Journal: Comput. Law Secur. Rev.

Volume 4, Issue 6

2 -- 6Martin R. Smith. The people risks
7 -- 9Graham Greenleaf. Politics triumphs in Australia's new data protection law
10 -- 16Robert P. Bigelow. Computer security, crime and privacy - US status report
17 -- 21Mads Bryde Andersen. Current legal protection for computer programs
22 -- 23John Sutcliffe. Welfare benefits adviser: a local government expert system application
36 -- 38Ian Walden. The 1988 conference for data commissioners
38 -- 41Stephen Saxby. EDI '88 - The second UK national conference on paperless trade
42 -- 43W. Greaves. Licensing and protection of computer software in Europe: The impact of 1992

Volume 4, Issue 5

2 -- 4Martin Wasik. The law commission's working paper on computer misuse
4 -- 0Martin Wasik. CBI Conference on combating computer crime - increasing computer security: Centre Point, London, 27th October 1988
8 -- 0David Davies. Dramatic review: "The hacker and the malevolent employee"; performed at COMPSEC '88
13 -- 14Mark Tantum. Section 69 and all that
15 -- 17David Davies. Continuing the series by David Davies Part IV: Why have a strategy
18 -- 20Christopher Millard. Software escrow arrangements and the insolvency act 1986
21 -- 22. Custom software source code ownership and access
23 -- 26Simon Chalton. Product testing: liability, acceptance, contract terms
27 -- 28Michael J. Shpizner. Congress passes new legislation protecting licensees of intellectual property
28 -- 0Anthony Korn. Data protection in Ireland: The Netherlands and Switzerland: Privacy Laws and Business Seminar, Mayfair Hotel, London, Wednesday, 19 October 1988
34 -- 35Bernard P. Zajac Jr.. Virus hits major US computer network
40 -- 41David Greaves. Eurodynamics systems PLC-V-general automation ltd. (As yet unreported - September 1988)
42 -- 43Stephen Saxby. European Study Conferences Ltd: The Royal Automobile Club, London, Thursday, 13 October 1988

Volume 4, Issue 4

2 -- 4David Davies. The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster
5 -- 0David Greaves. The EC green paper - A comment
5 -- 10Robert Hart, John E. Appleton. Submission from the British Computer Society
16 -- 19Joachim Scherer. Telecommunications terminal equipment: EEC commission opens the market
25 -- 26A. D. Maclean. Computers in criminal justice - Realising the potential: Part II: The future
28 -- 31David P. Lewis. Protecting your confidential information
32 -- 33David Davies. High technology risks - The limitations of insurance
34 -- 35Yvo Henniker-Heaton. The security of network systems - A review
36 -- 37Bernard P. Zajac Jr.. The legal implications of viruses
41 -- 44Stephen Saxby. Litigation: Reports on recent cases

Volume 4, Issue 3

2 -- 5Lydia Arossa. Software and computer services - A report
5 -- 0D. W. Greaves. Computer software - Protection/liability/law/forms: L.J. Kutten (Clark Boardman Co. Ltd., New York, New York 1907)
11 -- 12J. A. L. Sterling. The copyright, designs and patents bill 1987
13 -- 14Mark Tantum. When a loss becomes a crime
15 -- 17A. D. Maclean. Computers in criminal justice - Realising the potential
18 -- 19Robert W. Barger. Arbitration of computer disputes in the United States: A status report
23 -- 26Henry Beker. Keeping security in perspective

Volume 4, Issue 2

2 -- 0Ian Walden. MP seeks measure for better data protection law - A review
3 -- 5Harry Cohen. Points raised in the consultation process
10 -- 11Alfred Meijboom. Recent developments regarding protection of topographies of semiconductor products
11 -- 15Brain W. Gray. Copyright in computer software - Present United States/Canadian law and impact of bill C60
16 -- 0Fred Greguras, Martin Kalin. Resales and reexports of U.S. commodities and technical data under the U.S. export administration act
20 -- 0Colin Long. Liability for telecommunication services
23 -- 25Derrick Grover. Methods for measuring program copying and adaptation
25 -- 27Gordon Hughes. Mindless computers in Australia
27 -- 28David Davies. "The computer" - The changing risk
28 -- 0David Davies. Anatomy of a disaster
30 -- 31Bernard P. Zajac Jr.. Computer viruses: The new global threat (part II)
37 -- 0David Davies. Lloyds Cash Management Systems (CMS) cover
38 -- 0Pamela Hughes. NCC information technology conference 1988
39 -- 41Yvo Henniker-Heaton. COMPACS '88
41 -- 43David Davies. Successful uses of technology in business

Volume 4, Issue 1

2 -- 4David Davies. Computer abuse
6 -- 11Susan Street. Fraud
7 -- 8Yvo Henniker-Heaton. Fraud investigation - A perspective on the role of the police
9 -- 11Martin Wasik. Documents on fraud issues
13 -- 18David Davies. Risk management
14 -- 15Yvo Henniker-Heaton. The corporate security policy - Part three
15 -- 16Bob Moores. Professional data storage: The decision criteria
17 -- 18August Bequai. Computer/telecommunications security - A role for management
19 -- 20Steven Larner. Computer contracts - negotiating for success
20 -- 24Quentin Archer. Database law
24 -- 26C. Attorney Ian Kyer. Copyright law reform - Canada
33 -- 37David Greaves. US focus
42 -- 43J. A. L. Sterling. Legislation update
43 -- 44Ian Walden. Conference review