Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr13.bht:"
@article{DBLP:journals/clsr/000297, author = {David Bainbridge}, title = {Intellectual Property, 3rd Edition, David Bainbridge. Pitman Publishing (1996), 572, 0273 622 79X {\textsterling}27.99 soft-cover}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {45}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81194-6}, doi = {10.1016/S0267-3649(97)81194-6}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/000297a, author = {David Bainbridge}, title = {Law report - {I:} Cannot employees also be hackers?}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {352--354}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80180-X}, doi = {10.1016/S0267-3649(97)80180-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000297a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/000397, author = {Michael D. Scott}, title = {Liability in cyberspace - {III:} Creating a corporate internet acceptable use policy}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {451--453}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89801-9}, doi = {10.1016/S0267-3649(97)89801-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000397.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Baum97, author = {Michael S. Baum}, title = {Secure electronic commerce - {II:} The {ABA} digital signature guidelines}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {457--458}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89803-2}, doi = {10.1016/S0267-3649(97)89803-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Baum97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Beutler97, author = {Stephan Beutler}, title = {The protection of multimedia products under international copyright law}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {253--260}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88855-3}, doi = {10.1016/S0267-3649(97)88855-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Beutler97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Beutler97a, author = {Stephan Beutler}, title = {Multimedia law: The protection of multimedia products under international copyright law - Part {II}}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {319--324}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80170-7}, doi = {10.1016/S0267-3649(97)80170-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Beutler97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bigelow97, author = {Robert P. Bigelow}, title = {A report from the United States - part {II}}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {87--95}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89742-7}, doi = {10.1016/S0267-3649(97)89742-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bigelow97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Birch97, author = {Dave Birch}, title = {Secure electronic commerce - {I:} The certificate business public key infrastructure will be big business}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {454--456}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89802-0}, doi = {10.1016/S0267-3649(97)89802-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Birch97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bond97, author = {Robert T. J. Bond}, title = {European union directive on the legal protection of databases}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {401--412}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89787-7}, doi = {10.1016/S0267-3649(97)89787-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bond97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Brinson97, author = {J. Dianne Brinson}, title = {Multimedia Law and Business Handbook, J. Dianne Brinson, Mark F. Radcliffe. Ladera Press, {NY} (1996), 468, {ISBN} 096 391 7323 {US} {\textdollar}44.95}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {28}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81189-2}, doi = {10.1016/S0267-3649(97)81189-2}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Brinson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bull97, author = {Gillian Bull}, title = {Market data rights bingo}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {75--86}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89740-3}, doi = {10.1016/S0267-3649(97)89740-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bull97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Bull97a, author = {Gillian Bull}, title = {Conference review: Cyberl@W, {IBC} {UK} conferences limited, Monday 23 June 1997, Strand Palace Hotel, London}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {381--382}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80184-7}, doi = {10.1016/S0267-3649(97)80184-7}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/clsr/Bull97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Chalton97, author = {Simon Chalton}, title = {Data protection: Data protection: The government's legislative proposals}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {425--428}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89792-0}, doi = {10.1016/S0267-3649(97)89792-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Chalton97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Charlesworth97, author = {Andrew Charlesworth}, title = {Law report - {I:} Glencore international {A.G.} and another v bank of China {[1996]} 1 Lloyd's law reports 135. {(CA)} decision of 8 november 1995}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {120--122}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89750-6}, doi = {10.1016/S0267-3649(97)89750-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Charlesworth97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Daranyi97, author = {Alexander de Daranyi}, title = {Software law - Switzerland: An introduction to software protection under swiss law}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {340--343}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80175-6}, doi = {10.1016/S0267-3649(97)80175-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Daranyi97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies97, author = {Helena Davies}, title = {Business transfers and outsourcing: The S{\"{u}}zen and Betts cases}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {272--273}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88861-9}, doi = {10.1016/S0267-3649(97)88861-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies97a, author = {Simon Davies}, title = {Privacy law - Australia: The Australian federal government has abandoned its election promise to enact privacy legislation for business}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {429--430}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89793-2}, doi = {10.1016/S0267-3649(97)89793-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/DaviesH97, author = {David Davies and Aon Bain Hogg}, title = {Risk management: Holistic risk management}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {336--339}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80174-4}, doi = {10.1016/S0267-3649(97)80174-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/DaviesH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Digby97, author = {Stephen Digby}, title = {{EURIM} report: {EURIM} - European informatics market - The next phase}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {349--351}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80178-1}, doi = {10.1016/S0267-3649(97)80178-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Digby97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Durie97, author = {Robyn Durie}, title = {The internet, trademarks and domain names}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {29--33}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81190-9}, doi = {10.1016/S0267-3649(97)81190-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Durie97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Endeshaw97, author = {Assafa Endeshaw}, title = {Commercial law: Assimilating software to 'goods' by analogy}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {325--330}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80171-9}, doi = {10.1016/S0267-3649(97)80171-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Endeshaw97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Flint97, author = {David Flint}, title = {Internet domain names: Proposal for a cybermark}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {163--166}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86892-6}, doi = {10.1016/S0267-3649(97)86892-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Flint97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Glickson97, author = {Scott Glickson}, title = {Commerce in cyberspace - {II:} Point, click, and buy: Contracting for online products and services}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {436--441}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89795-6}, doi = {10.1016/S0267-3649(97)89795-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Glickson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Godfrey-Faussett97, author = {Matthew Godfrey{-}Faussett}, title = {Outsourcing: Telecommunications outsourcing - {A} legal perspective}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {176--181}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86896-3}, doi = {10.1016/S0267-3649(97)86896-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Godfrey-Faussett97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hart97, author = {Robert J. Hart}, title = {The case for patent protection for computer program-related inventions}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {247--252}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88854-1}, doi = {10.1016/S0267-3649(97)88854-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hart97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Hof97, author = {Simone van der Hof}, title = {First results of The Dutch National Programme on Information Technology and Law}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {42--45}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81193-4}, doi = {10.1016/S0267-3649(97)81193-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Hof97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/HorrocksB97, author = {Andrew Horrocks and Kit Burden}, title = {Domain names: Domain names - Fighting for identity}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {303--306}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80166-5}, doi = {10.1016/S0267-3649(97)80166-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/HorrocksB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Jenkins97, author = {Glenn P. Jenkins}, title = {Information Technology and Innovation in Tax Administration, Glenn P. Jenkins (Ed.). Kluwer Law International (1996), 213, {NLG} 125.00/US {\textdollar}84.00/{\textsterling}56.00, {ISBN:} 90 411 09668}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {72}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81200-9}, doi = {10.1016/S0267-3649(97)81200-9}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Jenkins97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Judah97, author = {David Judah}, title = {Liability in cyberspace - {I:} Defamation in cyberspace}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {442--446}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89798-1}, doi = {10.1016/S0267-3649(97)89798-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Judah97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kirby97, author = {Justice Michael Kirby}, title = {Cryptography policy: {OECD} cryptography guidelines in context}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {182--186}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86898-7}, doi = {10.1016/S0267-3649(97)86898-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kirby97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MacDonaldL97, author = {Stuart MacDonald and Bernard Lefang}, title = {Patent information survey: Information for innovation: Surveys of innovating and patenting small firms}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {344--348}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80176-8}, doi = {10.1016/S0267-3649(97)80176-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/MacDonaldL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/MandellSC97, author = {Steve A. Mandell and Edwin Y. Szeto and Eileen P. Cohen}, title = {{US} update: Legal status of safeguarding proprietary information}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {261--265}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88856-5}, doi = {10.1016/S0267-3649(97)88856-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/MandellSC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/McCallough97, author = {Robert McCallough}, title = {St Albans City and district council and International Computers Limited - "St Albans and Beyond"}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {46--48}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81195-8}, doi = {10.1016/S0267-3649(97)81195-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/McCallough97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/McCauley97, author = {James M. McCauley}, title = {Internet regulation - {I:} Legal ethics and the internet: {A} {US} perspective}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {110--114}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89747-6}, doi = {10.1016/S0267-3649(97)89747-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/McCauley97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Newman97, author = {Simon Newman}, title = {Rights, freedoms and phonograms: Moral rights and adaptation rights in music and other copyright works}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {22--28}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81188-0}, doi = {10.1016/S0267-3649(97)81188-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Newman97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Newman97a, author = {Simon Newman}, title = {Intellectual property law: Part {II} - The moral right of the author: The view from France, Germany and the United Kingdom}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {96--101}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89743-9}, doi = {10.1016/S0267-3649(97)89743-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Newman97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Norton97, author = {Joseph Norton}, title = {Cross-Border Electronic Banking - Challenges and Opportunities, Joseph Norton, Chris Reed, Ian Walden (Eds.). Lloyds of London Press (1995), 303, 185044 8485}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {41}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81192-2}, doi = {10.1016/S0267-3649(97)81192-2}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Norton97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Orlowski97, author = {Steve Orlowski}, title = {{OECD} cryptography policy guidelines}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {276--278}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88864-4}, doi = {10.1016/S0267-3649(97)88864-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Orlowski97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Peters97, author = {Lena Peters}, title = {The future Unidroit database on uniform law}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {34--41}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81191-0}, doi = {10.1016/S0267-3649(97)81191-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Peters97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Powell97, author = {Mark D. Powell}, title = {Technology transfer: The european commission's technology transfer regulation}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {126--131}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89755-5}, doi = {10.1016/S0267-3649(97)89755-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Powell97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Reed97, author = {Chris Reed}, title = {Copyright in {WWW} pages: News from Shetland copyright in links to World Wide Web pages}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {167--175}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86894-X}, doi = {10.1016/S0267-3649(97)86894-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Reed97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rees97, author = {Christopher Rees}, title = {Computer Evidence: {A} Forensic Investigations Handbook by Edward Wilding Published by Sweet {\&} Maxwell}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {219}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86943-9}, doi = {10.1016/S0267-3649(97)86943-9}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rees97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rosenblatt97, author = {Heather Rosenblatt}, title = {Protocol to the berne convention: The wipo diplomatic conference - the birth of two new treaties}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {307--311}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80168-9}, doi = {10.1016/S0267-3649(97)80168-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rosenblatt97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rowe97, author = {Heather Rowe}, title = {British telecom's operating licence - The new fair trading condition}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {274--275}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88863-2}, doi = {10.1016/S0267-3649(97)88863-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rowe97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rowe97a, author = {Heather Rowe}, title = {The report by the centre for the study of financial innovation {(CSFI)} on "the internet {\&} financial services"}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {383--386}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80186-0}, doi = {10.1016/S0267-3649(97)80186-0}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rowe97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rowe97b, author = {Heather Rowe}, title = {The laws of the internet by Clive Gringras of Nabarro Nathanson}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {387}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80187-2}, doi = {10.1016/S0267-3649(97)80187-2}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rowe97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Rowe97c, author = {Heather Rowe}, title = {It issues in monetary union: European monetary union - so why is it a technology issue?}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {391--397}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89784-1}, doi = {10.1016/S0267-3649(97)89784-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Rowe97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby97, author = {Stephen Saxby}, title = {The times they are A-changing}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {2}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81185-5}, doi = {10.1016/S0267-3649(97)81185-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby97a, author = {Stephen Saxby}, title = {Measured progress in geneva}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {74}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89739-7}, doi = {10.1016/S0267-3649(97)89739-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby97b, author = {Stephen Saxby}, title = {Electronic commerce a step closer following adoption of {OECD} cryptography guidelines}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {150}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86887-2}, doi = {10.1016/S0267-3649(97)86887-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby97c, author = {Stephen Saxby}, title = {Computer misuse act questioned again}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {222}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88850-4}, doi = {10.1016/S0267-3649(97)88850-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby97d, author = {Stephen Saxby}, title = {Editorial}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {302}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80165-3}, doi = {10.1016/S0267-3649(97)80165-3}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby97d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby97e, author = {Stephen Saxby}, title = {Editorial}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {390}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89783-X}, doi = {10.1016/S0267-3649(97)89783-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby97e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Seddon97, author = {Clive Seddon}, title = {{IT} project management: Partnering {IT} projects}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {102--109}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89745-2}, doi = {10.1016/S0267-3649(97)89745-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Seddon97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sieber97, author = {Ulrich Sieber}, title = {Criminal liability for the transfer of data in international networks - new challenges for the internet - part {I}}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {151--157}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86888-4}, doi = {10.1016/S0267-3649(97)86888-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sieber97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sieber97a, author = {Ulrich Sieber}, title = {Criminal liability for the transfer of data in international networks - New challenges for the internet - Part {II:} Precedents}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {223--233}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88851-6}, doi = {10.1016/S0267-3649(97)88851-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sieber97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sieber97b, author = {Ulrich Sieber}, title = {Internet law: Criminal liability for the transfer of data in international networks - New challenges for the internet - Part {III:} Precedents}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {312--318}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80169-0}, doi = {10.1016/S0267-3649(97)80169-0}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sieber97b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sieber97c, author = {Ulrich Sieber}, title = {Internet law: Criminal liability for the transfer of data in international networks - new challenges for the internet - part {IV:} Precedents}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {413--418}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89789-0}, doi = {10.1016/S0267-3649(97)89789-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sieber97c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Silverman97, author = {Jared Silverman}, title = {Liability in cyberspace - {II:} Disclosure and securities fraud on the internet}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {447--450}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89799-3}, doi = {10.1016/S0267-3649(97)89799-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Silverman97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sinclair97, author = {Michael Sinclair}, title = {{IT} management: Providing for information technology on sale of a business}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {331--335}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80173-2}, doi = {10.1016/S0267-3649(97)80173-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sinclair97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Small97, author = {Harry Small}, title = {Commerce in cyberspace - {I:} Marketing on the internet}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {6}, pages = {431--435}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89794-4}, doi = {10.1016/S0267-3649(97)89794-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Small97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Stone97, author = {Peter Stone}, title = {Lessons from America: Filtration of functionality from software copyright}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {15--21}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81187-9}, doi = {10.1016/S0267-3649(97)81187-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Stone97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Taylor97, author = {Mark Taylor}, title = {Law report- {II:} Pitman training ltd and ptc oxford ltd v nominet uk and pearson professional ltd}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {5}, pages = {355--356}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)80182-3}, doi = {10.1016/S0267-3649(97)80182-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Taylor97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ter97, author = {Kah Leng Ter}, title = {Internet regulation {II:} Internet regulation in singapore}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {115--119}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89749-X}, doi = {10.1016/S0267-3649(97)89749-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ter97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/TerwangneL97, author = {C{\'{e}}cile de Terwangne and Sophie Louveaux}, title = {Data protection and online networks}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {234--246}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88853-X}, doi = {10.1016/S0267-3649(97)88853-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/TerwangneL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Vassilaki97, author = {Irini E. Vassilaki}, title = {Multimedia crime: Multimedia crime - Emergence, phenomena and legal questions of "metacomputer crime"}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {158--162}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86889-6}, doi = {10.1016/S0267-3649(97)86889-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Vassilaki97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/VerheulKT97, author = {Eric R. Verheul and Bert{-}Jaap Koops and Henk van Tilborg}, title = {Binding cryptography - {A} fraud-detectible alternative to Key-Escrow proposals}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {1}, pages = {3--14}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)81186-7}, doi = {10.1016/S0267-3649(97)81186-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/VerheulKT97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Ward97, author = {Conor Ward}, title = {Law report - {II:} Online newspaper's hypertext links to rival prohibited}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {123}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89752-X}, doi = {10.1016/S0267-3649(97)89752-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Ward97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wilson97, author = {Jackie Wilson}, title = {Electronic document management: Electronic documents}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {2}, pages = {124--125}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)89753-1}, doi = {10.1016/S0267-3649(97)89753-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wilson97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wilson97a, author = {Jackie Wilson}, title = {In the matter of application no 9204959.2 by Fujitsu Ltd}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {269--271}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88858-9}, doi = {10.1016/S0267-3649(97)88858-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wilson97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wiseman97, author = {David Wiseman}, title = {Conference review: Legal aspects of global communications}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {3}, pages = {197--200}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)86901-4}, doi = {10.1016/S0267-3649(97)86901-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wiseman97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wright97, author = {Benjamin Wright}, title = {Electronic commerce legislation - Frequently asked questions}, journal = {Comput. Law Secur. Rev.}, volume = {13}, number = {4}, pages = {266--268}, year = {1997}, url = {https://doi.org/10.1016/S0267-3649(97)88857-7}, doi = {10.1016/S0267-3649(97)88857-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wright97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.