Journal: I. J. Law and Information Technology

Volume 1, Issue 3

249 -- 289Judge Mander. The Judith Report
290 -- 304Val Collins. Privacy in the United Kingdom: a Right Conferred by Europe?
305 -- 323Philip Redfern. Precise Identification through a Multi-purpose Personal Number Protects Privacy
324 -- 334Daphne Gelbart, J. C. Smith. Automating the Process of Abstracting Legal Cases
335 -- 348Ian Lloyd. Shopping in Cyberspace
349 -- 360Maureen Kelly. Hypertext - A Model Of Lawyers' Text Handling Methods

Volume 1, Issue 2

129 -- 143Thomas Hoeren. Information Management and Data Protection within the EC - the amended EC proposal for a council directive on data protection and its impact on German industry
144 -- 188Patricia Hassett. Can Expert System Technology Contribute to Improved Bail Decisions?
189 -- 211Dinant T. L. Oosterbaan, Elisabeth P. M. Thole. Software Protection in the Netherlands
212 -- 224Gordon Hughes. Distributing Software in Australia
225 -- 235Ken Liebman. Opinion: Untying the Knot - Copyright Law and the New Technologies
236 -- 247Hector L. MacQueen. Protecting Software - Copyright or Sui Generis?

Volume 1, Issue 1

3 -- 34Raymond T. Nimmer, Patricia A. Krauthaus. Information as Property Databases and Commercial Property
35 -- 58Colin Tapper. Evanescent Evidence
59 -- 76Ronald W. Staudt. Law Office Automation Approaching the Millennium
77 -- 89Walter Woon. The Scripless Trading System in Singapore
90 -- 106Joyce Plotnikoff, Richard Woolfson. Replacing the judge's pen? Evaluation of a real-time transcription system
107 -- 113Richard Potter. Resolving Disputes in the Computer/IT Industry: the Courts, ADR or What?
114 -- 127Lilian Edwards. Book Review