Search dblp for Publications

export results for "toc:db/journals/clsr/clsr1.bht:"

 download as .bib file

@article{DBLP:journals/clsr/000286,
  author       = {David Bainbridge},
  title        = {The copyright (computer software) amendment act 1985},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {4--5},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90003-8},
  doi          = {10.1016/0267-3649(86)90003-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000286.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/000286a,
  author       = {David Bainbridge},
  title        = {Part {II} of David Bainbridge's study of the copyright (computer software)
                  amendment act 1985},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {10--11},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90024-5},
  doi          = {10.1016/0267-3649(86)90024-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/000286a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Christian86c,
  author       = {Charles Christian},
  title        = {It's mine - no it isn't... the problem of the employee's right to
                  the software he - or she - writes},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {2--4},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90002-6},
  doi          = {10.1016/0267-3649(86)90002-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Christian86c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies86d,
  author       = {David Davies},
  title        = {The Wigglesworth press conference: Much {ADO} about nothing},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {7--8},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90005-1},
  doi          = {10.1016/0267-3649(86)90005-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies86d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies86e,
  author       = {David Davies},
  title        = {Data protection corner},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {9--11},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90007-5},
  doi          = {10.1016/0267-3649(86)90007-5},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies86e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies86f,
  author       = {David Davies},
  title        = {It won't happen to us},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {11--12},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90008-7},
  doi          = {10.1016/0267-3649(86)90008-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies86f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies86g,
  author       = {David Davies},
  title        = {Special report on {ATM} fraud down under},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {19--24},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90014-2},
  doi          = {10.1016/0267-3649(86)90014-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies86g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies86h,
  author       = {David Davies},
  title        = {Computer insurance: - Its contribution to risk management},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {13--15},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90026-9},
  doi          = {10.1016/0267-3649(86)90026-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies86h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies86i,
  author       = {David Davies},
  title        = {Conference report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {22},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90029-4},
  doi          = {10.1016/0267-3649(86)90029-4},
  timestamp    = {Wed, 14 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies86i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Edwards86a,
  author       = {Martin Edwards},
  title        = {Computer contracts and consumer law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {4--6},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90020-8},
  doi          = {10.1016/0267-3649(86)90020-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Edwards86a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves86c,
  author       = {David W. Greaves},
  title        = {Product liability - The {E.E.C.} directive},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {6--7},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90021-X},
  doi          = {10.1016/0267-3649(86)90021-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves86c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves86d,
  author       = {David W. Greaves},
  title        = {Maintenance contracts - The insurance 'claims'},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {27},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90032-4},
  doi          = {10.1016/0267-3649(86)90032-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves86d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Kutten86a,
  author       = {L. J. Kutten},
  title        = {Computer abuse: The literature grows},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {18--22},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90028-2},
  doi          = {10.1016/0267-3649(86)90028-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Kutten86a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lyimo86,
  author       = {Theo Lyimo},
  title        = {Report on customs treatment of computer software},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {6--7},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90004-X},
  doi          = {10.1016/0267-3649(86)90004-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lyimo86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Lyimo86a,
  author       = {Theo Lyimo},
  title        = {Part {III} - The {GATT} software decision},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {11--13},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90025-7},
  doi          = {10.1016/0267-3649(86)90025-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Lyimo86a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Pinder86,
  author       = {Brian Pinder},
  title        = {Contingency planning},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {14--17},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90011-7},
  doi          = {10.1016/0267-3649(86)90011-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Pinder86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Railton86c,
  author       = {John Railton},
  title        = {Banking and finance},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {17--18},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90012-9},
  doi          = {10.1016/0267-3649(86)90012-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Railton86c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Reed86,
  author       = {Alan Reed},
  title        = {{COMPSEC} 85},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {14},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90010-5},
  doi          = {10.1016/0267-3649(86)90010-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Reed86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sambridge86a,
  author       = {Edward Sambridge},
  title        = {The hire and maintenance of computers},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {8--9},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90006-3},
  doi          = {10.1016/0267-3649(86)90006-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sambridge86a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sambridge86b,
  author       = {Edward Sambridge},
  title        = {Model software licences},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {9--10},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90023-3},
  doi          = {10.1016/0267-3649(86)90023-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sambridge86b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Schulkins86,
  author       = {Andrew Schulkins},
  title        = {Cellular radio},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {18--19},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90013-0},
  doi          = {10.1016/0267-3649(86)90013-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Schulkins86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sutcliffe86a,
  author       = {John Sutcliffe},
  title        = {Data protection: {A} challenge for local government},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {7--8},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90022-1},
  doi          = {10.1016/0267-3649(86)90022-1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sutcliffe86a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wong86,
  author       = {Ken Wong},
  title        = {The risk involved in computerisation what can go wrong},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {5},
  pages        = {12--13},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90009-9},
  doi          = {10.1016/0267-3649(86)90009-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wong86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wong86a,
  author       = {Ken Wong},
  title        = {What does go wrong - The facts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {15--18},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90027-0},
  doi          = {10.1016/0267-3649(86)90027-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wong86a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Wright86,
  author       = {Robert V. Wright},
  title        = {Trading standards in the United Kingdom - Who is responsible},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {6},
  pages        = {2--4},
  year         = {1986},
  url          = {https://doi.org/10.1016/0267-3649(86)90019-1},
  doi          = {10.1016/0267-3649(86)90019-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Wright86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Borking85,
  author       = {John J. Borking},
  title        = {Contract solutions in software protection},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {1},
  pages        = {1--3},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90036-6},
  doi          = {10.1016/0267-3649(85)90036-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Borking85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies85,
  author       = {David Davies},
  title        = {How to recognise the risks and avoid the ten most common mistakes},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {1},
  pages        = {8--10},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90038-X},
  doi          = {10.1016/0267-3649(85)90038-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Davies85a,
  author       = {David Davies},
  title        = {Report on consumer products},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {19--21},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90028-7},
  doi          = {10.1016/0267-3649(85)90028-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Davies85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves85,
  author       = {David W. Greaves},
  title        = {Current awareness},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {23--26},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90031-7},
  doi          = {10.1016/0267-3649(85)90031-7},
  timestamp    = {Wed, 14 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Greaves85a,
  author       = {David W. Greaves},
  title        = {Report on marketing and distributor agreements},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {28--29},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90033-0},
  doi          = {10.1016/0267-3649(85)90033-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Greaves85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Railton85,
  author       = {John Railton},
  title        = {Automated teller machines},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {12},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90023-8},
  doi          = {10.1016/0267-3649(85)90023-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Railton85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Sambridge85,
  author       = {Edward Sambridge},
  title        = {Report on maintenance contracts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {2--3},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90017-2},
  doi          = {10.1016/0267-3649(85)90017-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Sambridge85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Saxby85,
  author       = {Stephen Saxby},
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {3},
  pages        = {1},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90001-9},
  doi          = {10.1016/0267-3649(85)90001-9},
  timestamp    = {Wed, 14 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Saxby85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Watt85,
  author       = {Steve Watt},
  title        = {Review of computer security conference},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {10},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90021-4},
  doi          = {10.1016/0267-3649(85)90021-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Watt85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Yates85,
  author       = {David Yates},
  title        = {Report on data protection and personnel},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {11},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90022-6},
  doi          = {10.1016/0267-3649(85)90022-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Yates85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac85,
  author       = {Bernard P. Zajac Jr.},
  title        = {Report on electronic funds transfer security in {U.S}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {13--14},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90024-X},
  doi          = {10.1016/0267-3649(85)90024-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Zajac85a,
  author       = {Bernard P. Zajac Jr.},
  title        = {News and security update from the {U.S}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {1},
  number       = {4},
  pages        = {26--27},
  year         = {1985},
  url          = {https://doi.org/10.1016/0267-3649(85)90032-9},
  doi          = {10.1016/0267-3649(85)90032-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Zajac85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}