Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr22.bht:"
@article{DBLP:journals/clsr/000206, author = {David Bainbridge}, title = {The registration as designs of computer icons, graphical user interfaces and webpages}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {218--221}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.010}, doi = {10.1016/J.CLSR.2006.03.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000206.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C06, author = {Mark Turner and Dominic Callaghan}, title = {Will {IT} in the {UK} become greener in 2006? - The impact of the new {UK} Regulations on the use of hazardous substances in electrical and electronic equipment}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {172--175}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.007}, doi = {10.1016/J.CLSR.2006.01.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C06a, author = {Mark Turner and Dominic Callaghan}, title = {Is shopping online now risk free for {UK} consumers?}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {333--337}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.004}, doi = {10.1016/J.CLSR.2006.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C06b, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - Co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {365--369}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.012}, doi = {10.1016/J.CLSR.2006.07.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/0003C06c, author = {Mark Turner and Dominic Callaghan}, title = {The regular article tracking developments at the national level in key European countries in the area of {IT} and communications - co-ordinated by Herbert Smith {LLP} and contributed to by firms across Europe}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {449--453}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.10.003}, doi = {10.1016/J.CLSR.2006.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/0003C06c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Asinari06, author = {Mar{\'{\i}}a Ver{\'{o}}nica P{\'{e}}rez Asinari}, title = {Internet gambling and betting services: When the GATS' rules are not applied due to the public morals/public order exception. What lessons can be learnt?}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {299--308}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.003}, doi = {10.1016/J.CLSR.2006.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Asinari06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Burbridge06, author = {Carolyn Burbridge}, title = {{IPTV:} The dependencies for success}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {409--412}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.008}, doi = {10.1016/J.CLSR.2006.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Burbridge06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Burden06, author = {Kit Burden}, title = {Indemnities in {IT} and outsourcing contracts}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {68--72}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.09.001}, doi = {10.1016/J.CLSR.2005.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Burden06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Clarke06, author = {Roger Clarke}, title = {Google's gauntlets - Challenges to 'old world corps', consumers and the law}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {288--298}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.003}, doi = {10.1016/J.CLSR.2006.05.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Clarke06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/ConnollyR06, author = {Chris Connolly and Prashanti Ravindra}, title = {First {UN} Convention on eCommerce finalised}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {31--38}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.11.005}, doi = {10.1016/J.CLSR.2005.11.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/ConnollyR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Dahiyat06, author = {Emad Abdel Rahim Dahiyat}, title = {Intelligent agents and intentionality: Should we begin to think outside the box?}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {472--480}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.09.001}, doi = {10.1016/J.CLSR.2006.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Dahiyat06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Deveci06, author = {Hasan A. Deveci}, title = {Personal jurisdiction: Where cyberspace meets the real world - Part {II}}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {39--45}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.09.002}, doi = {10.1016/J.CLSR.2005.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Deveci06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/DobsonT06, author = {Tatyana Dobson and Elle Todd}, title = {Radio frequency identification technology}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {313--315}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.008}, doi = {10.1016/J.CLSR.2006.05.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/DobsonT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/FleischerC06, author = {Peter Fleischer and Dan Cooper}, title = {{EU} data privacy in practice - Microsoft's approach to compliance}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {57--67}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.11.004}, doi = {10.1016/J.CLSR.2005.11.004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/FleischerC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Flint06, author = {David Flint}, title = {{RFID} tags, security and the individual}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {165--168}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.009}, doi = {10.1016/J.CLSR.2006.01.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Flint06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/FrostU06, author = {Kim Frost and Henrik Udsen}, title = {Anti spam regulation in Denmark}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {241--249}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.002}, doi = {10.1016/J.CLSR.2006.03.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/FrostU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/GanleyA06, author = {Paul Ganley and Ben Allgrove}, title = {Net neutrality: {A} user's guide}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {454--463}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.09.005}, doi = {10.1016/J.CLSR.2006.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/GanleyA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Grijpink06, author = {Jan Grijpink}, title = {An assessment model for the use of biometrics}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {316--319}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.007}, doi = {10.1016/J.CLSR.2006.03.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Grijpink06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/HallidayAWL06, author = {David Halliday and Miriam Andrews and Tim Wheeler and Greg Lovell}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} {\&} telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {277--282}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.011}, doi = {10.1016/J.CLSR.2006.05.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/HallidayAWL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KempG06, author = {Richard Kemp and Caspar Gibbons}, title = {Database right after {BHB} v. William Hill: Enact and repent at leisure}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {493--498}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.09.003}, doi = {10.1016/J.CLSR.2006.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KempG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KennedyC06, author = {Gabriela Kennedy and Douglas Clark}, title = {Outsourcing to China - Risks and benefits}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {250--253}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.006}, doi = {10.1016/J.CLSR.2006.03.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KennedyC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kierkegaard06, author = {Sylvia Mercado Kierkegaard}, title = {Outlawing circumvention of technological measures going overboard: Hollywood style}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {46--56}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.11.002}, doi = {10.1016/J.CLSR.2005.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kierkegaard06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kierkegaard06a, author = {Sylvia Mercado Kierkegaard}, title = {Blogs, lies and the doocing: The next hotbed of litigation?}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {127--136}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.002}, doi = {10.1016/J.CLSR.2006.01.002}, timestamp = {Sun, 11 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kierkegaard06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kierkegaard06b, author = {Sylvia Mercado Kierkegaard}, title = {Clearing the legal barriers - Danish court upholds 'deep linking' in \emph{Home v. Ofir}}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {326--332}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.007}, doi = {10.1016/J.CLSR.2006.05.007}, timestamp = {Sun, 11 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kierkegaard06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kierkegaard06c, author = {Sylvia Mercado Kierkegaard}, title = {Here comes the 'cybernators'!}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {381--391}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.005}, doi = {10.1016/J.CLSR.2006.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kierkegaard06c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kierkegaard06d, author = {Sylvia Mercado Kierkegaard}, title = {The new media landscape: Regulating the idiot boxes}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {464--471}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.09.004}, doi = {10.1016/J.CLSR.2006.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kierkegaard06d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KonC06, author = {Georgina Kon and Peter Church}, title = {A denial of service but not a denial of justice}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {416--417}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.004}, doi = {10.1016/J.CLSR.2006.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KonC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/KostaV06, author = {Eleni Kosta and Peggy Valcke}, title = {Retaining the data retention directive}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {370--380}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.002}, doi = {10.1016/J.CLSR.2006.07.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/KostaV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Krog06, author = {Georg Philip Krog}, title = {The Norwegian "Napster case" - Do hyperlinks constitute the "making available to the public" as a main or accessory act?}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {73--77}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.11.001}, doi = {10.1016/J.CLSR.2005.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Krog06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/LittleB06, author = {Jonathon Little and Alexander Brown}, title = {Someone to watch over you}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {169--171}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.001}, doi = {10.1016/J.CLSR.2006.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/LittleB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Maidment06, author = {Katerina Maidment}, title = {United Kingdom: New guidance on disclosure of electronic documents}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {176--177}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.003}, doi = {10.1016/J.CLSR.2006.01.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Maidment06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Maidment06a, author = {Katerina Maidment}, title = {Deadline or guideline? - Stipulations as to time in {IT} contracts}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {481--485}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.006}, doi = {10.1016/J.CLSR.2006.05.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Maidment06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Mares06, author = {Fiona Mar{\`{e}}s}, title = {The Regulation of Investigatory Powers Act 2000: Overview of the case of \emph{R v. Clifford Stanford} {(CA} (Crim Div) 1 February 2006) and the offence of unlawfully intercepting telecommunications on a private system (section 1(2) offence)}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {254--256}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.001}, doi = {10.1016/J.CLSR.2006.03.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Mares06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MontagnonG06, author = {Rachel Montagnon and Nick Gardner}, title = {Not a lot o' luck for Shopalotto.com and the patentability of Internet games}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {178--180}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.004}, doi = {10.1016/J.CLSR.2006.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/MontagnonG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/OHare06, author = {Paul O'Hare}, title = {Electronic databases: Protecting your investment - An analysis of the legal rights in electronic databases under {UK} law}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {486--492}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.09.007}, doi = {10.1016/J.CLSR.2006.09.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/OHare06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Poullet06, author = {Yves Poullet}, title = {{EU} data protection policy. The Directive 95/46/EC: Ten years after}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {206--217}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.004}, doi = {10.1016/J.CLSR.2006.03.004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Poullet06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Radcliffe06, author = {Mark F. Radcliffe}, title = {Grokster: The new law of third party liability for copyright infringement under United States law}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {137--149}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.005}, doi = {10.1016/J.CLSR.2006.01.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Radcliffe06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rasdale06, author = {Mark Rasdale}, title = {Legislating for robots {\&} zombies}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {222--227}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.008}, doi = {10.1016/J.CLSR.2006.03.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rasdale06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rogers06, author = {Kevin M. Rogers}, title = {Viagra, viruses and virgins: {A} pan-Atlantic comparative analysis on the vanquishing of spam}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {228--240}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.006}, doi = {10.1016/J.CLSR.2006.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rogers06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sampson06, author = {Stephen Sampson}, title = {Streaming of live television broadcasts over the Internet found to infringe copyright}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {413--415}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.003}, doi = {10.1016/J.CLSR.2006.07.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sampson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06, author = {Stephen Saxby}, title = {eGovernment is dead: Long live transformation}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {1--2}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.002}, doi = {10.1016/J.CLSR.2005.12.002}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06a, author = {Stephen Saxby}, title = {Government feels the pressure on identity cards}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {103--104}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.013}, doi = {10.1016/J.CLSR.2006.01.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06b, author = {Stephen Saxby}, title = {Court of Appeal increases {UK} consumer protection for overseas credit purchases}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {181--182}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.005}, doi = {10.1016/J.CLSR.2006.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06c, author = {Stephen Saxby}, title = {{OECD} reports on growing importance of public sector information to the knowledge economy}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {259--260}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.001}, doi = {10.1016/J.CLSR.2006.05.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06d, author = {Stephen Saxby}, title = {\emph{Book review}: Communications and Multimedia Security, David Chadwick, Bart Preneel (Eds.) (2005), {(287} pp., Hard-cover, {\textsterling}88.50, {\textdollar}149.00), {ISBN:} 0 387 24485 9}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {338}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.004}, doi = {10.1016/J.CLSR.2005.12.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06e, author = {Stephen Saxby}, title = {\emph{Book review}: Trade Marks in the Digital Age, Timothy Lee Wherry, The Scarecrow Press, Inc. (2004), {(90} pp., Soft-cover, {\textsterling}18.95), {ISBN:} 0 8108 4975 5}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {338}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.005}, doi = {10.1016/J.CLSR.2005.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06f, author = {Stephen Saxby}, title = {\emph{Book review}: {IT} and e-commerce statutes - Blackstone's Statutes on {IT} and E-commerce, Steve Hedley, Tanya Aplin, second ed., Oxford University Press (2004), {(434} pp., Soft-cover, {\textsterling}16.99), {ISBN:} 0 19 927303 0}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {338}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.006}, doi = {10.1016/J.CLSR.2005.12.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06g, author = {Stephen Saxby}, title = {\emph{Book review}: Computer Security in the 21st Century, {D.T.} Lee, {S.P.} Shieh, {J.D.} Tygar (Eds.) (2005), {(268} pp., Hard-cover, {\textsterling}71.50; {\textdollar}129.00), {ISBN:} 0 387 24005 5}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {338--339}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.007}, doi = {10.1016/J.CLSR.2005.12.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06h, author = {Stephen Saxby}, title = {{CLSR} welcomes new Report Correspondents}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {341--342}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.007}, doi = {10.1016/J.CLSR.2006.07.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06i, author = {Stephen Saxby}, title = {\emph{Book review}: Information management - Stephan Kudyba, Managing Data Mining - Advice from Experts, Cybertech Publishing (2004), {(260} pp., Soft-cover, {\textsterling}19.50), {ISBN:} 1 59140 243 3}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {421}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.008}, doi = {10.1016/J.CLSR.2005.12.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06j, author = {Stephen Saxby}, title = {\emph{Book review}: Human Rights in the Digital Age, Mathias Klang, Andrew Murray (Eds.), Glasshouse Press (2005), {(243} pp., Soft-cover, {\textsterling}25.00), {ISBN:} 1 90438 531 1}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {421}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.009}, doi = {10.1016/J.CLSR.2005.12.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06k, author = {Stephen Saxby}, title = {\emph{Book review}: The {TRIPS} Agreement - Drafting History and Analysis, second ed., Daniel Gervais, Thomson-Sweet {\&} Maxwell (2003), {(580} pp., Hard-cover, {\textsterling}178.00), {ISBN:} 0 421 789 107}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {421--422}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.010}, doi = {10.1016/J.CLSR.2005.12.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06l, author = {Stephen Saxby}, title = {Privacy protection is battling to keep pace with technology}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {423--424}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.10.001}, doi = {10.1016/J.CLSR.2006.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06m, author = {Stephen Saxby}, title = {\emph{Book review}: Intellectual Property: Copyright, limitations and the three-step test - an analysis of the three-step test in international and {EC} copyright law, Martin Senftleben, Kluwer Law International (2004), 340 pp. Hard-cover, {\textsterling}67, Euro 95, {\textdollar}107, {ISBN:} 90 411 2267 2}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {499}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.04.005}, doi = {10.1016/J.CLSR.2005.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby06n, author = {Stephen Saxby}, title = {\emph{Book review}: {EU} Electronic Communications Law - Competition and Regulation in the European Telecommunications Market, Paul Nihoul, Peter Rodford, Oxford University Press (2004), {(802} pp., Hard-cover, {\textsterling}125), {ISBN:} 0 19 926340 {X}}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {6}, pages = {499}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.12.001}, doi = {10.1016/J.CLSR.2005.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby06n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Taylor06, author = {Mark Taylor}, title = {The {EU} Data Retention Directive}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {309--312}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.005}, doi = {10.1016/J.CLSR.2006.05.005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Taylor06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ter06, author = {Kah Leng Ter}, title = {Legal effects of input errors in eContracting}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {157--164}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.11.003}, doi = {10.1016/J.CLSR.2005.11.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ter06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ter06a, author = {Kah Leng Ter}, title = {Singapore's multi-pronged strategy against spam}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {402--408}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.006}, doi = {10.1016/J.CLSR.2006.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ter06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Watts06, author = {Mark Watts}, title = {Information, data and personal data - Reflections on \emph{Durant v. Financial Services Authority}}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {4}, pages = {320--325}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.05.002}, doi = {10.1016/J.CLSR.2006.05.002}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Watts06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/WestwellADH06, author = {Jonathan Westwell and Miriam Andrews and Sara Dethridge and Clare Horvath}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} and telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {117--121}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.011}, doi = {10.1016/J.CLSR.2006.01.011}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/WestwellADH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/WestwellALC06, author = {Jonathan Westwell and Miriam Andrews and Greg Lovell and Edyth Cormack}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} {\&} telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {196--200}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.04.002}, doi = {10.1016/J.CLSR.2006.04.002}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/WestwellALC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/WestwellAMM06, author = {Jonathan Westwell and Miriam Andrews and John McLean and Katrina Mitchell}, title = {Baker {\&} McKenzie's annual review of developments in {EU} law relating to IP, {IT} and telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {20--25}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.11.008}, doi = {10.1016/J.CLSR.2005.11.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/WestwellAMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/WestwellAMPS06, author = {Jonathan Westwell and Miriam Andrews and Tabeebah Malik and Julia Pearce and Chris Saunderson}, title = {Baker {\&} McKenzie's regular article tracking developments in {EU} law relating to IP, {IT} and telecommunications}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {359--364}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.010}, doi = {10.1016/J.CLSR.2006.07.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/WestwellAMPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wilson06, author = {C. Wilson}, title = {\emph{Book review}: Law of copyright: Kevin Garnett, Gillian Davies, Gwilym Harbottle, (senior Eds) , Copinger and Skone James on Copyright 15th ed., vols. 1/2, Sweet {\&} Maxwell (2005), pp. 1850/1181, Hard-cover, {\textsterling}335.00, {ISBN:} 0421 876 506}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {1}, pages = {78}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2005.10.003}, doi = {10.1016/J.CLSR.2005.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wilson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wilson06a, author = {C. Wilson}, title = {\emph{Book review}: Freedom of information- Marcus Turle, Freedom of Information Manual, first ed. Sweet {\&} Maxwell, 2005, {ISBN} 0421 922 400, {(493} pp., Hard-cover {\textsterling}95.00)}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {3}, pages = {257}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.03.009}, doi = {10.1016/J.CLSR.2006.03.009}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wilson06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wilson06b, author = {C. Wilson}, title = {\emph{Book review}: Freedom of Information Handbook, Peter Carey, Marcus Turle (Eds.), Law Society (2006), pp. 320, Soft-cover {\textsterling}69.95, {ISBN:} 1 85328 968 {X}}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {422}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.04.004}, doi = {10.1016/J.CLSR.2006.04.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wilson06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Woloch06, author = {Bill Woloch}, title = {New dynamic threats requires new thinking - "Moving beyond compliance"}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {2}, pages = {150--156}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.01.008}, doi = {10.1016/J.CLSR.2006.01.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Woloch06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/WooL06, author = {Monique Woo and Vivian Lui}, title = {Hong Kong releases Copyright (Amendment) Bill 2006}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {418--420}, year = {2006}, url = {https://doi.org/10.1016/j.clsr.2006.07.001}, doi = {10.1016/J.CLSR.2006.07.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/WooL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Adrian06, title = {{RETRACTED:} The Pirate Bay deep-sixed}, journal = {Comput. Law Secur. Rev.}, volume = {22}, number = {5}, pages = {392--401}, year = {2006}, note = {Withdrawn.}, url = {https://doi.org/10.1016/j.clsr.2006.07.009}, doi = {10.1016/J.CLSR.2006.07.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Adrian06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.