default search action
Search dblp for Publications
export results for "toc:db/journals/clsr/clsr9.bht:"
@article{DBLP:journals/clsr/Bigelow93, author = {Robert P. Bigelow}, title = {Computer security, crime and privacy in {USA} - a status report - part {IV:} Privacy}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {50--57}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90069-Y}, doi = {10.1016/0267-3649(93)90069-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Bigelow93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Einfeld93, author = {Shelley Einfeld}, title = {Importing the genuine article - recent developments in computer software and circuit layouts}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {58--63}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90071-T}, doi = {10.1016/0267-3649(93)90071-T}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Einfeld93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/Nigri93, author = {Deborah Fisch Nigri}, title = {Computer crime: Why should we still care?}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {274--280}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90038-O}, doi = {10.1016/0267-3649(93)90038-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/Nigri93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93, title = {Editorial Board}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {I}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90001-4}, doi = {10.1016/0267-3649(93)90001-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93a, title = {The proposed {EC} database directive - {I:} Sinking the data pirates}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {1}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90002-5}, doi = {10.1016/0267-3649(93)90002-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93aa, title = {International computer crime conference: W{\"{u}}rzburg, Germany 5-7 October, 1992}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {80--83}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90081-W}, doi = {10.1016/0267-3649(93)90081-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ab, title = {World trends in computer law}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {84--86}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90082-X}, doi = {10.1016/0267-3649(93)90082-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ab.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ac, title = {Scott on computer law: 2nd Edition, by Michael {D} Scott (1992), Prentice Hall Law {\&} Business, Two Volumes, Loose-leaf {US} {\textdollar}195, {ISBN} 0 13 799347 1}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {86}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90083-Y}, doi = {10.1016/0267-3649(93)90083-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ad, title = {The Delaware valley disaster recovery information exchange group}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {87--89}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90084-Z}, doi = {10.1016/0267-3649(93)90084-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ae, title = {Current legal protection for computer programs in the republic of Croatia}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {89}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90085-2}, doi = {10.1016/0267-3649(93)90085-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ae.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93af, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {90--96}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90086-3}, doi = {10.1016/0267-3649(93)90086-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93af.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ag, title = {Editorial}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {97}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90049-S}, doi = {10.1016/0267-3649(93)90049-S}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ag.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ah, title = {Recent American case law on copyright in computer programs}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {98--104}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90050-W}, doi = {10.1016/0267-3649(93)90050-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ah.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ai, title = {John Richardson computers Ltd v Flanders and Chemtec Ltd}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {105--112}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90051-N}, doi = {10.1016/0267-3649(93)90051-N}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ai.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93aj, title = {New exceptions to copyright infringement for computer programs}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {113--119}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90052-O}, doi = {10.1016/0267-3649(93)90052-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93aj.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ak, title = {Combatting the cost of software in Australia}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {120--122}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90053-P}, doi = {10.1016/0267-3649(93)90053-P}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ak.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93al, title = {Computer security}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {122}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90054-Q}, doi = {10.1016/0267-3649(93)90054-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93al.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93am, title = {Finding a balance: Computer software, intellectual property and the challenge of technology}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {123--126}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90055-R}, doi = {10.1016/0267-3649(93)90055-R}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93am.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93an, title = {{ICCP} report no 29 - Telecommunications and broadcasting: Convergence or collision?: (1992), OECD, Paris, Soft-cover, 287 p ({\textsterling}40; {US} {\textdollar}60; {F} 250; {DM} 100), {ISBN} 92 64 13764 5}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {126}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90056-S}, doi = {10.1016/0267-3649(93)90056-S}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93an.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ao, title = {Information networks and new technologies: Opportunities and policy implications for the 1990s: OECD, Paris, 1992, Loose-leaf, 78 p ({\#}10; {US} {\textdollar}19; {F} 70; {DM} 29), {ISBN} 92 64 13768 8}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {126}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90057-T}, doi = {10.1016/0267-3649(93)90057-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ao.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ap, title = {Part {II} - The solutions}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {127--129}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90058-U}, doi = {10.1016/0267-3649(93)90058-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ap.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93aq, title = {Statement of the International Chamber of Commerce}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {130--131}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90059-V}, doi = {10.1016/0267-3649(93)90059-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93aq.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ar, title = {Information security - Dictionary of concepts, standards and terms: by Dennis Longley, Michael Shain and William Caelli, 1992, (Macmillan-Stockton Press), Hard-cover, 620 p, {\textsterling}65.00, {ISBN} 0 333 546 989}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {131}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90060-Z}, doi = {10.1016/0267-3649(93)90060-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ar.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93as, title = {SPAG\({}^{\mbox{1}}\) - The open communications systems catalyst}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {132--133}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90061-Q}, doi = {10.1016/0267-3649(93)90061-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93as.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93at, title = {{CLSR} is pleased to welcome James Fitzsimons to the correspondents panel of the report}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {133}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90062-R}, doi = {10.1016/0267-3649(93)90062-R}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93at.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93au, title = {Centralization and standardization the security risks and opportunities}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {134--136}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90063-S}, doi = {10.1016/0267-3649(93)90063-S}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93au.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93av, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {137--142}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90064-T}, doi = {10.1016/0267-3649(93)90064-T}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93av.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93aw, title = {{IT} security: The need for international co-operation: Edited by Guy Gable and William Caelli, 1992, softcover (North-Holland), 495 p, US{\textdollar}125.50 / dfl.220.00, {ISBN} 0 444 896 996}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {142}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90065-U}, doi = {10.1016/0267-3649(93)90065-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93aw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ax, title = {15th National Computer Security Conference - Security made out of building blocks, Baltimore, {USA}}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {143--144}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90066-V}, doi = {10.1016/0267-3649(93)90066-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ax.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ay, title = {International bank secrecy: General Editor, Dennis Campbell (1992), Hard-cover, Sweet {\&} Maxwell, 767 p, {\textsterling}100.00, {ISBN} 0 421 472 502}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {144}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90067-W}, doi = {10.1016/0267-3649(93)90067-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ay.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93az, title = {{ICCP} reviews of information and communications policies: Finland: 1992, Softcover (OECD), 201 p, FF100, {ISBN} 92-64-03703-9}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {3}, pages = {144}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90068-X}, doi = {10.1016/0267-3649(93)90068-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93az.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93b, title = {Information technology resources utilization and management: Issues and trends: Edited by Mehdi Khosrowpour and Gayle Yaverbaum (1990), idea Group Publishing, Hard-cover, 471 p, ({\textsterling}42.50), {ISBN} 1-878289-00-4}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {2--3}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90003-6}, doi = {10.1016/0267-3649(93)90003-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ba, title = {Editorial}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {145}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90087-4}, doi = {10.1016/0267-3649(93)90087-4}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ba.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bb, title = {Back to the future: The impact of automation on office employment in the next decade {CIRCA} 1960-1970}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {146--148}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90088-5}, doi = {10.1016/0267-3649(93)90088-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bb.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bc, title = {Technology and the challenge for law - {I:} Hard and soft machines}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {149--151}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90089-6}, doi = {10.1016/0267-3649(93)90089-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bd, title = {Technology and the challenge for law: Random thoughts on problems with new technology}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {152--154}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90090-A}, doi = {10.1016/0267-3649(93)90090-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93be, title = {Managing the internal audit - {A} practical handbook, : by Ian Beale and Roy {H} Bradford (1993), Kogan Page, soft-cover, 161 p. {\textsterling}18.95, {ISBN} 0 7494 0892 8}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {154}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90091-Z}, doi = {10.1016/0267-3649(93)90091-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93be.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bf, title = {Technology and the challenge for law - {III:} Computers trusted, and found wanting}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {155--156}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90092-2}, doi = {10.1016/0267-3649(93)90092-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bf.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bg, title = {Telecoms liberalization - {UK:} Recent developments in liberalization of the {UK} international telecommunications services}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {157--158}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90093-3}, doi = {10.1016/0267-3649(93)90093-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bg.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bh, title = {Usage indicators - {A} new foundation for information technology policies: (1993), OECD, 127 p, {FF} 100, {ISBN} 9264138145}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {158}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90094-4}, doi = {10.1016/0267-3649(93)90094-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bh.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bi, title = {Economic and trade issues in the Computerised database market: (1993), soft-cover, 213 p, {FF} 180, {ISBN} 9264138307}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {158}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90095-5}, doi = {10.1016/0267-3649(93)90095-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bi.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bj, title = {Intellectual property and competition policy: Software interfaces, intellectual property, and competition policy}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {159--163}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90096-6}, doi = {10.1016/0267-3649(93)90096-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bj.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bk, title = {Intellectual property concepts - authorship and orginality - {I:} Author's own intellectual creation - computer generated works}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {164--166}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90097-7}, doi = {10.1016/0267-3649(93)90097-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bk.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bl, title = {Intellectual property concepts - authorship and originality - {II:} The criterion of originality for copyright in computer programs and databases: {A} galloping trojan horse}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {167--169}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90098-8}, doi = {10.1016/0267-3649(93)90098-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bl.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bm, title = {Software copyright and reverse engineering - Australia: High court of Australia revisits autodesk}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {170--172}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90099-9}, doi = {10.1016/0267-3649(93)90099-9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bn, title = {Computer contracts-negotiating drafting: by Robert P. Bigelow {(1987} - to date), Matthew Bender, four volumes, loose-leaf, Library of Congress Catalogue No 86-072664}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {172}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90100-2}, doi = {10.1016/0267-3649(93)90100-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bn.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bo, title = {Software copywright and non-literal copying - Canada: Canadian court adopts us approach to "look and feel"}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {173--175}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90101-R}, doi = {10.1016/0267-3649(93)90101-R}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bo.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bp, title = {International computer law - a practical guide to the international distribution and protection of software and integrated circuits: by Jozef {A} Keustermans and Ingrid {M} Arckens {(1988} - to date), Matthew Bender, loose-leaf, {ISBN} 0 8205 1318 1}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {175}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90102-S}, doi = {10.1016/0267-3649(93)90102-S}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bq, title = {{EC} Software directive - implementation policy compared: The german implementation of the {EC} directive on software protection}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {176--179}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90103-T}, doi = {10.1016/0267-3649(93)90103-T}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bq.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93br, title = {Intellectual property law - central and Eastern Europe: Protection of intellectual property in the countries of central and Eastern Europe}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {180--182}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90104-U}, doi = {10.1016/0267-3649(93)90104-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93br.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bs, title = {Competiting in the Electronics Industry - The experience of Newly industrialising economies: by Dieta Ernst and David O'Connor, 1992, Soft-cover (OECD), 303 p, FF180, {ISBN} 9264136509}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {182}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90105-V}, doi = {10.1016/0267-3649(93)90105-V}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bt, title = {Liability issues - software engineering: Software engineering - what are the legal pitfalls?}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {183--186}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90106-W}, doi = {10.1016/0267-3649(93)90106-W}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bt.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bu, title = {Intellectual property in the public sector research base, cabinet office report, : September 1992, softcover, 55p, {\textsterling}10.50, {ISBN} 0114300712}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {186}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90107-X}, doi = {10.1016/0267-3649(93)90107-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bu.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bv, title = {Software evaluation and certification: Some intellectual problems in evaluation and certification of computer software}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {187--189}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90108-Y}, doi = {10.1016/0267-3649(93)90108-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bw, title = {Security of information systems: The {OECD} guidelines for the security of information systems}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {190--193}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90109-Z}, doi = {10.1016/0267-3649(93)90109-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bx, title = {Practical computer security: Shopping for computer security}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {194}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90110-9}, doi = {10.1016/0267-3649(93)90110-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bx.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93by, title = {Risk management: Up the creek? {A} major new survey of the preparedness of {UK} companies for computer related disaster}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {195--196}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90111-Y}, doi = {10.1016/0267-3649(93)90111-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93by.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93bz, title = {Software licensing policy - {A} {US} perspective: Current developments in computer software licensing practices in the {US}}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {197--198}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90112-Z}, doi = {10.1016/0267-3649(93)90112-Z}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93bz.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93c, title = {The proposed {EC} database directive - {II:} British computer society intellectual property committe comments on the {EC} proposal for a council directive on the legal protection of databases}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {3}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90004-7}, doi = {10.1016/0267-3649(93)90004-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ca, title = {Book review}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {198}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90113-2}, doi = {10.1016/0267-3649(93)90113-2}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ca.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cb, title = {The Law of Privacy in a Nutshell: by Robert Ellis Smith (1993), published by Privacy Journal, pamphlet, 57 p, {ISBN} 0 930072103}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {198}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90114-3}, doi = {10.1016/0267-3649(93)90114-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cb.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cc, title = {{IT} procurement - Australia: Australian government {IT} procurement contracts}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {199--202}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90115-4}, doi = {10.1016/0267-3649(93)90115-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cd, title = {Information Computer Communications/Policy Series: Communications Outlook 1993 Soft cover (OECD)156p {FF180:} {\textsterling}32, US{\textdollar}42, DM74; {ISBN} 92-64-13841-2}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {202}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90116-5}, doi = {10.1016/0267-3649(93)90116-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ce, title = {Information computer communications/policy series: Communication outlook 1993 soft cover {(OECD)} 156p {FF180:} US{\textdollar}42, DM74; {ISBN} 92-64-13841-2}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {202}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90117-6}, doi = {10.1016/0267-3649(93)90117-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ce.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cf, title = {Privacy law reform - Hong Kong}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {203--204}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90118-7}, doi = {10.1016/0267-3649(93)90118-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cf.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cg, title = {Book review}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {204}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90119-8}, doi = {10.1016/0267-3649(93)90119-8}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cg.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ch, title = {Handbook of personal data protection: by Wayne Madsen (1992), Macmillan, hard-cover, 1026 p, {\textsterling}85.00, {ISBN:} 0 333 560202}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {4}, pages = {204}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90120-C}, doi = {10.1016/0267-3649(93)90120-C}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ch.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ci, title = {Editorial}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {205}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90018-I}, doi = {10.1016/0267-3649(93)90018-I}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ci.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cj, title = {Licensing embedded programs}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {206--213}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90019-J}, doi = {10.1016/0267-3649(93)90019-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cj.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ck, title = {The {EEC} directive of July 25, 1985 on liability for defective products and its application to computer programs}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {214--226}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90020-N}, doi = {10.1016/0267-3649(93)90020-N}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ck.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cl, title = {Controlling computer security: {A} guide for financial institutions: by James Essinger {(FT} Business Information Ltd, 1992 {ISBN} 1-85334-163-0)}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {226}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90021-E}, doi = {10.1016/0267-3649(93)90021-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cl.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cm, title = {The commercialization of data held by the public sector}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {227--233}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90022-F}, doi = {10.1016/0267-3649(93)90022-F}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cn, title = {{ATM} fraud: The meaning of 'prejudice'}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {234--235}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90023-G}, doi = {10.1016/0267-3649(93)90023-G}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cn.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93co, title = {Intellectual property world desk reference - {A} guide to practice by country, state, and province: edited by Thomas {N} {S} Hemnes, 1992, loose-leaf (Kluwer Law and Taxation Publishers), {US} {\textdollar}125.00 or Dfl 200.00, {ISBN} 90 6544 906X}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {235}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90024-H}, doi = {10.1016/0267-3649(93)90024-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93co.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cp, title = {Re-examination of re-reversal of reverse engineering decision resolved}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {236--239}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90025-I}, doi = {10.1016/0267-3649(93)90025-I}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cq, title = {The online searcher: edited by Ethel Auster, 1990, soft-cover (Neal-Schuman Publishers, London), 397 p, {ISBN} 1-55570-066-3}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {239}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90026-J}, doi = {10.1016/0267-3649(93)90026-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cq.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cr, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {240--251}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90027-K}, doi = {10.1016/0267-3649(93)90027-K}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cr.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cs, title = {Computer software protection/liability/law/forms: by {L} {J} Kutten, release bulletins 10 and 11, December 1992-April 1993, loose-leaf (Clark Boardman Callaghan)}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {251}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90028-L}, doi = {10.1016/0267-3649(93)90028-L}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93ct, title = {Books received}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {251}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90029-M}, doi = {10.1016/0267-3649(93)90029-M}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93ct.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cu, title = {The 1992 {PC} security and viruses conference Tuesday 24th November 1992, London, Cafe Royal. {IBC} technical services limited}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {252}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90030-Q}, doi = {10.1016/0267-3649(93)90030-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cu.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cv, title = {Editorial}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {253}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90031-H}, doi = {10.1016/0267-3649(93)90031-H}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cv.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cw, title = {Drafting software licenses in light of the {EEC} competition rules}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {254--261}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90032-I}, doi = {10.1016/0267-3649(93)90032-I}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cx, title = {The law of high technology innovation: by Aryeh {S} Friedman, 1992, loose-leaf, {\textsterling}65.00, {ISBN} 0 880 63359x}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {261}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90033-J}, doi = {10.1016/0267-3649(93)90033-J}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cx.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cy, title = {Intellectual property protection in Asia: edited by Arthur Wineburg, loose-leaf, {\textsterling}91.00 {(+} {\textsterling}68.00 for the first issue published in December 1992) {ISBN} 0880632941}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {261}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90034-K}, doi = {10.1016/0267-3649(93)90034-K}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cy.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cz, title = {International legal protection for software}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {262--273}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90035-L}, doi = {10.1016/0267-3649(93)90035-L}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cz.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93d, title = {{UK} telecoms developments: Oftel consultative document on "the citizens charter" in the context of telecommunications standards}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {4--10}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90005-8}, doi = {10.1016/0267-3649(93)90005-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93da, title = {A handbook of European software law: edited by Michael Lehmann and Colin Tapper, 1993, loose-leaf (Oxford University Press), 239 p, {\textsterling}150.00, {ISBN} 0-19-825754-6}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {273}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90036-M}, doi = {10.1016/0267-3649(93)90036-M}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93da.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93db, title = {Correction}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {273}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90037-N}, doi = {10.1016/0267-3649(93)90037-N}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93db.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dc, title = {The international emergence of criminal information law: by Ulrich Sieber, 1992, hard-cover (Carl Heymanns Verlagg KG), 144 p, {ISBN} 3-452-22346-9}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {280}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90039-P}, doi = {10.1016/0267-3649(93)90039-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dd, title = {Securing confidential information for competitive advantage}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {281--285}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90040-T}, doi = {10.1016/0267-3649(93)90040-T}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93de, title = {Copinger {\&} Skone-James on copyright, 13th Edition, : by {E} {P} Skone-James, Sir John Mummery, {J} {E} Rayner-James and {K} {M} Garnett, 1991, hard-cover (Sweet {\&} Maxwell), 1598 p, {\textsterling}160.00, {ISBN} 0-421-39200-2}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {285}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90041-K}, doi = {10.1016/0267-3649(93)90041-K}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93de.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93df, title = {Steve Jackson games v {US} secret service: An update}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {286--287}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90042-L}, doi = {10.1016/0267-3649(93)90042-L}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93df.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dg, title = {{AS/400} security audit and control: by Keith Lester, 1993, soft-cover (Elsevier Advanced Technology), 147 p, {\textsterling}145.00, {ISBN} 1-85617-182-5}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {287}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90043-M}, doi = {10.1016/0267-3649(93)90043-M}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dg.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dh, title = {Books received}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {287}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90044-N}, doi = {10.1016/0267-3649(93)90044-N}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dh.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93di, title = {A summary of the ninth report of the data protection registrar, June 1993}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {288--289}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90045-O}, doi = {10.1016/0267-3649(93)90045-O}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93di.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dj, title = {Understanding information business, technology and geography: edited by Kevin Robins, 1992, hard-cover, 210 p, {\textsterling}39.50, {ISBN} 185293 109 4}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {289}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90046-P}, doi = {10.1016/0267-3649(93)90046-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dj.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dk, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {290--300}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90047-Q}, doi = {10.1016/0267-3649(93)90047-Q}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dk.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93dl, title = {Ensuring compliance with the new {EC} rules for the purchase or lease of computers, software, it equipment and services}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {6}, pages = {300}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90048-R}, doi = {10.1016/0267-3649(93)90048-R}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93dl.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93e, title = {{EC} database directive - a {US} perspective: Database protection: The old world heads off in a new direction}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {10}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90006-9}, doi = {10.1016/0267-3649(93)90006-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93f, title = {Computer security, crime and privacy in the {USA} - a status report part {III}}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {11--14}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90007-A}, doi = {10.1016/0267-3649(93)90007-A}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93g, title = {International year book of law, computers {\&} technology: Volume 6, 1992, edited by Kenneth Russell, Carfax Publishing Company, Hard-cover, 250 p ({\textsterling}48.00, post free, individuals {\textsterling}28.00), {ISBN} 0902 879 057, {ISSN} 0965-528 {X}}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {15--24}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90008-B}, doi = {10.1016/0267-3649(93)90008-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93h, title = {Blackstone's statutes on intellectual property: by Andrew Christie {\&} Stephen Gare (1992), Blackstone Press Ltd, Soft-cover, 308 p ({\textsterling}14.50), {ISBN} 1-85431-186-7}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {24}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90009-C}, doi = {10.1016/0267-3649(93)90009-C}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93i, title = {The benefits of involving law enforcement in trade secret theft cases - Part {II}}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {24}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90010-K}, doi = {10.1016/0267-3649(93)90010-K}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93j, title = {Contracts without paper}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {25--29}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90011-B}, doi = {10.1016/0267-3649(93)90011-B}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93k, title = {An empirical survey of cases concerning the transborder flow of personal data}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {30--32}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90012-C}, doi = {10.1016/0267-3649(93)90012-C}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93l, title = {Automation of legal reasoning - {A} study on artificial intelligence and law: by {P} Wahlgren (1992), Computer law series no 11, Kluwer law and taxation publishers, soft-cover, 436 p, {ISBN} 90-6544-661-3}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {33--37}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90013-D}, doi = {10.1016/0267-3649(93)90013-D}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93m, title = {The debate on the digital signature algorithm}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {37}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90014-E}, doi = {10.1016/0267-3649(93)90014-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93n, title = {Computer viruses and anti-virus warfare: 2nd revised edition, by Jan Hruska (1992), Ellis Horwood limited, soft-cover, 224 p ({\textsterling}19.95), {ISBN} 0-13-036-377-4}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {38--39}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90015-F}, doi = {10.1016/0267-3649(93)90015-F}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93o, title = {News and comment on recent developments from around the world}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {39}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90016-G}, doi = {10.1016/0267-3649(93)90016-G}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93p, title = {International computer executives, lawyers to meet April 25-28, 1993 to discuss business, legal and marketing issues of international trade}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {1}, pages = {40--48}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90017-H}, doi = {10.1016/0267-3649(93)90017-H}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93q, title = {Report from Norway}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {57}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90070-4}, doi = {10.1016/0267-3649(93)90070-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93r, title = {The most restrictive credit reference laws in the western world}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {64--65}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90072-U}, doi = {10.1016/0267-3649(93)90072-U}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93s, title = {An action report from the office of the data protection registrar}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {66--67}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90073-V}, doi = {10.1016/0267-3649(93)90073-V}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93t, title = {Books received}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {67}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90074-W}, doi = {10.1016/0267-3649(93)90074-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93t.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93u, title = {Part {I} - the problems}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {68--73}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90075-X}, doi = {10.1016/0267-3649(93)90075-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93u.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93v, title = {Practical intellectual property: by Solicitors Denton Hall Burgin {\&} Warrens (1992), published by {GEE} - a division of Professional Publishing Ltd, Loose-leaf ({\textsterling}95.00), {ISBN} 85258 909 3}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {73}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90076-Y}, doi = {10.1016/0267-3649(93)90076-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93v.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93w, title = {{CBI} executive summary on the amended proposal for a council directive on the protection of individuals in relation to the processing of personal data}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {74--77}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90077-Z}, doi = {10.1016/0267-3649(93)90077-Z}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93x, title = {Correspondents}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {77}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90078-2}, doi = {10.1016/0267-3649(93)90078-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93x.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93y, title = {The {US} experience in computer crime}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {78--79}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90079-3}, doi = {10.1016/0267-3649(93)90079-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93y.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93z, title = {R v Shephard, house of lords, 16 December 1992 (unreported)}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {2}, pages = {79}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90080-7}, doi = {10.1016/0267-3649(93)90080-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93z.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.