. 11-15 - Fred Greguras, Martin Kalin:
Resales and reexports of U.S. commodities and technical data under the U.S. export administration act. 16 - Colin Long:
Liability for telecommunication services. 20 - Derrick Grover:
Methods for measuring program copying and adaptation. 23-25 - Gordon Hughes:
Mindless computers in Australia. 25-27 - David Davies:
"The computer" - The changing risk. 27-28 - David Davies:
Anatomy of a disaster. 28 - Bernard P. Zajac Jr.:
Computer viruses: The new global threat (part II). 30-31 - David Davies:
Lloyds Cash Management Systems (CMS) cover. 37 - Pamela Hughes:
NCC information technology conference 1988. 38 - Yvo Henniker-Heaton:
COMPACS '88. 39-41 - David Davies:
Successful uses of technology in business. 41-43
Volume 4, Number 3, September 1988
- Lydia Arossa:
Software and computer services - A report. 2-5 - David W. Greaves:
Computer software - Protection/liability/law/forms: L.J. Kutten (Clark Boardman Co. Ltd., New York, New York 1907). 5 - J. A. L. Sterling:
The copyright, designs and patents bill 1987. 11-12 - Mark Tantum:
When a loss becomes a crime. 13-14 - A. D. Maclean:
Computers in criminal justice - Realising the potential. 15-17 - Robert W. Barger:
Arbitration of computer disputes in the United States: A status report. 18-19 - Henry Beker:
Keeping security in perspective. 23-26
Volume 4, Number 4, November 1988
- David Davies:
The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster. 2-4 - David W. Greaves:
The EC green paper - A comment. 5 - Robert Hart, John E. Appleton:
Submission from the British Computer Society. 5-10 - Joachim Scherer:
Telecommunications terminal equipment: EEC commission opens the market. 16-19 - A. D. Maclean:
Computers in criminal justice - Realising the potential: Part II: The future. 25-26 - David P. Lewis:
Protecting your confidential information. 28-31 - David Davies:
High technology risks - The limitations of insurance. 32-33 - Yvo Henniker-Heaton:
The security of network systems - A review. 34-35 - Bernard P. Zajac Jr.:
The legal implications of viruses. 36-37 - Stephen Saxby:
Litigation: Reports on recent cases. 41-44
Volume 4, Number 5, January 1989
- Martin Wasik:
The law commission's working paper on computer misuse. 2-4 - Martin Wasik:
CBI Conference on combating computer crime - increasing computer security: Centre Point, London, 27th October 1988. 4 - David Davies:
Dramatic review: "The hacker and the malevolent employee"; performed at COMPSEC '88. 8 - Mark Tantum:
Section 69 and all that. 13-14 - David Davies:
Continuing the series by David Davies Part IV: Why have a strategy. 15-17 - Christopher Millard:
Software escrow arrangements and the insolvency act 1986. 18-20 - Custom software source code ownership and access. 21-22
- Simon Chalton:
Product testing: liability, acceptance, contract terms. 23-26 - Michael J. Shpizner:
Congress passes new legislation protecting licensees of intellectual property. 27-28 - Anthony Korn:
Data protection in Ireland: The Netherlands and Switzerland: Privacy Laws and Business Seminar, Mayfair Hotel, London, Wednesday, 19 October 1988. 28 - Bernard P. Zajac Jr.:
Virus hits major US computer network. 34-35 - David W. Greaves:
Eurodynamics systems PLC-V-general automation ltd. (As yet unreported - September 1988). 40-41 - Stephen Saxby:
European Study Conferences Ltd: The Royal Automobile Club, London, Thursday, 13 October 1988. 42-43
Volume 4, Number 6, March 1989
- Martin R. Smith:
The people risks. 2-6 - Graham Greenleaf:
Politics triumphs in Australia's new data protection law. 7-9 - Robert P. Bigelow:
Computer security, crime and privacy - US status report. 10-16 - Mads Bryde Andersen:
Current legal protection for computer programs. 17-21 - John Sutcliffe:
Welfare benefits adviser: a local government expert system application. 22-23 - Ian Walden:
The 1988 conference for data commissioners. 36-38 - Stephen Saxby:
EDI '88 - The second UK national conference on paperless trade. 38-41 - David W. Greaves:
Licensing and protection of computer software in Europe: The impact of 1992. 42-43
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.