Journal: Comput. Law Secur. Rev.

Volume 5, Issue 6

2 -- 7David Davies. Computer risk management
7 -- 0Chris Hennessy. The cuckoo's egg: Clifford Stoll, (1989) (The Bodley Head/Doubleday), price £12.95. (US $19.95, Canada $24.95) ISBN 0385249462
8 -- 12David Davies. Virus management
13 -- 15Richard Dedman, Gary Freer. Technology management
16 -- 18Michael Walters, Roger Clarke. Electronic banking
19 -- 22Chris Reynolds. Data protection
28 -- 0A. P. Whittick. Presentation of evidence: The report of the Steering Group of the Member Services' Directorate by the Institute of Chartered Accountants in England and Wales (I.C.A.E.W.) 1989, (The Institute of Chartered Accountants in England and Wales) ISBN 1 85355 020 5

Volume 5, Issue 5

12 -- 15N. M. Brouwer. Liability for offering and exploiting automated information services: A report from the legal advisory board of the directorate-general for telecommunications information industries and innovation of the European commission
16 -- 17Jane M. Tai. Recent moves towards further deregulation of the United Kingdom telecommunications industry
18 -- 0Ian J. Lloyd. Reform of the data protection act
19 -- 22Roger Clarke. Consumer EFTS in Australia - Part II - Security issues
23 -- 24R. v. Harper, R. v. Minors. Computer print-outs continue to court confusion
24 -- 25A. P. Whittick. Admissibility of documents on optical disc
26 -- 0Bernard P. Zajac Jr.. The 1989 California eartquake - Did we learn anything?
27 -- 28James Ayres. Copyrights in codification of statutes and judicial opinions: "Promoting the sciences and useful arts" by capitalizing on a state's failure to publish its law in a useable format?
40 -- 0Chris Hennessy. Computer viruses

Volume 5, Issue 4

2 -- 8Michael Kirby. Informatics, transborder data flows and law - the new challenges
9 -- 13Roger Clarke, Michael Walters. An introduction to consumer efts with particular reference to Australia
14 -- 16Ray August. The draft directive on legal protection of computer programs
20 -- 21Ulrich Wuermeling. New dimensions of computer-crime - hacking for the KGB - A report
22 -- 23Martin Wasik. Computers and the blackmail threat
24 -- 25David Davies. The people risks the creation of a corporate security policy
26 -- 28Philip Whittick. Is a pen a computer? A discussion on it in the domain of the fraud investigator

Volume 5, Issue 3

2 -- 7Nicholas Green Barrister. European Antitrust law: Implications for product distribution
10 -- 13Peter Blume. The personal identity number in Danish law
14 -- 16Martin R. Smith. Computer versus security staff?
17 -- 18Bernard P. Zajac Jr.. New technologies mean new threats
19 -- 20Ian Walden. A review of the council of Europe study entitled "New technologies a challenge to privacy protection?"
21 -- 0Mark Tantum. A trip to TEDIS - a report
22 -- 25David Davies. The people risks, RAF Brampton 24th May 1989

Volume 5, Issue 2

8 -- 0David Davies. The computer virus crisis: written by Philip Fites, Peter Johnston and Martin Kratz. (Published by Van Nostrand Reinhold inc. Available through Chapman and Hall Publishers, London. pp. 171). £13.95. ISBN 0-442-28532-9
28 -- 0Bernard P. Zajac Jr.. Virus hits Michigan Medical Centers
29 -- 30Chris Hennessy. Product review
31 -- 32David Greaves. Battle of the giants: Round one to apple
33 -- 44Stephen Saxby. News and comment on recent developments in computer law and security from around the world

Volume 5, Issue 1

2 -- 5David Davies. Computer losses in 1988 - A review
5 -- 0Chris Hennessy. The complete computer virus handbook: Issue 1, October 1988; published by Price Waterhouse
6 -- 10Simon Chalton. Software licensing implications of the copyright, designs and patent act
18 -- 21Bernard P. Zajac Jr.. Computer viruses can they be prevented?
22 -- 24Daryl Maddern. The consumer and the plastic card
24 -- 25Stephen Saxby. Banking services: Law and practice - publication of the report of the review committee
28 -- 32Roger Clarke. Who is liable for software errors? Proposed new product liability law in Australia
33 -- 0Michael Scott. Potential liability for the development or use of a defective patient care system