Search dblp for Publications

export results for "toc:db/journals/clsr/clsr22.bht:"

 download as .bib file

@article{DBLP:journals/clsr/000206,
  author       = {David Bainbridge},
  title        = {The registration as designs of computer icons, graphical user interfaces
                  and webpages},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {218--221},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.010},
  doi          = {10.1016/J.CLSR.2006.03.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000206.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C06,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {Will {IT} in the {UK} become greener in 2006? - The impact of the
                  new {UK} Regulations on the use of hazardous substances in electrical
                  and electronic equipment},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {172--175},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.007},
  doi          = {10.1016/J.CLSR.2006.01.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C06a,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {Is shopping online now risk free for {UK} consumers?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {333--337},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.004},
  doi          = {10.1016/J.CLSR.2006.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C06b,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - Co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {365--369},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.012},
  doi          = {10.1016/J.CLSR.2006.07.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/0003C06c,
  author       = {Mark Turner and
                  Dominic Callaghan},
  title        = {The regular article tracking developments at the national level in
                  key European countries in the area of {IT} and communications - co-ordinated
                  by Herbert Smith {LLP} and contributed to by firms across Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {449--453},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.003},
  doi          = {10.1016/J.CLSR.2006.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/0003C06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Asinari06,
  author       = {Mar{\'{\i}}a Ver{\'{o}}nica P{\'{e}}rez Asinari},
  title        = {Internet gambling and betting services: When the GATS' rules are not
                  applied due to the public morals/public order exception. What lessons
                  can be learnt?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {299--308},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.003},
  doi          = {10.1016/J.CLSR.2006.03.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Asinari06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Burbridge06,
  author       = {Carolyn Burbridge},
  title        = {{IPTV:} The dependencies for success},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {409--412},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.008},
  doi          = {10.1016/J.CLSR.2006.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Burbridge06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Burden06,
  author       = {Kit Burden},
  title        = {Indemnities in {IT} and outsourcing contracts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {68--72},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.09.001},
  doi          = {10.1016/J.CLSR.2005.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Burden06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Clarke06,
  author       = {Roger Clarke},
  title        = {Google's gauntlets - Challenges to 'old world corps', consumers and
                  the law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {288--298},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.003},
  doi          = {10.1016/J.CLSR.2006.05.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Clarke06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/ConnollyR06,
  author       = {Chris Connolly and
                  Prashanti Ravindra},
  title        = {First {UN} Convention on eCommerce finalised},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {31--38},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.11.005},
  doi          = {10.1016/J.CLSR.2005.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/ConnollyR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Dahiyat06,
  author       = {Emad Abdel Rahim Dahiyat},
  title        = {Intelligent agents and intentionality: Should we begin to think outside
                  the box?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {472--480},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.09.001},
  doi          = {10.1016/J.CLSR.2006.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Dahiyat06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Deveci06,
  author       = {Hasan A. Deveci},
  title        = {Personal jurisdiction: Where cyberspace meets the real world - Part
                  {II}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {39--45},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.09.002},
  doi          = {10.1016/J.CLSR.2005.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Deveci06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/DobsonT06,
  author       = {Tatyana Dobson and
                  Elle Todd},
  title        = {Radio frequency identification technology},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {313--315},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.008},
  doi          = {10.1016/J.CLSR.2006.05.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/DobsonT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/FleischerC06,
  author       = {Peter Fleischer and
                  Dan Cooper},
  title        = {{EU} data privacy in practice - Microsoft's approach to compliance},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {57--67},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.11.004},
  doi          = {10.1016/J.CLSR.2005.11.004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/FleischerC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Flint06,
  author       = {David Flint},
  title        = {{RFID} tags, security and the individual},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {165--168},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.009},
  doi          = {10.1016/J.CLSR.2006.01.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Flint06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/FrostU06,
  author       = {Kim Frost and
                  Henrik Udsen},
  title        = {Anti spam regulation in Denmark},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {241--249},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.002},
  doi          = {10.1016/J.CLSR.2006.03.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/FrostU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/GanleyA06,
  author       = {Paul Ganley and
                  Ben Allgrove},
  title        = {Net neutrality: {A} user's guide},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {454--463},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.09.005},
  doi          = {10.1016/J.CLSR.2006.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/GanleyA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Grijpink06,
  author       = {Jan Grijpink},
  title        = {An assessment model for the use of biometrics},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {316--319},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.007},
  doi          = {10.1016/J.CLSR.2006.03.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Grijpink06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/HallidayAWL06,
  author       = {David Halliday and
                  Miriam Andrews and
                  Tim Wheeler and
                  Greg Lovell},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} {\&} telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {277--282},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.011},
  doi          = {10.1016/J.CLSR.2006.05.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/HallidayAWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KempG06,
  author       = {Richard Kemp and
                  Caspar Gibbons},
  title        = {Database right after {BHB} v. William Hill: Enact and repent at leisure},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {493--498},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.09.003},
  doi          = {10.1016/J.CLSR.2006.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KempG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KennedyC06,
  author       = {Gabriela Kennedy and
                  Douglas Clark},
  title        = {Outsourcing to China - Risks and benefits},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {250--253},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.006},
  doi          = {10.1016/J.CLSR.2006.03.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KennedyC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kierkegaard06,
  author       = {Sylvia Mercado Kierkegaard},
  title        = {Outlawing circumvention of technological measures going overboard:
                  Hollywood style},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {46--56},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.11.002},
  doi          = {10.1016/J.CLSR.2005.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kierkegaard06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kierkegaard06a,
  author       = {Sylvia Mercado Kierkegaard},
  title        = {Blogs, lies and the doocing: The next hotbed of litigation?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {127--136},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.002},
  doi          = {10.1016/J.CLSR.2006.01.002},
  timestamp    = {Sun, 11 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kierkegaard06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kierkegaard06b,
  author       = {Sylvia Mercado Kierkegaard},
  title        = {Clearing the legal barriers - Danish court upholds 'deep linking'
                  in \emph{Home v. Ofir}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {326--332},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.007},
  doi          = {10.1016/J.CLSR.2006.05.007},
  timestamp    = {Sun, 11 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kierkegaard06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kierkegaard06c,
  author       = {Sylvia Mercado Kierkegaard},
  title        = {Here comes the 'cybernators'!},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {381--391},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.005},
  doi          = {10.1016/J.CLSR.2006.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kierkegaard06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kierkegaard06d,
  author       = {Sylvia Mercado Kierkegaard},
  title        = {The new media landscape: Regulating the idiot boxes},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {464--471},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.09.004},
  doi          = {10.1016/J.CLSR.2006.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kierkegaard06d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KonC06,
  author       = {Georgina Kon and
                  Peter Church},
  title        = {A denial of service but not a denial of justice},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {416--417},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.004},
  doi          = {10.1016/J.CLSR.2006.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KonC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/KostaV06,
  author       = {Eleni Kosta and
                  Peggy Valcke},
  title        = {Retaining the data retention directive},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {370--380},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.002},
  doi          = {10.1016/J.CLSR.2006.07.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/KostaV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Krog06,
  author       = {Georg Philip Krog},
  title        = {The Norwegian "Napster case" - Do hyperlinks constitute the "making
                  available to the public" as a main or accessory act?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {73--77},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.11.001},
  doi          = {10.1016/J.CLSR.2005.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Krog06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/LittleB06,
  author       = {Jonathon Little and
                  Alexander Brown},
  title        = {Someone to watch over you},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {169--171},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.001},
  doi          = {10.1016/J.CLSR.2006.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/LittleB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Maidment06,
  author       = {Katerina Maidment},
  title        = {United Kingdom: New guidance on disclosure of electronic documents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {176--177},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.003},
  doi          = {10.1016/J.CLSR.2006.01.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Maidment06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Maidment06a,
  author       = {Katerina Maidment},
  title        = {Deadline or guideline? - Stipulations as to time in {IT} contracts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {481--485},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.006},
  doi          = {10.1016/J.CLSR.2006.05.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Maidment06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Mares06,
  author       = {Fiona Mar{\`{e}}s},
  title        = {The Regulation of Investigatory Powers Act 2000: Overview of the case
                  of \emph{R v. Clifford Stanford} {(CA} (Crim Div) 1 February 2006)
                  and the offence of unlawfully intercepting telecommunications on a
                  private system (section 1(2) offence)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {254--256},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.001},
  doi          = {10.1016/J.CLSR.2006.03.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Mares06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/MontagnonG06,
  author       = {Rachel Montagnon and
                  Nick Gardner},
  title        = {Not a lot o' luck for Shopalotto.com and the patentability of Internet
                  games},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {178--180},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.004},
  doi          = {10.1016/J.CLSR.2006.01.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/MontagnonG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/OHare06,
  author       = {Paul O'Hare},
  title        = {Electronic databases: Protecting your investment - An analysis of
                  the legal rights in electronic databases under {UK} law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {486--492},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.09.007},
  doi          = {10.1016/J.CLSR.2006.09.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/OHare06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Poullet06,
  author       = {Yves Poullet},
  title        = {{EU} data protection policy. The Directive 95/46/EC: Ten years after},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {206--217},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.004},
  doi          = {10.1016/J.CLSR.2006.03.004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Poullet06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Radcliffe06,
  author       = {Mark F. Radcliffe},
  title        = {Grokster: The new law of third party liability for copyright infringement
                  under United States law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {137--149},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.005},
  doi          = {10.1016/J.CLSR.2006.01.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Radcliffe06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rasdale06,
  author       = {Mark Rasdale},
  title        = {Legislating for robots {\&} zombies},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {222--227},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.008},
  doi          = {10.1016/J.CLSR.2006.03.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rasdale06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Rogers06,
  author       = {Kevin M. Rogers},
  title        = {Viagra, viruses and virgins: {A} pan-Atlantic comparative analysis
                  on the vanquishing of spam},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {228--240},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.006},
  doi          = {10.1016/J.CLSR.2006.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Rogers06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sampson06,
  author       = {Stephen Sampson},
  title        = {Streaming of live television broadcasts over the Internet found to
                  infringe copyright},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {413--415},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.003},
  doi          = {10.1016/J.CLSR.2006.07.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sampson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06,
  author       = {Stephen Saxby},
  title        = {eGovernment is dead: Long live transformation},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {1--2},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.002},
  doi          = {10.1016/J.CLSR.2005.12.002},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06a,
  author       = {Stephen Saxby},
  title        = {Government feels the pressure on identity cards},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {103--104},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.013},
  doi          = {10.1016/J.CLSR.2006.01.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06b,
  author       = {Stephen Saxby},
  title        = {Court of Appeal increases {UK} consumer protection for overseas credit
                  purchases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {181--182},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.005},
  doi          = {10.1016/J.CLSR.2006.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06c,
  author       = {Stephen Saxby},
  title        = {{OECD} reports on growing importance of public sector information
                  to the knowledge economy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {259--260},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.001},
  doi          = {10.1016/J.CLSR.2006.05.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06d,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Communications and Multimedia Security, David
                  Chadwick, Bart Preneel (Eds.) (2005), {(287} pp., Hard-cover, {\textsterling}88.50,
                  {\textdollar}149.00), {ISBN:} 0 387 24485 9},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {338},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.004},
  doi          = {10.1016/J.CLSR.2005.12.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06e,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Trade Marks in the Digital Age, Timothy Lee Wherry,
                  The Scarecrow Press, Inc. (2004), {(90} pp., Soft-cover, {\textsterling}18.95),
                  {ISBN:} 0 8108 4975 5},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {338},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.005},
  doi          = {10.1016/J.CLSR.2005.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06f,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: {IT} and e-commerce statutes - Blackstone's Statutes
                  on {IT} and E-commerce, Steve Hedley, Tanya Aplin, second ed., Oxford
                  University Press (2004), {(434} pp., Soft-cover, {\textsterling}16.99),
                  {ISBN:} 0 19 927303 0},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {338},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.006},
  doi          = {10.1016/J.CLSR.2005.12.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06g,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Computer Security in the 21st Century, {D.T.}
                  Lee, {S.P.} Shieh, {J.D.} Tygar (Eds.) (2005), {(268} pp., Hard-cover,
                  {\textsterling}71.50; {\textdollar}129.00), {ISBN:} 0 387 24005 5},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {338--339},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.007},
  doi          = {10.1016/J.CLSR.2005.12.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06h,
  author       = {Stephen Saxby},
  title        = {{CLSR} welcomes new Report Correspondents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {341--342},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.007},
  doi          = {10.1016/J.CLSR.2006.07.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06i,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Information management - Stephan Kudyba, Managing
                  Data Mining - Advice from Experts, Cybertech Publishing (2004), {(260}
                  pp., Soft-cover, {\textsterling}19.50), {ISBN:} 1 59140 243 3},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {421},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.008},
  doi          = {10.1016/J.CLSR.2005.12.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06j,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Human Rights in the Digital Age, Mathias Klang,
                  Andrew Murray (Eds.), Glasshouse Press (2005), {(243} pp., Soft-cover,
                  {\textsterling}25.00), {ISBN:} 1 90438 531 1},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {421},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.009},
  doi          = {10.1016/J.CLSR.2005.12.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06k,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: The {TRIPS} Agreement - Drafting History and Analysis,
                  second ed., Daniel Gervais, Thomson-Sweet {\&} Maxwell (2003),
                  {(580} pp., Hard-cover, {\textsterling}178.00), {ISBN:} 0 421 789
                  107},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {421--422},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.010},
  doi          = {10.1016/J.CLSR.2005.12.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06l,
  author       = {Stephen Saxby},
  title        = {Privacy protection is battling to keep pace with technology},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {423--424},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.10.001},
  doi          = {10.1016/J.CLSR.2006.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06m,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: Intellectual Property: Copyright, limitations
                  and the three-step test - an analysis of the three-step test in international
                  and {EC} copyright law, Martin Senftleben, Kluwer Law International
                  (2004), 340 pp. Hard-cover, {\textsterling}67, Euro 95, {\textdollar}107,
                  {ISBN:} 90 411 2267 2},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {499},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.04.005},
  doi          = {10.1016/J.CLSR.2005.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby06n,
  author       = {Stephen Saxby},
  title        = {\emph{Book review}: {EU} Electronic Communications Law - Competition
                  and Regulation in the European Telecommunications Market, Paul Nihoul,
                  Peter Rodford, Oxford University Press (2004), {(802} pp., Hard-cover,
                  {\textsterling}125), {ISBN:} 0 19 926340 {X}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {6},
  pages        = {499},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.12.001},
  doi          = {10.1016/J.CLSR.2005.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby06n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Taylor06,
  author       = {Mark Taylor},
  title        = {The {EU} Data Retention Directive},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {309--312},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.005},
  doi          = {10.1016/J.CLSR.2006.05.005},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Taylor06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ter06,
  author       = {Kah Leng Ter},
  title        = {Legal effects of input errors in eContracting},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {157--164},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.11.003},
  doi          = {10.1016/J.CLSR.2005.11.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ter06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Ter06a,
  author       = {Kah Leng Ter},
  title        = {Singapore's multi-pronged strategy against spam},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {402--408},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.006},
  doi          = {10.1016/J.CLSR.2006.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Ter06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Watts06,
  author       = {Mark Watts},
  title        = {Information, data and personal data - Reflections on \emph{Durant
                  v. Financial Services Authority}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {4},
  pages        = {320--325},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.05.002},
  doi          = {10.1016/J.CLSR.2006.05.002},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Watts06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/WestwellADH06,
  author       = {Jonathan Westwell and
                  Miriam Andrews and
                  Sara Dethridge and
                  Clare Horvath},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} and telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {117--121},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.011},
  doi          = {10.1016/J.CLSR.2006.01.011},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/WestwellADH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/WestwellALC06,
  author       = {Jonathan Westwell and
                  Miriam Andrews and
                  Greg Lovell and
                  Edyth Cormack},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} {\&} telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {196--200},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.04.002},
  doi          = {10.1016/J.CLSR.2006.04.002},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/WestwellALC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/WestwellAMM06,
  author       = {Jonathan Westwell and
                  Miriam Andrews and
                  John McLean and
                  Katrina Mitchell},
  title        = {Baker {\&} McKenzie's annual review of developments in {EU} law
                  relating to IP, {IT} and telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {20--25},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.11.008},
  doi          = {10.1016/J.CLSR.2005.11.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/WestwellAMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/WestwellAMPS06,
  author       = {Jonathan Westwell and
                  Miriam Andrews and
                  Tabeebah Malik and
                  Julia Pearce and
                  Chris Saunderson},
  title        = {Baker {\&} McKenzie's regular article tracking developments in
                  {EU} law relating to IP, {IT} and telecommunications},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {359--364},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.010},
  doi          = {10.1016/J.CLSR.2006.07.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/WestwellAMPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wilson06,
  author       = {C. Wilson},
  title        = {\emph{Book review}: Law of copyright: Kevin Garnett, Gillian Davies,
                  Gwilym Harbottle, (senior Eds) , Copinger and Skone James on Copyright
                  15th ed., vols. 1/2, Sweet {\&} Maxwell (2005), pp. 1850/1181,
                  Hard-cover, {\textsterling}335.00, {ISBN:} 0421 876 506},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {1},
  pages        = {78},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2005.10.003},
  doi          = {10.1016/J.CLSR.2005.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wilson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wilson06a,
  author       = {C. Wilson},
  title        = {\emph{Book review}: Freedom of information- Marcus Turle, Freedom
                  of Information Manual, first ed. Sweet {\&} Maxwell, 2005, {ISBN}
                  0421 922 400, {(493} pp., Hard-cover {\textsterling}95.00)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {3},
  pages        = {257},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.03.009},
  doi          = {10.1016/J.CLSR.2006.03.009},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wilson06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wilson06b,
  author       = {C. Wilson},
  title        = {\emph{Book review}: Freedom of Information Handbook, Peter Carey,
                  Marcus Turle (Eds.), Law Society (2006), pp. 320, Soft-cover {\textsterling}69.95,
                  {ISBN:} 1 85328 968 {X}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {422},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.04.004},
  doi          = {10.1016/J.CLSR.2006.04.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wilson06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Woloch06,
  author       = {Bill Woloch},
  title        = {New dynamic threats requires new thinking - "Moving beyond compliance"},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {2},
  pages        = {150--156},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.01.008},
  doi          = {10.1016/J.CLSR.2006.01.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Woloch06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/WooL06,
  author       = {Monique Woo and
                  Vivian Lui},
  title        = {Hong Kong releases Copyright (Amendment) Bill 2006},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {418--420},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.001},
  doi          = {10.1016/J.CLSR.2006.07.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/WooL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Adrian06,
  title        = {{RETRACTED:} The Pirate Bay deep-sixed},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {22},
  number       = {5},
  pages        = {392--401},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1016/j.clsr.2006.07.009},
  doi          = {10.1016/J.CLSR.2006.07.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Adrian06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics