Search dblp for Publications

export results for "toc:db/journals/clsr/clsr13.bht:"

 download as .bib file

@article{DBLP:journals/clsr/000297,
  author       = {David Bainbridge},
  title        = {Intellectual Property, 3rd Edition, David Bainbridge. Pitman Publishing
                  (1996), 572, 0273 622 79X {\textsterling}27.99 soft-cover},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {45},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81194-6},
  doi          = {10.1016/S0267-3649(97)81194-6},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/000297a,
  author       = {David Bainbridge},
  title        = {Law report - {I:} Cannot employees also be hackers?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {352--354},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80180-X},
  doi          = {10.1016/S0267-3649(97)80180-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000297a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/000397,
  author       = {Michael D. Scott},
  title        = {Liability in cyberspace - {III:} Creating a corporate internet acceptable
                  use policy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {451--453},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89801-9},
  doi          = {10.1016/S0267-3649(97)89801-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000397.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Baum97,
  author       = {Michael S. Baum},
  title        = {Secure electronic commerce - {II:} The {ABA} digital signature guidelines},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {457--458},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89803-2},
  doi          = {10.1016/S0267-3649(97)89803-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Baum97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Beutler97,
  author       = {Stephan Beutler},
  title        = {The protection of multimedia products under international copyright
                  law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {253--260},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88855-3},
  doi          = {10.1016/S0267-3649(97)88855-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Beutler97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Beutler97a,
  author       = {Stephan Beutler},
  title        = {Multimedia law: The protection of multimedia products under international
                  copyright law - Part {II}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {319--324},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80170-7},
  doi          = {10.1016/S0267-3649(97)80170-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Beutler97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bigelow97,
  author       = {Robert P. Bigelow},
  title        = {A report from the United States - part {II}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {87--95},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89742-7},
  doi          = {10.1016/S0267-3649(97)89742-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bigelow97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Birch97,
  author       = {Dave Birch},
  title        = {Secure electronic commerce - {I:} The certificate business public
                  key infrastructure will be big business},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {454--456},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89802-0},
  doi          = {10.1016/S0267-3649(97)89802-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Birch97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bond97,
  author       = {Robert T. J. Bond},
  title        = {European union directive on the legal protection of databases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {401--412},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89787-7},
  doi          = {10.1016/S0267-3649(97)89787-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bond97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Brinson97,
  author       = {J. Dianne Brinson},
  title        = {Multimedia Law and Business Handbook, J. Dianne Brinson, Mark F. Radcliffe.
                  Ladera Press, {NY} (1996), 468, {ISBN} 096 391 7323 {US} {\textdollar}44.95},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {28},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81189-2},
  doi          = {10.1016/S0267-3649(97)81189-2},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Brinson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bull97,
  author       = {Gillian Bull},
  title        = {Market data rights bingo},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {75--86},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89740-3},
  doi          = {10.1016/S0267-3649(97)89740-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bull97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Bull97a,
  author       = {Gillian Bull},
  title        = {Conference review: Cyberl@W, {IBC} {UK} conferences limited, Monday
                  23 June 1997, Strand Palace Hotel, London},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {381--382},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80184-7},
  doi          = {10.1016/S0267-3649(97)80184-7},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/clsr/Bull97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Chalton97,
  author       = {Simon Chalton},
  title        = {Data protection: Data protection: The government's legislative proposals},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {425--428},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89792-0},
  doi          = {10.1016/S0267-3649(97)89792-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Chalton97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Charlesworth97,
  author       = {Andrew Charlesworth},
  title        = {Law report - {I:} Glencore international {A.G.} and another v bank
                  of China {[1996]} 1 Lloyd's law reports 135. {(CA)} decision of 8
                  november 1995},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {120--122},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89750-6},
  doi          = {10.1016/S0267-3649(97)89750-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Charlesworth97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Daranyi97,
  author       = {Alexander de Daranyi},
  title        = {Software law - Switzerland: An introduction to software protection
                  under swiss law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {340--343},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80175-6},
  doi          = {10.1016/S0267-3649(97)80175-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Daranyi97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies97,
  author       = {Helena Davies},
  title        = {Business transfers and outsourcing: The S{\"{u}}zen and Betts
                  cases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {272--273},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88861-9},
  doi          = {10.1016/S0267-3649(97)88861-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies97a,
  author       = {Simon Davies},
  title        = {Privacy law - Australia: The Australian federal government has abandoned
                  its election promise to enact privacy legislation for business},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {429--430},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89793-2},
  doi          = {10.1016/S0267-3649(97)89793-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/DaviesH97,
  author       = {David Davies and
                  Aon Bain Hogg},
  title        = {Risk management: Holistic risk management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {336--339},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80174-4},
  doi          = {10.1016/S0267-3649(97)80174-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/DaviesH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Digby97,
  author       = {Stephen Digby},
  title        = {{EURIM} report: {EURIM} - European informatics market - The next phase},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {349--351},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80178-1},
  doi          = {10.1016/S0267-3649(97)80178-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Digby97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Durie97,
  author       = {Robyn Durie},
  title        = {The internet, trademarks and domain names},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {29--33},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81190-9},
  doi          = {10.1016/S0267-3649(97)81190-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Durie97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Endeshaw97,
  author       = {Assafa Endeshaw},
  title        = {Commercial law: Assimilating software to 'goods' by analogy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {325--330},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80171-9},
  doi          = {10.1016/S0267-3649(97)80171-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Endeshaw97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Flint97,
  author       = {David Flint},
  title        = {Internet domain names: Proposal for a cybermark},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {163--166},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86892-6},
  doi          = {10.1016/S0267-3649(97)86892-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Flint97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Glickson97,
  author       = {Scott Glickson},
  title        = {Commerce in cyberspace - {II:} Point, click, and buy: Contracting
                  for online products and services},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {436--441},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89795-6},
  doi          = {10.1016/S0267-3649(97)89795-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Glickson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Godfrey-Faussett97,
  author       = {Matthew Godfrey{-}Faussett},
  title        = {Outsourcing: Telecommunications outsourcing - {A} legal perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {176--181},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86896-3},
  doi          = {10.1016/S0267-3649(97)86896-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Godfrey-Faussett97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hart97,
  author       = {Robert J. Hart},
  title        = {The case for patent protection for computer program-related inventions},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {247--252},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88854-1},
  doi          = {10.1016/S0267-3649(97)88854-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hart97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Hof97,
  author       = {Simone van der Hof},
  title        = {First results of The Dutch National Programme on Information Technology
                  and Law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {42--45},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81193-4},
  doi          = {10.1016/S0267-3649(97)81193-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Hof97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HorrocksB97,
  author       = {Andrew Horrocks and
                  Kit Burden},
  title        = {Domain names: Domain names - Fighting for identity},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {303--306},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80166-5},
  doi          = {10.1016/S0267-3649(97)80166-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HorrocksB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Jenkins97,
  author       = {Glenn P. Jenkins},
  title        = {Information Technology and Innovation in Tax Administration, Glenn
                  P. Jenkins (Ed.). Kluwer Law International (1996), 213, {NLG} 125.00/US
                  {\textdollar}84.00/{\textsterling}56.00, {ISBN:} 90 411 09668},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {72},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81200-9},
  doi          = {10.1016/S0267-3649(97)81200-9},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Jenkins97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Judah97,
  author       = {David Judah},
  title        = {Liability in cyberspace - {I:} Defamation in cyberspace},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {442--446},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89798-1},
  doi          = {10.1016/S0267-3649(97)89798-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Judah97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kirby97,
  author       = {Justice Michael Kirby},
  title        = {Cryptography policy: {OECD} cryptography guidelines in context},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {182--186},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86898-7},
  doi          = {10.1016/S0267-3649(97)86898-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kirby97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MacDonaldL97,
  author       = {Stuart MacDonald and
                  Bernard Lefang},
  title        = {Patent information survey: Information for innovation: Surveys of
                  innovating and patenting small firms},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {344--348},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80176-8},
  doi          = {10.1016/S0267-3649(97)80176-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/MacDonaldL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MandellSC97,
  author       = {Steve A. Mandell and
                  Edwin Y. Szeto and
                  Eileen P. Cohen},
  title        = {{US} update: Legal status of safeguarding proprietary information},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {261--265},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88856-5},
  doi          = {10.1016/S0267-3649(97)88856-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/MandellSC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/McCallough97,
  author       = {Robert McCallough},
  title        = {St Albans City and district council and International Computers Limited
                  - "St Albans and Beyond"},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {46--48},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81195-8},
  doi          = {10.1016/S0267-3649(97)81195-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/McCallough97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/McCauley97,
  author       = {James M. McCauley},
  title        = {Internet regulation - {I:} Legal ethics and the internet: {A} {US}
                  perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {110--114},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89747-6},
  doi          = {10.1016/S0267-3649(97)89747-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/McCauley97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Newman97,
  author       = {Simon Newman},
  title        = {Rights, freedoms and phonograms: Moral rights and adaptation rights
                  in music and other copyright works},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {22--28},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81188-0},
  doi          = {10.1016/S0267-3649(97)81188-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Newman97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Newman97a,
  author       = {Simon Newman},
  title        = {Intellectual property law: Part {II} - The moral right of the author:
                  The view from France, Germany and the United Kingdom},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {96--101},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89743-9},
  doi          = {10.1016/S0267-3649(97)89743-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Newman97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Norton97,
  author       = {Joseph Norton},
  title        = {Cross-Border Electronic Banking - Challenges and Opportunities, Joseph
                  Norton, Chris Reed, Ian Walden (Eds.). Lloyds of London Press (1995),
                  303, 185044 8485},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {41},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81192-2},
  doi          = {10.1016/S0267-3649(97)81192-2},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Norton97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Orlowski97,
  author       = {Steve Orlowski},
  title        = {{OECD} cryptography policy guidelines},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {276--278},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88864-4},
  doi          = {10.1016/S0267-3649(97)88864-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Orlowski97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Peters97,
  author       = {Lena Peters},
  title        = {The future Unidroit database on uniform law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {34--41},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81191-0},
  doi          = {10.1016/S0267-3649(97)81191-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Peters97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Powell97,
  author       = {Mark D. Powell},
  title        = {Technology transfer: The european commission's technology transfer
                  regulation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {126--131},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89755-5},
  doi          = {10.1016/S0267-3649(97)89755-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Powell97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Reed97,
  author       = {Chris Reed},
  title        = {Copyright in {WWW} pages: News from Shetland copyright in links to
                  World Wide Web pages},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {167--175},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86894-X},
  doi          = {10.1016/S0267-3649(97)86894-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Reed97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rees97,
  author       = {Christopher Rees},
  title        = {Computer Evidence: {A} Forensic Investigations Handbook by Edward
                  Wilding Published by Sweet {\&} Maxwell},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {219},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86943-9},
  doi          = {10.1016/S0267-3649(97)86943-9},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rees97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rosenblatt97,
  author       = {Heather Rosenblatt},
  title        = {Protocol to the berne convention: The wipo diplomatic conference -
                  the birth of two new treaties},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {307--311},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80168-9},
  doi          = {10.1016/S0267-3649(97)80168-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rosenblatt97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rowe97,
  author       = {Heather Rowe},
  title        = {British telecom's operating licence - The new fair trading condition},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {274--275},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88863-2},
  doi          = {10.1016/S0267-3649(97)88863-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rowe97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rowe97a,
  author       = {Heather Rowe},
  title        = {The report by the centre for the study of financial innovation {(CSFI)}
                  on "the internet {\&} financial services"},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {383--386},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80186-0},
  doi          = {10.1016/S0267-3649(97)80186-0},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rowe97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rowe97b,
  author       = {Heather Rowe},
  title        = {The laws of the internet by Clive Gringras of Nabarro Nathanson},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {387},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80187-2},
  doi          = {10.1016/S0267-3649(97)80187-2},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rowe97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rowe97c,
  author       = {Heather Rowe},
  title        = {It issues in monetary union: European monetary union - so why is it
                  a technology issue?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {391--397},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89784-1},
  doi          = {10.1016/S0267-3649(97)89784-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rowe97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby97,
  author       = {Stephen Saxby},
  title        = {The times they are A-changing},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {2},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81185-5},
  doi          = {10.1016/S0267-3649(97)81185-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby97a,
  author       = {Stephen Saxby},
  title        = {Measured progress in geneva},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {74},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89739-7},
  doi          = {10.1016/S0267-3649(97)89739-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby97b,
  author       = {Stephen Saxby},
  title        = {Electronic commerce a step closer following adoption of {OECD} cryptography
                  guidelines},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {150},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86887-2},
  doi          = {10.1016/S0267-3649(97)86887-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby97c,
  author       = {Stephen Saxby},
  title        = {Computer misuse act questioned again},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {222},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88850-4},
  doi          = {10.1016/S0267-3649(97)88850-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby97d,
  author       = {Stephen Saxby},
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {302},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80165-3},
  doi          = {10.1016/S0267-3649(97)80165-3},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby97d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby97e,
  author       = {Stephen Saxby},
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {390},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89783-X},
  doi          = {10.1016/S0267-3649(97)89783-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby97e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Seddon97,
  author       = {Clive Seddon},
  title        = {{IT} project management: Partnering {IT} projects},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {102--109},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89745-2},
  doi          = {10.1016/S0267-3649(97)89745-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Seddon97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sieber97,
  author       = {Ulrich Sieber},
  title        = {Criminal liability for the transfer of data in international networks
                  - new challenges for the internet - part {I}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {151--157},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86888-4},
  doi          = {10.1016/S0267-3649(97)86888-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sieber97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sieber97a,
  author       = {Ulrich Sieber},
  title        = {Criminal liability for the transfer of data in international networks
                  - New challenges for the internet - Part {II:} Precedents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {223--233},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88851-6},
  doi          = {10.1016/S0267-3649(97)88851-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sieber97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sieber97b,
  author       = {Ulrich Sieber},
  title        = {Internet law: Criminal liability for the transfer of data in international
                  networks - New challenges for the internet - Part {III:} Precedents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {312--318},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80169-0},
  doi          = {10.1016/S0267-3649(97)80169-0},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sieber97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sieber97c,
  author       = {Ulrich Sieber},
  title        = {Internet law: Criminal liability for the transfer of data in international
                  networks - new challenges for the internet - part {IV:} Precedents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {413--418},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89789-0},
  doi          = {10.1016/S0267-3649(97)89789-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sieber97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Silverman97,
  author       = {Jared Silverman},
  title        = {Liability in cyberspace - {II:} Disclosure and securities fraud on
                  the internet},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {447--450},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89799-3},
  doi          = {10.1016/S0267-3649(97)89799-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Silverman97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sinclair97,
  author       = {Michael Sinclair},
  title        = {{IT} management: Providing for information technology on sale of a
                  business},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {331--335},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80173-2},
  doi          = {10.1016/S0267-3649(97)80173-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sinclair97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Small97,
  author       = {Harry Small},
  title        = {Commerce in cyberspace - {I:} Marketing on the internet},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {6},
  pages        = {431--435},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89794-4},
  doi          = {10.1016/S0267-3649(97)89794-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Small97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Stone97,
  author       = {Peter Stone},
  title        = {Lessons from America: Filtration of functionality from software copyright},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {15--21},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81187-9},
  doi          = {10.1016/S0267-3649(97)81187-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Stone97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Taylor97,
  author       = {Mark Taylor},
  title        = {Law report- {II:} Pitman training ltd and ptc oxford ltd v nominet
                  uk and pearson professional ltd},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {5},
  pages        = {355--356},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)80182-3},
  doi          = {10.1016/S0267-3649(97)80182-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Taylor97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ter97,
  author       = {Kah Leng Ter},
  title        = {Internet regulation {II:} Internet regulation in singapore},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {115--119},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89749-X},
  doi          = {10.1016/S0267-3649(97)89749-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ter97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/TerwangneL97,
  author       = {C{\'{e}}cile de Terwangne and
                  Sophie Louveaux},
  title        = {Data protection and online networks},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {234--246},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88853-X},
  doi          = {10.1016/S0267-3649(97)88853-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/TerwangneL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Vassilaki97,
  author       = {Irini E. Vassilaki},
  title        = {Multimedia crime: Multimedia crime - Emergence, phenomena and legal
                  questions of "metacomputer crime"},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {158--162},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86889-6},
  doi          = {10.1016/S0267-3649(97)86889-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Vassilaki97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/VerheulKT97,
  author       = {Eric R. Verheul and
                  Bert{-}Jaap Koops and
                  Henk van Tilborg},
  title        = {Binding cryptography - {A} fraud-detectible alternative to Key-Escrow
                  proposals},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {1},
  pages        = {3--14},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)81186-7},
  doi          = {10.1016/S0267-3649(97)81186-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/VerheulKT97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ward97,
  author       = {Conor Ward},
  title        = {Law report - {II:} Online newspaper's hypertext links to rival prohibited},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {123},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89752-X},
  doi          = {10.1016/S0267-3649(97)89752-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ward97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wilson97,
  author       = {Jackie Wilson},
  title        = {Electronic document management: Electronic documents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {2},
  pages        = {124--125},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)89753-1},
  doi          = {10.1016/S0267-3649(97)89753-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wilson97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wilson97a,
  author       = {Jackie Wilson},
  title        = {In the matter of application no 9204959.2 by Fujitsu Ltd},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {269--271},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88858-9},
  doi          = {10.1016/S0267-3649(97)88858-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wilson97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wiseman97,
  author       = {David Wiseman},
  title        = {Conference review: Legal aspects of global communications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {3},
  pages        = {197--200},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)86901-4},
  doi          = {10.1016/S0267-3649(97)86901-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wiseman97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wright97,
  author       = {Benjamin Wright},
  title        = {Electronic commerce legislation - Frequently asked questions},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {13},
  number       = {4},
  pages        = {266--268},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0267-3649(97)88857-7},
  doi          = {10.1016/S0267-3649(97)88857-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wright97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics