Search dblp for Publications

export results for "toc:db/journals/clsr/clsr9.bht:"

 download as .bib file

@article{DBLP:journals/clsr/Bigelow93,
  author       = {Robert P. Bigelow},
  title        = {Computer security, crime and privacy in {USA} - a status report -
                  part {IV:} Privacy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {50--57},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90069-Y},
  doi          = {10.1016/0267-3649(93)90069-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Bigelow93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Einfeld93,
  author       = {Shelley Einfeld},
  title        = {Importing the genuine article - recent developments in computer software
                  and circuit layouts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {58--63},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90071-T},
  doi          = {10.1016/0267-3649(93)90071-T},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Einfeld93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/Nigri93,
  author       = {Deborah Fisch Nigri},
  title        = {Computer crime: Why should we still care?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {274--280},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90038-O},
  doi          = {10.1016/0267-3649(93)90038-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/Nigri93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93,
  title        = {Editorial Board},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {I},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90001-4},
  doi          = {10.1016/0267-3649(93)90001-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93a,
  title        = {The proposed {EC} database directive - {I:} Sinking the data pirates},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {1},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90002-5},
  doi          = {10.1016/0267-3649(93)90002-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93aa,
  title        = {International computer crime conference: W{\"{u}}rzburg, Germany
                  5-7 October, 1992},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {80--83},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90081-W},
  doi          = {10.1016/0267-3649(93)90081-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93aa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ab,
  title        = {World trends in computer law},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {84--86},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90082-X},
  doi          = {10.1016/0267-3649(93)90082-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ab.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ac,
  title        = {Scott on computer law: 2nd Edition, by Michael {D} Scott (1992), Prentice
                  Hall Law {\&} Business, Two Volumes, Loose-leaf {US} {\textdollar}195,
                  {ISBN} 0 13 799347 1},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {86},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90083-Y},
  doi          = {10.1016/0267-3649(93)90083-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ad,
  title        = {The Delaware valley disaster recovery information exchange group},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {87--89},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90084-Z},
  doi          = {10.1016/0267-3649(93)90084-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ad.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ae,
  title        = {Current legal protection for computer programs in the republic of
                  Croatia},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {89},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90085-2},
  doi          = {10.1016/0267-3649(93)90085-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ae.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93af,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {90--96},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90086-3},
  doi          = {10.1016/0267-3649(93)90086-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93af.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ag,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {97},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90049-S},
  doi          = {10.1016/0267-3649(93)90049-S},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ag.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ah,
  title        = {Recent American case law on copyright in computer programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {98--104},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90050-W},
  doi          = {10.1016/0267-3649(93)90050-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ah.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ai,
  title        = {John Richardson computers Ltd v Flanders and Chemtec Ltd},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {105--112},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90051-N},
  doi          = {10.1016/0267-3649(93)90051-N},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ai.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93aj,
  title        = {New exceptions to copyright infringement for computer programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {113--119},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90052-O},
  doi          = {10.1016/0267-3649(93)90052-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93aj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ak,
  title        = {Combatting the cost of software in Australia},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {120--122},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90053-P},
  doi          = {10.1016/0267-3649(93)90053-P},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ak.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93al,
  title        = {Computer security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {122},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90054-Q},
  doi          = {10.1016/0267-3649(93)90054-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93al.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93am,
  title        = {Finding a balance: Computer software, intellectual property and the
                  challenge of technology},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {123--126},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90055-R},
  doi          = {10.1016/0267-3649(93)90055-R},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93am.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93an,
  title        = {{ICCP} report no 29 - Telecommunications and broadcasting: Convergence
                  or collision?: (1992), OECD, Paris, Soft-cover, 287 p ({\textsterling}40;
                  {US} {\textdollar}60; {F} 250; {DM} 100), {ISBN} 92 64 13764 5},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {126},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90056-S},
  doi          = {10.1016/0267-3649(93)90056-S},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93an.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ao,
  title        = {Information networks and new technologies: Opportunities and policy
                  implications for the 1990s: OECD, Paris, 1992, Loose-leaf, 78 p ({\#}10;
                  {US} {\textdollar}19; {F} 70; {DM} 29), {ISBN} 92 64 13768 8},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {126},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90057-T},
  doi          = {10.1016/0267-3649(93)90057-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ao.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ap,
  title        = {Part {II} - The solutions},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {127--129},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90058-U},
  doi          = {10.1016/0267-3649(93)90058-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ap.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93aq,
  title        = {Statement of the International Chamber of Commerce},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {130--131},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90059-V},
  doi          = {10.1016/0267-3649(93)90059-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93aq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ar,
  title        = {Information security - Dictionary of concepts, standards and terms:
                  by Dennis Longley, Michael Shain and William Caelli, 1992, (Macmillan-Stockton
                  Press), Hard-cover, 620 p, {\textsterling}65.00, {ISBN} 0 333 546
                  989},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {131},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90060-Z},
  doi          = {10.1016/0267-3649(93)90060-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ar.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93as,
  title        = {SPAG\({}^{\mbox{1}}\) - The open communications systems catalyst},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {132--133},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90061-Q},
  doi          = {10.1016/0267-3649(93)90061-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93as.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93at,
  title        = {{CLSR} is pleased to welcome James Fitzsimons to the correspondents
                  panel of the report},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {133},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90062-R},
  doi          = {10.1016/0267-3649(93)90062-R},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93at.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93au,
  title        = {Centralization and standardization the security risks and opportunities},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {134--136},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90063-S},
  doi          = {10.1016/0267-3649(93)90063-S},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93au.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93av,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {137--142},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90064-T},
  doi          = {10.1016/0267-3649(93)90064-T},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93av.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93aw,
  title        = {{IT} security: The need for international co-operation: Edited by
                  Guy Gable and William Caelli, 1992, softcover (North-Holland), 495
                  p, US{\textdollar}125.50 / dfl.220.00, {ISBN} 0 444 896 996},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {142},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90065-U},
  doi          = {10.1016/0267-3649(93)90065-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93aw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ax,
  title        = {15th National Computer Security Conference - Security made out of
                  building blocks, Baltimore, {USA}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {143--144},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90066-V},
  doi          = {10.1016/0267-3649(93)90066-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ax.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ay,
  title        = {International bank secrecy: General Editor, Dennis Campbell (1992),
                  Hard-cover, Sweet {\&} Maxwell, 767 p, {\textsterling}100.00,
                  {ISBN} 0 421 472 502},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {144},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90067-W},
  doi          = {10.1016/0267-3649(93)90067-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ay.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93az,
  title        = {{ICCP} reviews of information and communications policies: Finland:
                  1992, Softcover (OECD), 201 p, FF100, {ISBN} 92-64-03703-9},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {3},
  pages        = {144},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90068-X},
  doi          = {10.1016/0267-3649(93)90068-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93az.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93b,
  title        = {Information technology resources utilization and management: Issues
                  and trends: Edited by Mehdi Khosrowpour and Gayle Yaverbaum (1990),
                  idea Group Publishing, Hard-cover, 471 p, ({\textsterling}42.50),
                  {ISBN} 1-878289-00-4},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {2--3},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90003-6},
  doi          = {10.1016/0267-3649(93)90003-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ba,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {145},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90087-4},
  doi          = {10.1016/0267-3649(93)90087-4},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ba.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bb,
  title        = {Back to the future: The impact of automation on office employment
                  in the next decade {CIRCA} 1960-1970},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {146--148},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90088-5},
  doi          = {10.1016/0267-3649(93)90088-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bb.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bc,
  title        = {Technology and the challenge for law - {I:} Hard and soft machines},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {149--151},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90089-6},
  doi          = {10.1016/0267-3649(93)90089-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bd,
  title        = {Technology and the challenge for law: Random thoughts on problems
                  with new technology},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {152--154},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90090-A},
  doi          = {10.1016/0267-3649(93)90090-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93be,
  title        = {Managing the internal audit - {A} practical handbook, : by Ian Beale
                  and Roy {H} Bradford (1993), Kogan Page, soft-cover, 161 p. {\textsterling}18.95,
                  {ISBN} 0 7494 0892 8},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {154},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90091-Z},
  doi          = {10.1016/0267-3649(93)90091-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93be.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bf,
  title        = {Technology and the challenge for law - {III:} Computers trusted, and
                  found wanting},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {155--156},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90092-2},
  doi          = {10.1016/0267-3649(93)90092-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bg,
  title        = {Telecoms liberalization - {UK:} Recent developments in liberalization
                  of the {UK} international telecommunications services},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {157--158},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90093-3},
  doi          = {10.1016/0267-3649(93)90093-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bh,
  title        = {Usage indicators - {A} new foundation for information technology policies:
                  (1993), OECD, 127 p, {FF} 100, {ISBN} 9264138145},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {158},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90094-4},
  doi          = {10.1016/0267-3649(93)90094-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bh.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bi,
  title        = {Economic and trade issues in the Computerised database market: (1993),
                  soft-cover, 213 p, {FF} 180, {ISBN} 9264138307},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {158},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90095-5},
  doi          = {10.1016/0267-3649(93)90095-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bi.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bj,
  title        = {Intellectual property and competition policy: Software interfaces,
                  intellectual property, and competition policy},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {159--163},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90096-6},
  doi          = {10.1016/0267-3649(93)90096-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bk,
  title        = {Intellectual property concepts - authorship and orginality - {I:}
                  Author's own intellectual creation - computer generated works},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {164--166},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90097-7},
  doi          = {10.1016/0267-3649(93)90097-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bk.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bl,
  title        = {Intellectual property concepts - authorship and originality - {II:}
                  The criterion of originality for copyright in computer programs and
                  databases: {A} galloping trojan horse},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {167--169},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90098-8},
  doi          = {10.1016/0267-3649(93)90098-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bl.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bm,
  title        = {Software copyright and reverse engineering - Australia: High court
                  of Australia revisits autodesk},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {170--172},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90099-9},
  doi          = {10.1016/0267-3649(93)90099-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bn,
  title        = {Computer contracts-negotiating drafting: by Robert P. Bigelow {(1987}
                  - to date), Matthew Bender, four volumes, loose-leaf, Library of Congress
                  Catalogue No 86-072664},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {172},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90100-2},
  doi          = {10.1016/0267-3649(93)90100-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bo,
  title        = {Software copywright and non-literal copying - Canada: Canadian court
                  adopts us approach to "look and feel"},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {173--175},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90101-R},
  doi          = {10.1016/0267-3649(93)90101-R},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bo.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bp,
  title        = {International computer law - a practical guide to the international
                  distribution and protection of software and integrated circuits: by
                  Jozef {A} Keustermans and Ingrid {M} Arckens {(1988} - to date), Matthew
                  Bender, loose-leaf, {ISBN} 0 8205 1318 1},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {175},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90102-S},
  doi          = {10.1016/0267-3649(93)90102-S},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bq,
  title        = {{EC} Software directive - implementation policy compared: The german
                  implementation of the {EC} directive on software protection},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {176--179},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90103-T},
  doi          = {10.1016/0267-3649(93)90103-T},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93br,
  title        = {Intellectual property law - central and Eastern Europe: Protection
                  of intellectual property in the countries of central and Eastern Europe},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {180--182},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90104-U},
  doi          = {10.1016/0267-3649(93)90104-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93br.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bs,
  title        = {Competiting in the Electronics Industry - The experience of Newly
                  industrialising economies: by Dieta Ernst and David O'Connor, 1992,
                  Soft-cover (OECD), 303 p, FF180, {ISBN} 9264136509},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {182},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90105-V},
  doi          = {10.1016/0267-3649(93)90105-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bt,
  title        = {Liability issues - software engineering: Software engineering - what
                  are the legal pitfalls?},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {183--186},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90106-W},
  doi          = {10.1016/0267-3649(93)90106-W},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bt.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bu,
  title        = {Intellectual property in the public sector research base, cabinet
                  office report, : September 1992, softcover, 55p, {\textsterling}10.50,
                  {ISBN} 0114300712},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {186},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90107-X},
  doi          = {10.1016/0267-3649(93)90107-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bu.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bv,
  title        = {Software evaluation and certification: Some intellectual problems
                  in evaluation and certification of computer software},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {187--189},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90108-Y},
  doi          = {10.1016/0267-3649(93)90108-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bw,
  title        = {Security of information systems: The {OECD} guidelines for the security
                  of information systems},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {190--193},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90109-Z},
  doi          = {10.1016/0267-3649(93)90109-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bx,
  title        = {Practical computer security: Shopping for computer security},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {194},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90110-9},
  doi          = {10.1016/0267-3649(93)90110-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bx.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93by,
  title        = {Risk management: Up the creek? {A} major new survey of the preparedness
                  of {UK} companies for computer related disaster},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {195--196},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90111-Y},
  doi          = {10.1016/0267-3649(93)90111-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93by.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93bz,
  title        = {Software licensing policy - {A} {US} perspective: Current developments
                  in computer software licensing practices in the {US}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {197--198},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90112-Z},
  doi          = {10.1016/0267-3649(93)90112-Z},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93bz.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93c,
  title        = {The proposed {EC} database directive - {II:} British computer society
                  intellectual property committe comments on the {EC} proposal for a
                  council directive on the legal protection of databases},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {3},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90004-7},
  doi          = {10.1016/0267-3649(93)90004-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ca,
  title        = {Book review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {198},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90113-2},
  doi          = {10.1016/0267-3649(93)90113-2},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ca.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cb,
  title        = {The Law of Privacy in a Nutshell: by Robert Ellis Smith (1993), published
                  by Privacy Journal, pamphlet, 57 p, {ISBN} 0 930072103},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {198},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90114-3},
  doi          = {10.1016/0267-3649(93)90114-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cb.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cc,
  title        = {{IT} procurement - Australia: Australian government {IT} procurement
                  contracts},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {199--202},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90115-4},
  doi          = {10.1016/0267-3649(93)90115-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cd,
  title        = {Information Computer Communications/Policy Series: Communications
                  Outlook 1993 Soft cover (OECD)156p {FF180:} {\textsterling}32, US{\textdollar}42,
                  DM74; {ISBN} 92-64-13841-2},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {202},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90116-5},
  doi          = {10.1016/0267-3649(93)90116-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ce,
  title        = {Information computer communications/policy series: Communication outlook
                  1993 soft cover {(OECD)} 156p {FF180:} US{\textdollar}42, DM74; {ISBN}
                  92-64-13841-2},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {202},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90117-6},
  doi          = {10.1016/0267-3649(93)90117-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ce.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cf,
  title        = {Privacy law reform - Hong Kong},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {203--204},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90118-7},
  doi          = {10.1016/0267-3649(93)90118-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cf.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cg,
  title        = {Book review},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {204},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90119-8},
  doi          = {10.1016/0267-3649(93)90119-8},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ch,
  title        = {Handbook of personal data protection: by Wayne Madsen (1992), Macmillan,
                  hard-cover, 1026 p, {\textsterling}85.00, {ISBN:} 0 333 560202},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {4},
  pages        = {204},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90120-C},
  doi          = {10.1016/0267-3649(93)90120-C},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ch.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ci,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {205},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90018-I},
  doi          = {10.1016/0267-3649(93)90018-I},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ci.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cj,
  title        = {Licensing embedded programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {206--213},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90019-J},
  doi          = {10.1016/0267-3649(93)90019-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ck,
  title        = {The {EEC} directive of July 25, 1985 on liability for defective products
                  and its application to computer programs},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {214--226},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90020-N},
  doi          = {10.1016/0267-3649(93)90020-N},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ck.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cl,
  title        = {Controlling computer security: {A} guide for financial institutions:
                  by James Essinger {(FT} Business Information Ltd, 1992 {ISBN} 1-85334-163-0)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {226},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90021-E},
  doi          = {10.1016/0267-3649(93)90021-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cl.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cm,
  title        = {The commercialization of data held by the public sector},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {227--233},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90022-F},
  doi          = {10.1016/0267-3649(93)90022-F},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cm.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cn,
  title        = {{ATM} fraud: The meaning of 'prejudice'},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {234--235},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90023-G},
  doi          = {10.1016/0267-3649(93)90023-G},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93co,
  title        = {Intellectual property world desk reference - {A} guide to practice
                  by country, state, and province: edited by Thomas {N} {S} Hemnes,
                  1992, loose-leaf (Kluwer Law and Taxation Publishers), {US} {\textdollar}125.00
                  or Dfl 200.00, {ISBN} 90 6544 906X},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {235},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90024-H},
  doi          = {10.1016/0267-3649(93)90024-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93co.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cp,
  title        = {Re-examination of re-reversal of reverse engineering decision resolved},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {236--239},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90025-I},
  doi          = {10.1016/0267-3649(93)90025-I},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cq,
  title        = {The online searcher: edited by Ethel Auster, 1990, soft-cover (Neal-Schuman
                  Publishers, London), 397 p, {ISBN} 1-55570-066-3},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {239},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90026-J},
  doi          = {10.1016/0267-3649(93)90026-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cr,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {240--251},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90027-K},
  doi          = {10.1016/0267-3649(93)90027-K},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cr.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cs,
  title        = {Computer software protection/liability/law/forms: by {L} {J} Kutten,
                  release bulletins 10 and 11, December 1992-April 1993, loose-leaf
                  (Clark Boardman Callaghan)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {251},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90028-L},
  doi          = {10.1016/0267-3649(93)90028-L},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93ct,
  title        = {Books received},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {251},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90029-M},
  doi          = {10.1016/0267-3649(93)90029-M},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93ct.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cu,
  title        = {The 1992 {PC} security and viruses conference Tuesday 24th November
                  1992, London, Cafe Royal. {IBC} technical services limited},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {252},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90030-Q},
  doi          = {10.1016/0267-3649(93)90030-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cu.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cv,
  title        = {Editorial},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {253},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90031-H},
  doi          = {10.1016/0267-3649(93)90031-H},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cv.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cw,
  title        = {Drafting software licenses in light of the {EEC} competition rules},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {254--261},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90032-I},
  doi          = {10.1016/0267-3649(93)90032-I},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cx,
  title        = {The law of high technology innovation: by Aryeh {S} Friedman, 1992,
                  loose-leaf, {\textsterling}65.00, {ISBN} 0 880 63359x},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {261},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90033-J},
  doi          = {10.1016/0267-3649(93)90033-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cx.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cy,
  title        = {Intellectual property protection in Asia: edited by Arthur Wineburg,
                  loose-leaf, {\textsterling}91.00 {(+} {\textsterling}68.00 for the
                  first issue published in December 1992) {ISBN} 0880632941},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {261},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90034-K},
  doi          = {10.1016/0267-3649(93)90034-K},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cy.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cz,
  title        = {International legal protection for software},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {262--273},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90035-L},
  doi          = {10.1016/0267-3649(93)90035-L},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cz.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93d,
  title        = {{UK} telecoms developments: Oftel consultative document on "the citizens
                  charter" in the context of telecommunications standards},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {4--10},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90005-8},
  doi          = {10.1016/0267-3649(93)90005-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93da,
  title        = {A handbook of European software law: edited by Michael Lehmann and
                  Colin Tapper, 1993, loose-leaf (Oxford University Press), 239 p, {\textsterling}150.00,
                  {ISBN} 0-19-825754-6},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {273},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90036-M},
  doi          = {10.1016/0267-3649(93)90036-M},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93da.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93db,
  title        = {Correction},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {273},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90037-N},
  doi          = {10.1016/0267-3649(93)90037-N},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93db.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dc,
  title        = {The international emergence of criminal information law: by Ulrich
                  Sieber, 1992, hard-cover (Carl Heymanns Verlagg KG), 144 p, {ISBN}
                  3-452-22346-9},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {280},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90039-P},
  doi          = {10.1016/0267-3649(93)90039-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dd,
  title        = {Securing confidential information for competitive advantage},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {281--285},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90040-T},
  doi          = {10.1016/0267-3649(93)90040-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93de,
  title        = {Copinger {\&} Skone-James on copyright, 13th Edition, : by {E}
                  {P} Skone-James, Sir John Mummery, {J} {E} Rayner-James and {K} {M}
                  Garnett, 1991, hard-cover (Sweet {\&} Maxwell), 1598 p, {\textsterling}160.00,
                  {ISBN} 0-421-39200-2},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {285},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90041-K},
  doi          = {10.1016/0267-3649(93)90041-K},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93de.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93df,
  title        = {Steve Jackson games v {US} secret service: An update},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {286--287},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90042-L},
  doi          = {10.1016/0267-3649(93)90042-L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93df.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dg,
  title        = {{AS/400} security audit and control: by Keith Lester, 1993, soft-cover
                  (Elsevier Advanced Technology), 147 p, {\textsterling}145.00, {ISBN}
                  1-85617-182-5},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {287},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90043-M},
  doi          = {10.1016/0267-3649(93)90043-M},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dg.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dh,
  title        = {Books received},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {287},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90044-N},
  doi          = {10.1016/0267-3649(93)90044-N},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dh.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93di,
  title        = {A summary of the ninth report of the data protection registrar, June
                  1993},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {288--289},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90045-O},
  doi          = {10.1016/0267-3649(93)90045-O},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93di.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dj,
  title        = {Understanding information business, technology and geography: edited
                  by Kevin Robins, 1992, hard-cover, 210 p, {\textsterling}39.50, {ISBN}
                  185293 109 4},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {289},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90046-P},
  doi          = {10.1016/0267-3649(93)90046-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dj.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dk,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {290--300},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90047-Q},
  doi          = {10.1016/0267-3649(93)90047-Q},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dk.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93dl,
  title        = {Ensuring compliance with the new {EC} rules for the purchase or lease
                  of computers, software, it equipment and services},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {6},
  pages        = {300},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90048-R},
  doi          = {10.1016/0267-3649(93)90048-R},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93dl.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93e,
  title        = {{EC} database directive - a {US} perspective: Database protection:
                  The old world heads off in a new direction},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {10},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90006-9},
  doi          = {10.1016/0267-3649(93)90006-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93f,
  title        = {Computer security, crime and privacy in the {USA} - a status report
                  part {III}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {11--14},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90007-A},
  doi          = {10.1016/0267-3649(93)90007-A},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93g,
  title        = {International year book of law, computers {\&} technology: Volume
                  6, 1992, edited by Kenneth Russell, Carfax Publishing Company, Hard-cover,
                  250 p ({\textsterling}48.00, post free, individuals {\textsterling}28.00),
                  {ISBN} 0902 879 057, {ISSN} 0965-528 {X}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {15--24},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90008-B},
  doi          = {10.1016/0267-3649(93)90008-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93h,
  title        = {Blackstone's statutes on intellectual property: by Andrew Christie
                  {\&} Stephen Gare (1992), Blackstone Press Ltd, Soft-cover, 308
                  p ({\textsterling}14.50), {ISBN} 1-85431-186-7},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {24},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90009-C},
  doi          = {10.1016/0267-3649(93)90009-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93i,
  title        = {The benefits of involving law enforcement in trade secret theft cases
                  - Part {II}},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {24},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90010-K},
  doi          = {10.1016/0267-3649(93)90010-K},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93j,
  title        = {Contracts without paper},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {25--29},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90011-B},
  doi          = {10.1016/0267-3649(93)90011-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93k,
  title        = {An empirical survey of cases concerning the transborder flow of personal
                  data},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {30--32},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90012-C},
  doi          = {10.1016/0267-3649(93)90012-C},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93l,
  title        = {Automation of legal reasoning - {A} study on artificial intelligence
                  and law: by {P} Wahlgren (1992), Computer law series no 11, Kluwer
                  law and taxation publishers, soft-cover, 436 p, {ISBN} 90-6544-661-3},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {33--37},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90013-D},
  doi          = {10.1016/0267-3649(93)90013-D},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93m,
  title        = {The debate on the digital signature algorithm},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {37},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90014-E},
  doi          = {10.1016/0267-3649(93)90014-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93n,
  title        = {Computer viruses and anti-virus warfare: 2nd revised edition, by Jan
                  Hruska (1992), Ellis Horwood limited, soft-cover, 224 p ({\textsterling}19.95),
                  {ISBN} 0-13-036-377-4},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {38--39},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90015-F},
  doi          = {10.1016/0267-3649(93)90015-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93o,
  title        = {News and comment on recent developments from around the world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {39},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90016-G},
  doi          = {10.1016/0267-3649(93)90016-G},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93p,
  title        = {International computer executives, lawyers to meet April 25-28, 1993
                  to discuss business, legal and marketing issues of international trade},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {40--48},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90017-H},
  doi          = {10.1016/0267-3649(93)90017-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93q,
  title        = {Report from Norway},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {57},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90070-4},
  doi          = {10.1016/0267-3649(93)90070-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93r,
  title        = {The most restrictive credit reference laws in the western world},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {64--65},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90072-U},
  doi          = {10.1016/0267-3649(93)90072-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93s,
  title        = {An action report from the office of the data protection registrar},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {66--67},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90073-V},
  doi          = {10.1016/0267-3649(93)90073-V},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93t,
  title        = {Books received},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {67},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90074-W},
  doi          = {10.1016/0267-3649(93)90074-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93t.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93u,
  title        = {Part {I} - the problems},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {68--73},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90075-X},
  doi          = {10.1016/0267-3649(93)90075-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93u.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93v,
  title        = {Practical intellectual property: by Solicitors Denton Hall Burgin
                  {\&} Warrens (1992), published by {GEE} - a division of Professional
                  Publishing Ltd, Loose-leaf ({\textsterling}95.00), {ISBN} 85258 909
                  3},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {73},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90076-Y},
  doi          = {10.1016/0267-3649(93)90076-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93v.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93w,
  title        = {{CBI} executive summary on the amended proposal for a council directive
                  on the protection of individuals in relation to the processing of
                  personal data},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {74--77},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90077-Z},
  doi          = {10.1016/0267-3649(93)90077-Z},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93x,
  title        = {Correspondents},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {77},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90078-2},
  doi          = {10.1016/0267-3649(93)90078-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93x.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93y,
  title        = {The {US} experience in computer crime},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {78--79},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90079-3},
  doi          = {10.1016/0267-3649(93)90079-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93y.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93z,
  title        = {R v Shephard, house of lords, 16 December 1992 (unreported)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {2},
  pages        = {79},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90080-7},
  doi          = {10.1016/0267-3649(93)90080-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93z.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}