default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr3.bht:"
@article{DBLP:journals/clsr/Bergsten88, author = {Eric Bergsten}, title = {International trade procedures}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {23--29}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90132-X}, doi = {10.1016/0267-3649(88)90132-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bergsten88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/BloomBecker88, author = {Buck BloomBecker}, title = {{US} computer security legislation {H.R.} 145: {A} step toward greater computer security?}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {130--31}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90115-X}, doi = {10.1016/0267-3649(88)90115-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/BloomBecker88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/DannD88, author = {Derek Dann and Jill Dann}, title = {{MILCOMP} 87 Military computers, graphics and software a review}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {42--43}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90124-0}, doi = {10.1016/0267-3649(88)90124-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/DannD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies88h, author = {David Davies}, title = {Risk management}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {35--36}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90135-5}, doi = {10.1016/0267-3649(88)90135-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies88h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Dedman88, author = {Richard Dedman}, title = {Legal protection of software in the United Kingdom}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {10--14}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90107-0}, doi = {10.1016/0267-3649(88)90107-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Dedman88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Dilloway88, author = {Cliff Dilloway}, title = {Arbitration - {IBM} v {FUJITSU} Ltd}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {32--34}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90134-3}, doi = {10.1016/0267-3649(88)90134-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Dilloway88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Dunkel88, author = {Arthur Dunkel}, title = {General agreement on tariffs and trade}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {30--32}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90133-1}, doi = {10.1016/0267-3649(88)90133-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Dunkel88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves88c, author = {David W. Greaves}, title = {{US} case law and legislative developments}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {34--35}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90118-5}, doi = {10.1016/0267-3649(88)90118-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves88d, author = {David W. Greaves}, title = {Computer disputes - {A} new perspective}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {39}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90121-5}, doi = {10.1016/0267-3649(88)90121-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves88d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves88e, author = {David W. Greaves}, title = {Case law update}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {37}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90137-9}, doi = {10.1016/0267-3649(88)90137-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves88e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves88f, author = {David W. Greaves}, title = {{US} case low developments}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {37--38}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90138-0}, doi = {10.1016/0267-3649(88)90138-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves88f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greenleaf88, author = {Graham Greenleaf}, title = {Privacy}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {6--8}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90128-8}, doi = {10.1016/0267-3649(88)90128-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greenleaf88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hammond88, author = {Grant Hammond}, title = {The development of trade secrets law in Canada}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {14--16}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90108-2}, doi = {10.1016/0267-3649(88)90108-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hammond88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/HarveyN88, author = {Sharon Harvey and Julian Newman}, title = {Contracts by electronic mail}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {2--6}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90127-6}, doi = {10.1016/0267-3649(88)90127-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/HarveyN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hennessy88, author = {Chris Hennessy}, title = {Contingency planning and disaster recovery for computer systems}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {38--39}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90120-3}, doi = {10.1016/0267-3649(88)90120-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hennessy88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton88d, author = {Yvo Henniker{-}Heaton}, title = {A look behind the news 1988 - New year's resolutions: {A} data processing manager reveals all}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {28--29}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90113-6}, doi = {10.1016/0267-3649(88)90113-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton88d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hughes88b, author = {Pamela Hughes}, title = {The 'need to know' principle of computer security}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {29--30}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90114-8}, doi = {10.1016/0267-3649(88)90114-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hughes88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hughes88c, author = {Pamela Hughes}, title = {Fourth National Computer Security Conference, Windsor, {U.K}}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {43--44}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90125-2}, doi = {10.1016/0267-3649(88)90125-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hughes88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Morris88, author = {John Morris}, title = {Source code maintenance and Escrow}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {11--16}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90130-6}, doi = {10.1016/0267-3649(88)90130-6}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/clsr/Morris88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Robertson88, author = {Ranald Robertson}, title = {Strict liability under the consumer protection act 1987 - Some implications for producers of computer based products}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {16--20}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90109-4}, doi = {10.1016/0267-3649(88)90109-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Robertson88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby88a, author = {Stephen Saxby}, title = {Law report - Canada}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {32--34}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90117-3}, doi = {10.1016/0267-3649(88)90117-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby88b, author = {Stephen Saxby}, title = {Information technology and the courts}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {40--41}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90122-7}, doi = {10.1016/0267-3649(88)90122-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sterling88b, author = {J. A. L. Sterling}, title = {Copyright legislation}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {2--9}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90106-9}, doi = {10.1016/0267-3649(88)90106-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sterling88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Walden88b, author = {Ian Walden}, title = {Conference review}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {38--40}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90139-2}, doi = {10.1016/0267-3649(88)90139-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Walden88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wernick88, author = {Alan S. Wernick}, title = {Intellectual property bankruptcy protection}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {8--11}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90129-X}, doi = {10.1016/0267-3649(88)90129-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wernick88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wright88, author = {R. W. Wright}, title = {{R.W.} Wright: Address to {ITAC} conference a litigation solicitor's view}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {41--42}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90123-9}, doi = {10.1016/0267-3649(88)90123-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wright88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac88b, author = {Bernard P. Zajac Jr.}, title = {The latest news from the {US}}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {5}, pages = {31--32}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90116-1}, doi = {10.1016/0267-3649(88)90116-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac88c, author = {Bernard P. Zajac Jr.}, title = {{US} focus}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {6}, pages = {36}, year = {1988}, url = {https://doi.org/10.1016/0267-3649(88)90136-7}, doi = {10.1016/0267-3649(88)90136-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Appleton87, author = {John E. Appleton}, title = {Law reports update}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {37--39}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90029-X}, doi = {10.1016/0267-3649(87)90029-X}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Appleton87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bergsten87, author = {Eric E. Bergsten}, title = {International trade procedures}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {4--7}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90017-3}, doi = {10.1016/0267-3649(87)90017-3}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bergsten87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Brown87, author = {Roger Brown}, title = {Privacy}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {8--11}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90018-5}, doi = {10.1016/0267-3649(87)90018-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Brown87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Butler87, author = {R. E. Butler}, title = {{ISDN} - Major obstacles stand in the way}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {6}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90033-1}, doi = {10.1016/0267-3649(87)90033-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Butler87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Byrne87, author = {Noel Byrne}, title = {Commercial agreements and competition law: Practice and procedure in the {UK} and {EEC:} Dr Nicholas Green published by Graham {\&} Trotman, 1986. {ISBN} 0860107884. Price {\textsterling}89}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {31--32}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90044-6}, doi = {10.1016/0267-3649(87)90044-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Byrne87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Dann87, author = {Jill Dann}, title = {Defence review}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {17--18}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90056-2}, doi = {10.1016/0267-3649(87)90056-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Dann87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies87a, author = {David Davies}, title = {Anatomy of a disaster}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {13--14}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90021-5}, doi = {10.1016/0267-3649(87)90021-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies87b, author = {David Davies}, title = {Security focus}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {35--36}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90027-6}, doi = {10.1016/0267-3649(87)90027-6}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies87b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies87c, author = {David Davies}, title = {It can't happen to us: {A} selection of recent computing losses}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {36--37}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90028-8}, doi = {10.1016/0267-3649(87)90028-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies87c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies87d, author = {David Davies}, title = {Protection against director's failure}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {37}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90064-1}, doi = {10.1016/0267-3649(87)90064-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies87d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies87e, author = {David Davies}, title = {The consumer protection act British computer society, 24 September 1987}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {38--40}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90065-3}, doi = {10.1016/0267-3649(87)90065-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies87e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Dilloway87, author = {C. C. Dilloway}, title = {A case study in a computer arbitration}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {12--13}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90075-6}, doi = {10.1016/0267-3649(87)90075-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Dilloway87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Farquhar87, author = {William Farquhar}, title = {Risk management}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {14--17}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90077-X}, doi = {10.1016/0267-3649(87)90077-X}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Farquhar87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Freed87, author = {Roy N. Freed}, title = {Is software copyright becoming unfair competition law?}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {10--12}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90036-7}, doi = {10.1016/0267-3649(87)90036-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Freed87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves87b, author = {David W. Greaves}, title = {Computer disputes: Have the courts become too user-friendly?}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {13--14}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90076-8}, doi = {10.1016/0267-3649(87)90076-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves87b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves87c, author = {David W. Greaves}, title = {Law reports update - recent legislative and judicial developments in the {US}}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {25--27}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90042-2}, doi = {10.1016/0267-3649(87)90042-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves87c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves87d, author = {David W. Greaves}, title = {The 1987 computer law symposium 28 and 29 April 1987, London. {A} two day course organised by legal studies and services ltd}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {34--35}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90046-X}, doi = {10.1016/0267-3649(87)90046-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves87d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves87e, author = {David W. Greaves}, title = {Legal liability for expert systems - 14 May 87 London. {A} one day conference organised by learned information ltd}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {35--36}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90047-1}, doi = {10.1016/0267-3649(87)90047-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves87e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greguras87a, author = {Fred Greguras}, title = {National security decision directive 145}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {25}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90081-1}, doi = {10.1016/0267-3649(87)90081-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greguras87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton87a, author = {Yvo Henniker{-}Heaton}, title = {Security awareness}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {2--3}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90070-7}, doi = {10.1016/0267-3649(87)90070-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton87b, author = {Yvo Henniker{-}Heaton}, title = {Electronic risks in banking and commerce, the gloucester hotel, London. {A} two day course organised by {IBC} technical services, March 1987}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {32--34}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90045-8}, doi = {10.1016/0267-3649(87)90045-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton87c, author = {Yvo Henniker{-}Heaton}, title = {Computer security}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {12--13}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90020-3}, doi = {10.1016/0267-3649(87)90020-3}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Henniker-Heaton87d, author = {Yvo Henniker{-}Heaton}, title = {Risk management}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {13--15}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90054-9}, doi = {10.1016/0267-3649(87)90054-9}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Henniker-Heaton87d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hernandez87, author = {Ruel T. Hernandez}, title = {Information law}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {2--8}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90051-3}, doi = {10.1016/0267-3649(87)90051-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hernandez87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hughes87, author = {Pamela Hughes}, title = {Computer security - 3 day seminar 20-22/5/87. {EMAP}}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {36}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90048-3}, doi = {10.1016/0267-3649(87)90048-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hughes87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hughes87a, author = {Pamela Hughes}, title = {Radio frequency interference - myths, realities and a practical approach}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {15--17}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90055-0}, doi = {10.1016/0267-3649(87)90055-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hughes87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kelman87a, author = {Alistair Kelman}, title = {Read all about yourself}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {11--12}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90019-7}, doi = {10.1016/0267-3649(87)90019-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kelman87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/LarnerD87, author = {Steven Larner and Sandy Douglas}, title = {Settling disputes in the computer industry}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {10--12}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90074-4}, doi = {10.1016/0267-3649(87)90074-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/LarnerD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Marshall87a, author = {David V. Marshall}, title = {Electronic share dealing - The legal issues}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {21--23}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90079-3}, doi = {10.1016/0267-3649(87)90079-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Marshall87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Marshall87b, author = {David V. Marshall}, title = {Electronic share dealing - the legal issues}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {18--19}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90038-0}, doi = {10.1016/0267-3649(87)90038-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Marshall87b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Marshall87c, author = {David V. Marshall}, title = {Electronic share dealing - The legal issues}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {18--20}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90057-4}, doi = {10.1016/0267-3649(87)90057-4}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Marshall87c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Middleton87, author = {Rowan Middleton}, title = {Computer security}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {23--24}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90040-9}, doi = {10.1016/0267-3649(87)90040-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Middleton87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Millard87, author = {Christopher Millard}, title = {Software licensing}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {8--11}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90052-5}, doi = {10.1016/0267-3649(87)90052-5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Millard87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Pendleton87, author = {Michael D. Pendleton}, title = {Hong Kong Focus}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {20--22}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90058-6}, doi = {10.1016/0267-3649(87)90058-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Pendleton87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Regberg87, author = {Marc Regberg}, title = {Trends in communication technology: Impacts on the right to control publication and performance}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {2--6}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90032-X}, doi = {10.1016/0267-3649(87)90032-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Regberg87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby87a, author = {Stephen Saxby}, title = {Semi-conductor chips}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {3--6}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90071-9}, doi = {10.1016/0267-3649(87)90071-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby87b, author = {Stephen Saxby}, title = {Computer evidence}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {6--9}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90072-0}, doi = {10.1016/0267-3649(87)90072-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby87b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby87c, author = {Stephen Saxby}, title = {Current awareness}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {26--32}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90082-3}, doi = {10.1016/0267-3649(87)90082-3}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby87c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby87d, author = {Stephen Saxby}, title = {Recent decisions in the {US} courts}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {34--36}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90084-7}, doi = {10.1016/0267-3649(87)90084-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby87d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sims87, author = {John Sims}, title = {New approaches to dispute resolution}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {9--10}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90073-2}, doi = {10.1016/0267-3649(87)90073-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sims87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sterling87, author = {J. A. L. Sterling}, title = {Copyright in computer programs}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {13--17}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90037-9}, doi = {10.1016/0267-3649(87)90037-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sterling87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sterling87a, author = {J. A. L. Sterling}, title = {Copyright in computer programs}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {21--28}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90024-0}, doi = {10.1016/0267-3649(87)90024-0}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sterling87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Thorne87, author = {Clive D. Thorne}, title = {Copyright legislation}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {12}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90053-7}, doi = {10.1016/0267-3649(87)90053-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Thorne87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wasik87, author = {Martin Wasik}, title = {Computer crime}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {23--24}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90059-8}, doi = {10.1016/0267-3649(87)90059-8}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wasik87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X87, title = {Telecommunications and employment: An interview with Mr. {R.E.} Butler, Secretary-General of the international telecommunication union}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {6--10}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90034-3}, doi = {10.1016/0267-3649(87)90034-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X87a, title = {Communication technology}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {2--4}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90016-1}, doi = {10.1016/0267-3649(87)90016-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac87a, author = {Bernard P. Zajac Jr.}, title = {{US} focus}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {1}, pages = {23--24}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90080-X}, doi = {10.1016/0267-3649(87)90080-X}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac87a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac87b, author = {Bernard P. Zajac Jr.}, title = {{US} focus}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {2}, pages = {24--27}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90041-0}, doi = {10.1016/0267-3649(87)90041-0}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac87b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac87c, author = {Bernard P. Zajac Jr.}, title = {Computer crime - what to do before it happens}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {14--18}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90022-7}, doi = {10.1016/0267-3649(87)90022-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac87c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac87d, author = {Bernard P. Zajac Jr.}, title = {{US} focus}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {3}, pages = {28--29}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90025-2}, doi = {10.1016/0267-3649(87)90025-2}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac87d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac87e, author = {Bernard P. Zajac Jr.}, title = {{US} focus}, journal = {Comput. Law Secur. Rev.}, volume = {3}, number = {4}, pages = {24--26}, year = {1987}, url = {https://doi.org/10.1016/0267-3649(87)90060-4}, doi = {10.1016/0267-3649(87)90060-4}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac87e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.