![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Computer Law & Security Review, Volume 9
Volume 9, Number 1, January 1993
- Editorial Board. I
- The proposed EC database directive - I: Sinking the data pirates. 1
- Information technology resources utilization and management: Issues and trends: Edited by Mehdi Khosrowpour and Gayle Yaverbaum (1990), idea Group Publishing, Hard-cover, 471 p, (£42.50), ISBN 1-878289-00-4. 2-3
- The proposed EC database directive - II: British computer society intellectual property committe comments on the EC proposal for a council directive on the legal protection of databases. 3
- UK telecoms developments: Oftel consultative document on "the citizens charter" in the context of telecommunications standards. 4-10
- EC database directive - a US perspective: Database protection: The old world heads off in a new direction. 10
- Computer security, crime and privacy in the USA - a status report part III. 11-14
- International year book of law, computers & technology: Volume 6, 1992, edited by Kenneth Russell, Carfax Publishing Company, Hard-cover, 250 p (£48.00, post free, individuals £28.00), ISBN 0902 879 057, ISSN 0965-528 X. 15-24
- Blackstone's statutes on intellectual property: by Andrew Christie & Stephen Gare (1992), Blackstone Press Ltd, Soft-cover, 308 p (£14.50), ISBN 1-85431-186-7. 24
- The benefits of involving law enforcement in trade secret theft cases - Part II. 24
- Contracts without paper. 25-29
- An empirical survey of cases concerning the transborder flow of personal data. 30-32
- Automation of legal reasoning - A study on artificial intelligence and law: by P Wahlgren (1992), Computer law series no 11, Kluwer law and taxation publishers, soft-cover, 436 p, ISBN 90-6544-661-3. 33-37
- The debate on the digital signature algorithm. 37
- Computer viruses and anti-virus warfare: 2nd revised edition, by Jan Hruska (1992), Ellis Horwood limited, soft-cover, 224 p (£19.95), ISBN 0-13-036-377-4. 38-39
- News and comment on recent developments from around the world. 39
- International computer executives, lawyers to meet April 25-28, 1993 to discuss business, legal and marketing issues of international trade. 40-48
Volume 9, Number 2, March 1993
- Robert P. Bigelow:
Computer security, crime and privacy in USA - a status report - part IV: Privacy. 50-57 - Report from Norway. 57
- Shelley Einfeld:
Importing the genuine article - recent developments in computer software and circuit layouts. 58-63 - The most restrictive credit reference laws in the western world. 64-65
- An action report from the office of the data protection registrar. 66-67
- Books received. 67
- Part I - the problems. 68-73
- Practical intellectual property: by Solicitors Denton Hall Burgin & Warrens (1992), published by GEE - a division of Professional Publishing Ltd, Loose-leaf (£95.00), ISBN 85258 909 3. 73
- CBI executive summary on the amended proposal for a council directive on the protection of individuals in relation to the processing of personal data. 74-77
- Correspondents. 77
- The US experience in computer crime. 78-79
- R v Shephard, house of lords, 16 December 1992 (unreported). 79
- International computer crime conference: Würzburg, Germany 5-7 October, 1992. 80-83
- World trends in computer law. 84-86
- Scott on computer law: 2nd Edition, by Michael D Scott (1992), Prentice Hall Law & Business, Two Volumes, Loose-leaf US $195, ISBN 0 13 799347 1. 86
- The Delaware valley disaster recovery information exchange group. 87-89
- Current legal protection for computer programs in the republic of Croatia. 89
- News and comment on recent developments from around the world. 90-96
Volume 9, Number 3, May 1993
- Editorial. 97
- Recent American case law on copyright in computer programs. 98-104
- John Richardson computers Ltd v Flanders and Chemtec Ltd. 105-112
- New exceptions to copyright infringement for computer programs. 113-119
- Combatting the cost of software in Australia. 120-122
- Computer security. 122
- Finding a balance: Computer software, intellectual property and the challenge of technology. 123-126
- ICCP report no 29 - Telecommunications and broadcasting: Convergence or collision?: (1992), OECD, Paris, Soft-cover, 287 p (£40; US $60; F 250; DM 100), ISBN 92 64 13764 5. 126
- Information networks and new technologies: Opportunities and policy implications for the 1990s: OECD, Paris, 1992, Loose-leaf, 78 p (#10; US $19; F 70; DM 29), ISBN 92 64 13768 8. 126
- Part II - The solutions. 127-129
- Statement of the International Chamber of Commerce. 130-131
- Information security - Dictionary of concepts, standards and terms: by Dennis Longley, Michael Shain and William Caelli, 1992, (Macmillan-Stockton Press), Hard-cover, 620 p, £65.00, ISBN 0 333 546 989. 131
- SPAG1 - The open communications systems catalyst. 132-133
- CLSR is pleased to welcome James Fitzsimons to the correspondents panel of the report. 133
- Centralization and standardization the security risks and opportunities. 134-136
- News and comment on recent developments from around the world. 137-142
- IT security: The need for international co-operation: Edited by Guy Gable and William Caelli, 1992, softcover (North-Holland), 495 p, US$125.50 / dfl.220.00, ISBN 0 444 896 996. 142
- 15th National Computer Security Conference - Security made out of building blocks, Baltimore, USA. 143-144
- International bank secrecy: General Editor, Dennis Campbell (1992), Hard-cover, Sweet & Maxwell, 767 p, £100.00, ISBN 0 421 472 502. 144
- ICCP reviews of information and communications policies: Finland: 1992, Softcover (OECD), 201 p, FF100, ISBN 92-64-03703-9. 144
Volume 9, Number 4, July 1993
- Editorial. 145
- Back to the future: The impact of automation on office employment in the next decade CIRCA 1960-1970. 146-148
- Technology and the challenge for law - I: Hard and soft machines. 149-151
- Technology and the challenge for law: Random thoughts on problems with new technology. 152-154
- Managing the internal audit - A practical handbook, : by Ian Beale and Roy H Bradford (1993), Kogan Page, soft-cover, 161 p. £18.95, ISBN 0 7494 0892 8. 154
- Technology and the challenge for law - III: Computers trusted, and found wanting. 155-156
- Telecoms liberalization - UK: Recent developments in liberalization of the UK international telecommunications services. 157-158
- Usage indicators - A new foundation for information technology policies: (1993), OECD, 127 p, FF 100, ISBN 9264138145. 158
- Economic and trade issues in the Computerised database market: (1993), soft-cover, 213 p, FF 180, ISBN 9264138307. 158
- Intellectual property and competition policy: Software interfaces, intellectual property, and competition policy. 159-163
- Intellectual property concepts - authorship and orginality - I: Author's own intellectual creation - computer generated works. 164-166
- Intellectual property concepts - authorship and originality - II: The criterion of originality for copyright in computer programs and databases: A galloping trojan horse. 167-169
- Software copyright and reverse engineering - Australia: High court of Australia revisits autodesk. 170-172
- Computer contracts-negotiating drafting: by Robert P. Bigelow (1987 - to date), Matthew Bender, four volumes, loose-leaf, Library of Congress Catalogue No 86-072664. 172
- Software copywright and non-literal copying - Canada: Canadian court adopts us approach to "look and feel". 173-175
- International computer law - a practical guide to the international distribution and protection of software and integrated circuits: by Jozef A Keustermans and Ingrid M Arckens (1988 - to date), Matthew Bender, loose-leaf, ISBN 0 8205 1318 1. 175
- EC Software directive - implementation policy compared: The german implementation of the EC directive on software protection. 176-179
- Intellectual property law - central and Eastern Europe: Protection of intellectual property in the countries of central and Eastern Europe. 180-182
- Competiting in the Electronics Industry - The experience of Newly industrialising economies: by Dieta Ernst and David O'Connor, 1992, Soft-cover (OECD), 303 p, FF180, ISBN 9264136509. 182
- Liability issues - software engineering: Software engineering - what are the legal pitfalls? 183-186
- Intellectual property in the public sector research base, cabinet office report, : September 1992, softcover, 55p, £10.50, ISBN 0114300712. 186
- Software evaluation and certification: Some intellectual problems in evaluation and certification of computer software. 187-189
- Security of information systems: The OECD guidelines for the security of information systems. 190-193
- Practical computer security: Shopping for computer security. 194
- Risk management: Up the creek? A major new survey of the preparedness of UK companies for computer related disaster. 195-196
- Software licensing policy - A US perspective: Current developments in computer software licensing practices in the US. 197-198
- Book review. 198
- The Law of Privacy in a Nutshell: by Robert Ellis Smith (1993), published by Privacy Journal, pamphlet, 57 p, ISBN 0 930072103. 198
- IT procurement - Australia: Australian government IT procurement contracts. 199-202
- Information Computer Communications/Policy Series: Communications Outlook 1993 Soft cover (OECD)156p FF180: £32, US$42, DM74; ISBN 92-64-13841-2. 202
- Information computer communications/policy series: Communication outlook 1993 soft cover (OECD) 156p FF180: US$42, DM74; ISBN 92-64-13841-2. 202
- Privacy law reform - Hong Kong. 203-204
- Book review. 204
- Handbook of personal data protection: by Wayne Madsen (1992), Macmillan, hard-cover, 1026 p, £85.00, ISBN: 0 333 560202. 204
Volume 9, Number 5, September 1993
- Editorial. 205
- Licensing embedded programs. 206-213
- The EEC directive of July 25, 1985 on liability for defective products and its application to computer programs. 214-226
- Controlling computer security: A guide for financial institutions: by James Essinger (FT Business Information Ltd, 1992 ISBN 1-85334-163-0). 226
- The commercialization of data held by the public sector. 227-233
- ATM fraud: The meaning of 'prejudice'. 234-235
- Intellectual property world desk reference - A guide to practice by country, state, and province: edited by Thomas N S Hemnes, 1992, loose-leaf (Kluwer Law and Taxation Publishers), US $125.00 or Dfl 200.00, ISBN 90 6544 906X. 235
- Re-examination of re-reversal of reverse engineering decision resolved. 236-239
- The online searcher: edited by Ethel Auster, 1990, soft-cover (Neal-Schuman Publishers, London), 397 p, ISBN 1-55570-066-3. 239
- News and comment on recent developments from around the world. 240-251
- Computer software protection/liability/law/forms: by L J Kutten, release bulletins 10 and 11, December 1992-April 1993, loose-leaf (Clark Boardman Callaghan). 251
- Books received. 251
- The 1992 PC security and viruses conference Tuesday 24th November 1992, London, Cafe Royal. IBC technical services limited. 252
Volume 9, Number 6, November 1993
- Editorial. 253
- Drafting software licenses in light of the EEC competition rules. 254-261
- The law of high technology innovation: by Aryeh S Friedman, 1992, loose-leaf, £65.00, ISBN 0 880 63359x. 261
- Intellectual property protection in Asia: edited by Arthur Wineburg, loose-leaf, £91.00 (+ £68.00 for the first issue published in December 1992) ISBN 0880632941. 261
- International legal protection for software. 262-273
- A handbook of European software law: edited by Michael Lehmann and Colin Tapper, 1993, loose-leaf (Oxford University Press), 239 p, £150.00, ISBN 0-19-825754-6. 273
- Correction. 273
- Deborah Fisch Nigri:
Computer crime: Why should we still care? 274-280 - The international emergence of criminal information law: by Ulrich Sieber, 1992, hard-cover (Carl Heymanns Verlagg KG), 144 p, ISBN 3-452-22346-9. 280
- Securing confidential information for competitive advantage. 281-285
- Copinger & Skone-James on copyright, 13th Edition, : by E P Skone-James, Sir John Mummery, J E Rayner-James and K M Garnett, 1991, hard-cover (Sweet & Maxwell), 1598 p, £160.00, ISBN 0-421-39200-2. 285
- Steve Jackson games v US secret service: An update. 286-287
- AS/400 security audit and control: by Keith Lester, 1993, soft-cover (Elsevier Advanced Technology), 147 p, £145.00, ISBN 1-85617-182-5. 287
- Books received. 287
- A summary of the ninth report of the data protection registrar, June 1993. 288-289
- Understanding information business, technology and geography: edited by Kevin Robins, 1992, hard-cover, 210 p, £39.50, ISBN 185293 109 4. 289
- News and comment on recent developments from around the world. 290-300
- Ensuring compliance with the new EC rules for the purchase or lease of computers, software, it equipment and services. 300
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.