researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Comput. Law Secur. Rev.
Home
Index
Info
Volume
Volume
4
, Issue
6
2
--
6
Martin R. Smith
.
The people risks
7
--
9
Graham Greenleaf
.
Politics triumphs in Australia's new data protection law
10
--
16
Robert P. Bigelow
.
Computer security, crime and privacy - US status report
17
--
21
Mads Bryde Andersen
.
Current legal protection for computer programs
22
--
23
John Sutcliffe
.
Welfare benefits adviser: a local government expert system application
36
--
38
Ian Walden
.
The 1988 conference for data commissioners
38
--
41
Stephen Saxby
.
EDI '88 - The second UK national conference on paperless trade
42
--
43
W. Greaves
.
Licensing and protection of computer software in Europe: The impact of 1992
Volume
4
, Issue
5
2
--
4
Martin Wasik
.
The law commission's working paper on computer misuse
4
--
0
Martin Wasik
.
CBI Conference on combating computer crime - increasing computer security: Centre Point, London, 27th October 1988
8
--
0
David Davies
.
Dramatic review: "The hacker and the malevolent employee"; performed at COMPSEC '88
13
--
14
Mark Tantum
.
Section 69 and all that
15
--
17
David Davies
.
Continuing the series by David Davies Part IV: Why have a strategy
18
--
20
Christopher Millard
.
Software escrow arrangements and the insolvency act 1986
21
--
22
.
Custom software source code ownership and access
23
--
26
Simon Chalton
.
Product testing: liability, acceptance, contract terms
27
--
28
Michael J. Shpizner
.
Congress passes new legislation protecting licensees of intellectual property
28
--
0
Anthony Korn
.
Data protection in Ireland: The Netherlands and Switzerland: Privacy Laws and Business Seminar, Mayfair Hotel, London, Wednesday, 19 October 1988
34
--
35
Bernard P. Zajac Jr.
.
Virus hits major US computer network
40
--
41
David Greaves
.
Eurodynamics systems PLC-V-general automation ltd. (As yet unreported - September 1988)
42
--
43
Stephen Saxby
.
European Study Conferences Ltd: The Royal Automobile Club, London, Thursday, 13 October 1988
Volume
4
, Issue
4
2
--
4
David Davies
.
The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster
5
--
0
David Greaves
.
The EC green paper - A comment
5
--
10
Robert Hart
,
John E. Appleton
.
Submission from the British Computer Society
16
--
19
Joachim Scherer
.
Telecommunications terminal equipment: EEC commission opens the market
25
--
26
A. D. Maclean
.
Computers in criminal justice - Realising the potential: Part II: The future
28
--
31
David P. Lewis
.
Protecting your confidential information
32
--
33
David Davies
.
High technology risks - The limitations of insurance
34
--
35
Yvo Henniker-Heaton
.
The security of network systems - A review
36
--
37
Bernard P. Zajac Jr.
.
The legal implications of viruses
41
--
44
Stephen Saxby
.
Litigation: Reports on recent cases
Volume
4
, Issue
3
2
--
5
Lydia Arossa
.
Software and computer services - A report
5
--
0
D. W. Greaves
.
Computer software - Protection/liability/law/forms: L.J. Kutten (Clark Boardman Co. Ltd., New York, New York 1907)
11
--
12
J. A. L. Sterling
.
The copyright, designs and patents bill 1987
13
--
14
Mark Tantum
.
When a loss becomes a crime
15
--
17
A. D. Maclean
.
Computers in criminal justice - Realising the potential
18
--
19
Robert W. Barger
.
Arbitration of computer disputes in the United States: A status report
23
--
26
Henry Beker
.
Keeping security in perspective
Volume
4
, Issue
2
2
--
0
Ian Walden
.
MP seeks measure for better data protection law - A review
3
--
5
Harry Cohen
.
Points raised in the consultation process
10
--
11
Alfred Meijboom
.
Recent developments regarding protection of topographies of semiconductor products
11
--
15
Brain W. Gray
.
Copyright in computer software - Present United States/Canadian law and impact of bill C60
16
--
0
Fred Greguras
,
Martin Kalin
.
Resales and reexports of U.S. commodities and technical data under the U.S. export administration act
20
--
0
Colin Long
.
Liability for telecommunication services
23
--
25
Derrick Grover
.
Methods for measuring program copying and adaptation
25
--
27
Gordon Hughes
.
Mindless computers in Australia
27
--
28
David Davies
.
"The computer" - The changing risk
28
--
0
David Davies
.
Anatomy of a disaster
30
--
31
Bernard P. Zajac Jr.
.
Computer viruses: The new global threat (part II)
37
--
0
David Davies
.
Lloyds Cash Management Systems (CMS) cover
38
--
0
Pamela Hughes
.
NCC information technology conference 1988
39
--
41
Yvo Henniker-Heaton
.
COMPACS '88
41
--
43
David Davies
.
Successful uses of technology in business
Volume
4
, Issue
1
2
--
4
David Davies
.
Computer abuse
6
--
11
Susan Street
.
Fraud
7
--
8
Yvo Henniker-Heaton
.
Fraud investigation - A perspective on the role of the police
9
--
11
Martin Wasik
.
Documents on fraud issues
13
--
18
David Davies
.
Risk management
14
--
15
Yvo Henniker-Heaton
.
The corporate security policy - Part three
15
--
16
Bob Moores
.
Professional data storage: The decision criteria
17
--
18
August Bequai
.
Computer/telecommunications security - A role for management
19
--
20
Steven Larner
.
Computer contracts - negotiating for success
20
--
24
Quentin Archer
.
Database law
24
--
26
C. Attorney Ian Kyer
.
Copyright law reform - Canada
33
--
37
David Greaves
.
US focus
42
--
43
J. A. L. Sterling
.
Legislation update
43
--
44
Ian Walden
.
Conference review