default search action
Search dblp for Publications
export results for "toc:db/journals/ijlit/ijlit14.bht:"
@article{DBLP:journals/ijlit/Baker06, author = {Roger K. Baker}, title = {Offshore {IT} Outsourcing and the 8\({}^{\mbox{th}}\) Data Protection Principle - legal and regulatory requirements - with reference to Financial Services}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {1}, pages = {1--27}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai025}, doi = {10.1093/IJLIT/EAI025}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Baker06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Black06, author = {Gillian Black}, title = {Book Reviews}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {2}, pages = {250--252}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eal003}, doi = {10.1093/IJLIT/EAL003}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Black06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/ChanTZL06, author = {Yingru Chan and Zaw Thant and Robert Zimmerman and Laurence L. Leff}, title = {Parsley: Towards an Integrated System to Handle Garnishment Forms for Garnishees, Judgment Debtors, Judgment Creditors, and the Courts}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {2}, pages = {242--249}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai027}, doi = {10.1093/IJLIT/EAI027}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/ChanTZL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Chik06, author = {Warren B. Chik}, title = {The Lion, the Dragon and the Wardrobe Guarding the Doorway to Information and Communications Privacy on the Internet: {A} Comparative Case Study of Hong Kong and Singapore - Two Differing Asian Approaches}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {1}, pages = {47--100}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai026}, doi = {10.1093/IJLIT/EAI026}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Chik06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Gonzalez06, author = {Andr{\'{e}}s Guadamuz Gonz{\'{a}}lez}, title = {Book Reviews}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {2}, pages = {252--254}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eal004}, doi = {10.1093/IJLIT/EAL004}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Gonzalez06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Grosche06, author = {Andreas Grosche}, title = {Software Patents - Boon or Bane for Europe?}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {3}, pages = {257--309}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai031}, doi = {10.1093/IJLIT/EAI031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Grosche06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/JacksonS06, author = {Margaret Jackson and Marita Shelly}, title = {Black Hats and White Hats: Authorisation of Copyright Infringement in Australia and the United States}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {1}, pages = {28--46}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai022}, doi = {10.1093/IJLIT/EAI022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/JacksonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Piasentin06, author = {Robert C. Piasentin}, title = {Unlawful? Innovative? Unstoppable? {A} Comparative Analysis of the Potential Legal Liability Facing {P2P} End-Users in the United States, United Kingdom and Canada}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {2}, pages = {195--241}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai028}, doi = {10.1093/IJLIT/EAI028}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Piasentin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Raento06, author = {Mika Raento}, title = {The Data Subject's Right of Access and to be Informed in Finland: An Experimental Study}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {3}, pages = {390--409}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eal008}, doi = {10.1093/IJLIT/EAL008}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Raento06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Romero06, author = {Philip Michael Romero}, title = {An Immunological Approach to Counter-Terrorism and Infrastructure Defense Law in Electronic Domains}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {1}, pages = {101--136}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai023}, doi = {10.1093/IJLIT/EAI023}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Romero06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Saito06, author = {Akira Saito}, title = {\emph{Sorting Out Deregulation: Protecting Free Speech and Internet Access in The United States, Germany, and Japan} by Kim, Jae-Young, {(LFB} Scholarly Publishing LLC, 2002), pp 196}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {2}, pages = {254--255}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eal006}, doi = {10.1093/IJLIT/EAL006}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Saito06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Saxby06, author = {Stephen Saxby}, title = {Public Policy and the Development of a {UK} National Geographic Information Strategy}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {2}, pages = {147--194}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai033}, doi = {10.1093/IJLIT/EAI033}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Saxby06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/VelicognaN06, author = {Marco Velicogna and Gar Yein Ng}, title = {Legitimacy and Internet in the Judiciary: {A} Lesson From the Italian Courts' Websites Experience}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {3}, pages = {370--389}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eal009}, doi = {10.1093/IJLIT/EAL009}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/VelicognaN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Zekos06, author = {Georgios I. Zekos}, title = {Nanotechnology and Biotechnology Patents}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {3}, pages = {310--369}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eal011}, doi = {10.1093/IJLIT/EAL011}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Zekos06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijlit/Zemer06, author = {Lior Zemer}, title = {Rethinking Copyright Alternatives}, journal = {Int. J. Law Inf. Technol.}, volume = {14}, number = {1}, pages = {137--145}, year = {2006}, url = {https://doi.org/10.1093/ijlit/eai024}, doi = {10.1093/IJLIT/EAI024}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijlit/Zemer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.