![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr1.bht:"
@article{DBLP:journals/clsr/000286, author = {David Bainbridge}, title = {The copyright (computer software) amendment act 1985}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {4--5}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90003-8}, doi = {10.1016/0267-3649(86)90003-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000286.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/000286a, author = {David Bainbridge}, title = {Part {II} of David Bainbridge's study of the copyright (computer software) amendment act 1985}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {10--11}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90024-5}, doi = {10.1016/0267-3649(86)90024-5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/000286a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Christian86c, author = {Charles Christian}, title = {It's mine - no it isn't... the problem of the employee's right to the software he - or she - writes}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {2--4}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90002-6}, doi = {10.1016/0267-3649(86)90002-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Christian86c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies86d, author = {David Davies}, title = {The Wigglesworth press conference: Much {ADO} about nothing}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {7--8}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90005-1}, doi = {10.1016/0267-3649(86)90005-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies86d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies86e, author = {David Davies}, title = {Data protection corner}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {9--11}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90007-5}, doi = {10.1016/0267-3649(86)90007-5}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies86e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies86f, author = {David Davies}, title = {It won't happen to us}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {11--12}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90008-7}, doi = {10.1016/0267-3649(86)90008-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies86f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies86g, author = {David Davies}, title = {Special report on {ATM} fraud down under}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {19--24}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90014-2}, doi = {10.1016/0267-3649(86)90014-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies86g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies86h, author = {David Davies}, title = {Computer insurance: - Its contribution to risk management}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {13--15}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90026-9}, doi = {10.1016/0267-3649(86)90026-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies86h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies86i, author = {David Davies}, title = {Conference report}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {22}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90029-4}, doi = {10.1016/0267-3649(86)90029-4}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies86i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Edwards86a, author = {Martin Edwards}, title = {Computer contracts and consumer law}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {4--6}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90020-8}, doi = {10.1016/0267-3649(86)90020-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Edwards86a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves86c, author = {David W. Greaves}, title = {Product liability - The {E.E.C.} directive}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {6--7}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90021-X}, doi = {10.1016/0267-3649(86)90021-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves86c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves86d, author = {David W. Greaves}, title = {Maintenance contracts - The insurance 'claims'}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {27}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90032-4}, doi = {10.1016/0267-3649(86)90032-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves86d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Kutten86a, author = {L. J. Kutten}, title = {Computer abuse: The literature grows}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {18--22}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90028-2}, doi = {10.1016/0267-3649(86)90028-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Kutten86a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lyimo86, author = {Theo Lyimo}, title = {Report on customs treatment of computer software}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {6--7}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90004-X}, doi = {10.1016/0267-3649(86)90004-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lyimo86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Lyimo86a, author = {Theo Lyimo}, title = {Part {III} - The {GATT} software decision}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {11--13}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90025-7}, doi = {10.1016/0267-3649(86)90025-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Lyimo86a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Pinder86, author = {Brian Pinder}, title = {Contingency planning}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {14--17}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90011-7}, doi = {10.1016/0267-3649(86)90011-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Pinder86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Railton86c, author = {John Railton}, title = {Banking and finance}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {17--18}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90012-9}, doi = {10.1016/0267-3649(86)90012-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Railton86c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Reed86, author = {Alan Reed}, title = {{COMPSEC} 85}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {14}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90010-5}, doi = {10.1016/0267-3649(86)90010-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Reed86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sambridge86a, author = {Edward Sambridge}, title = {The hire and maintenance of computers}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {8--9}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90006-3}, doi = {10.1016/0267-3649(86)90006-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sambridge86a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sambridge86b, author = {Edward Sambridge}, title = {Model software licences}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {9--10}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90023-3}, doi = {10.1016/0267-3649(86)90023-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sambridge86b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Schulkins86, author = {Andrew Schulkins}, title = {Cellular radio}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {18--19}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90013-0}, doi = {10.1016/0267-3649(86)90013-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Schulkins86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sutcliffe86a, author = {John Sutcliffe}, title = {Data protection: {A} challenge for local government}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {7--8}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90022-1}, doi = {10.1016/0267-3649(86)90022-1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sutcliffe86a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wong86, author = {Ken Wong}, title = {The risk involved in computerisation what can go wrong}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {5}, pages = {12--13}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90009-9}, doi = {10.1016/0267-3649(86)90009-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wong86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wong86a, author = {Ken Wong}, title = {What does go wrong - The facts}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {15--18}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90027-0}, doi = {10.1016/0267-3649(86)90027-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wong86a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Wright86, author = {Robert V. Wright}, title = {Trading standards in the United Kingdom - Who is responsible}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {6}, pages = {2--4}, year = {1986}, url = {https://doi.org/10.1016/0267-3649(86)90019-1}, doi = {10.1016/0267-3649(86)90019-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Wright86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Borking85, author = {John J. Borking}, title = {Contract solutions in software protection}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {1}, pages = {1--3}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90036-6}, doi = {10.1016/0267-3649(85)90036-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Borking85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies85, author = {David Davies}, title = {How to recognise the risks and avoid the ten most common mistakes}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {1}, pages = {8--10}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90038-X}, doi = {10.1016/0267-3649(85)90038-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Davies85a, author = {David Davies}, title = {Report on consumer products}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {19--21}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90028-7}, doi = {10.1016/0267-3649(85)90028-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Davies85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves85, author = {David W. Greaves}, title = {Current awareness}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {23--26}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90031-7}, doi = {10.1016/0267-3649(85)90031-7}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Greaves85a, author = {David W. Greaves}, title = {Report on marketing and distributor agreements}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {28--29}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90033-0}, doi = {10.1016/0267-3649(85)90033-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Greaves85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Railton85, author = {John Railton}, title = {Automated teller machines}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {12}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90023-8}, doi = {10.1016/0267-3649(85)90023-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Railton85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Sambridge85, author = {Edward Sambridge}, title = {Report on maintenance contracts}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {2--3}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90017-2}, doi = {10.1016/0267-3649(85)90017-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Sambridge85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Saxby85, author = {Stephen Saxby}, title = {Editorial}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {3}, pages = {1}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90001-9}, doi = {10.1016/0267-3649(85)90001-9}, timestamp = {Wed, 14 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Saxby85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Watt85, author = {Steve Watt}, title = {Review of computer security conference}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {10}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90021-4}, doi = {10.1016/0267-3649(85)90021-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Watt85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Yates85, author = {David Yates}, title = {Report on data protection and personnel}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {11}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90022-6}, doi = {10.1016/0267-3649(85)90022-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Yates85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac85, author = {Bernard P. Zajac Jr.}, title = {Report on electronic funds transfer security in {U.S}}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {13--14}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90024-X}, doi = {10.1016/0267-3649(85)90024-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Zajac85a, author = {Bernard P. Zajac Jr.}, title = {News and security update from the {U.S}}, journal = {Comput. Law Secur. Rev.}, volume = {1}, number = {4}, pages = {26--27}, year = {1985}, url = {https://doi.org/10.1016/0267-3649(85)90032-9}, doi = {10.1016/0267-3649(85)90032-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Zajac85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.