- Harry Small:
Commerce in cyberspace - I: Marketing on the internet. Comput. Law Secur. Rev. 13(6): 431-435 (1997) - Peter Stone:
Lessons from America: Filtration of functionality from software copyright. Comput. Law Secur. Rev. 13(1): 15-21 (1997) - Mark Taylor:
Law report- II: Pitman training ltd and ptc oxford ltd v nominet uk and pearson professional ltd. Comput. Law Secur. Rev. 13(5): 355-356 (1997) - Kah Leng Ter:
Internet regulation II: Internet regulation in singapore. Comput. Law Secur. Rev. 13(2): 115-119 (1997) - Cécile de Terwangne, Sophie Louveaux:
Data protection and online networks. Comput. Law Secur. Rev. 13(4): 234-246 (1997) - Irini E. Vassilaki:
Multimedia crime: Multimedia crime - Emergence, phenomena and legal questions of "metacomputer crime". Comput. Law Secur. Rev. 13(3): 158-162 (1997) - Eric R. Verheul, Bert-Jaap Koops, Henk van Tilborg:
Binding cryptography - A fraud-detectible alternative to Key-Escrow proposals. Comput. Law Secur. Rev. 13(1): 3-14 (1997) - Conor Ward:
Law report - II: Online newspaper's hypertext links to rival prohibited. Comput. Law Secur. Rev. 13(2): 123 (1997) - Jackie Wilson:
Electronic document management: Electronic documents. Comput. Law Secur. Rev. 13(2): 124-125 (1997) - Jackie Wilson:
In the matter of application no 9204959.2 by Fujitsu Ltd. Comput. Law Secur. Rev. 13(4): 269-271 (1997) - David Wiseman:
Conference review: Legal aspects of global communications. Comput. Law Secur. Rev. 13(3): 197-200 (1997) - Benjamin Wright:
Electronic commerce legislation - Frequently asked questions. Comput. Law Secur. Rev. 13(4): 266-268 (1997)