default search action
Computer Law & Security Review, Volume 6
Volume 6, Number 1, May 1990
- Bernard P. Zajac Jr.:
Computer & security's computer virus handbook: Dr Harold Joseph Highland FICS 1990 (Elsevier Advanced Technology, 375pp) £85.00/US$ 153.00 ISBN: 0946395462. 12
Volume 6, Number 2, July 1990
- Fred Greguras, Thomas R. Radcliffe:
Current developments in software distribution in Japan. 8-9 - Charles P. Lickson:
Technology issues: Many United States firms consider mediation as a method of choice. 10-12 - Chris Reed:
The admissibility and authentication of computer evidence - a confusion of issues. 13-16 - Derrick Grover:
Data identification and authentication from fingerprints. 17 - Philip Whittick:
Expert systems research in law enforcement. 18-20 - Graham Greenleaf:
Computers and crime - the hacker's new rules. 21-22 - Martin R. Smith:
Part 2 Personnel security measures within a computer installation. 23-26
Volume 6, Number 4, November 1990
- Gillian Bull:
Maroon district council case study. 2-4 - Don Jerrard:
International legal protection for software. 13 - Gillian Bull:
Capital allowances of leased software. 14-15 - David Davies:
The computer health risk. 17-19 - Mads Bryde Andersen:
Proposed standard contract for minor computer procurements from the danish general services administration. 19 - David Davies:
Insuring computer virus. 20-21 - Stewart Dresner, Ian Walden:
The EC data protection directive. 22-24 - Yves Poullet, M. H. Boulanger:
Part II - Existing regulations applicable to medical data cards. 25-28 - Bernard P. Zajac Jr.:
Computer hacking - The new boom industry. 29 - John Sykes:
Look and feel has UK copyright protection. 30-31 - Stephen Saxby:
Supplier of office facilities liable in contract and tort for theft losses. 31-32 - Fred Greguras:
The implications of the lotus 1-2-3 copyright infringement decision. 33-35 - Fred Greguras:
Misuse of copyright as defense to software infringement claim. 35-36
Volume 6, Number 5, January 1991
- Stephen Castell:
Electronic data interchange. 2-8 - Marleen Van Kerckhove:
Cocom rules. 9-12 - Maeve McDonagh:
Australian privacy law. 13-17 - Yves Poullet, M. H. Boulanger:
Data protection - medicine. 18-23 - Susan Hall:
Taxation customs and VAT treatment of software - a note. 23 - Gillian Bull:
Computer law case studies. 24-26 - Christopher Rees:
The international information industry congress 1990. 27-28 - Gillian Bull:
Computer software and the EEC rules on competition and copyright. 28-30 - Bernard P. Zajac Jr.:
US focus. 31
Volume 6, Number 6, March 1991
- Georges Ferné:
Standardisation of information technology. 2-5 - Robert Bell, Gillian Bull:
Compulsory software licences. 6-7 - Peter G. Leonard:
Telecommunications. 10-15 - Robert Clark:
Data protection. 16-19 - Gillian Bull:
Encyclopedia of information technology law - A review. 23-29 - B. W. Napier:
Case studies I - UK. 30-32 - Tony Rein:
Case studies II - Australia. 33-36 - Bernard P. Zajac Jr.:
Ethics in computing - Are there any? 37-38 - M. J. L. Turner:
Conference review. 39-40 - Stephen Saxby:
CLSR briefing. 41-47 - Rosa Greaves:
Exploitation of intellectual property: Hilary Pearson and Clifford Miller (Blackstone Press Ltd, 1990, ISBN 1-85431-044-5). 48
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.