nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Advanced computer applications for investment managers
|
|
|
1991 |
7 |
1 |
p. 34- 1 p. |
artikel |
2 |
An analysis of the information technology standardization process
|
|
|
1991 |
7 |
1 |
p. 47- 1 p. |
artikel |
3 |
Application of anti-piracy provisions of the copyright act 1968
|
Lewis, David P. |
|
1991 |
7 |
1 |
p. 35-36 2 p. |
artikel |
4 |
Beating the system - hackers, phreakers and electronic spies
|
|
|
1991 |
7 |
1 |
p. 48- 1 p. |
artikel |
5 |
Benefits and risks of knowledge-based systems. Report of t the working party council for science and society
|
|
|
1991 |
7 |
1 |
p. 47- 1 p. |
artikel |
6 |
British broadcasting corp v British sky broadcasting ltd (formerly British Satellite broadcasting ltd), chancery division, the times, 22 January 1991
|
|
|
1991 |
7 |
1 |
p. 38- 1 p. |
artikel |
7 |
Business telecommunications
|
|
|
1991 |
7 |
1 |
p. 6- 1 p. |
artikel |
8 |
Canadian criminal code applied to software pirate
|
|
|
1991 |
7 |
1 |
p. 43- 1 p. |
artikel |
9 |
Compaq attack dell computer's advertising campaign
|
|
|
1991 |
7 |
1 |
p. 39- 1 p. |
artikel |
10 |
Computer ethics
|
|
|
1991 |
7 |
1 |
p. 17- 1 p. |
artikel |
11 |
Computers and the Law
|
|
|
1991 |
7 |
1 |
p. 36- 1 p. |
artikel |
12 |
Computer software protection/liability/law/forms
|
|
|
1991 |
7 |
1 |
p. 47-48 2 p. |
artikel |
13 |
Computing services association “buy it in” survey
|
|
|
1991 |
7 |
1 |
p. 40- 1 p. |
artikel |
14 |
Conferences
|
|
|
1991 |
7 |
1 |
p. 46- 1 p. |
artikel |
15 |
Council of Europe
|
|
|
1991 |
7 |
1 |
p. 44- 1 p. |
artikel |
16 |
Data matching - new Australian developments
|
|
|
1991 |
7 |
1 |
p. 15-17 3 p. |
artikel |
17 |
Data protection news
|
|
|
1991 |
7 |
1 |
p. 40- 1 p. |
artikel |
18 |
Editorial
|
|
|
1991 |
7 |
1 |
p. 1- 1 p. |
artikel |
19 |
Editorial board
|
|
|
1991 |
7 |
1 |
p. IFC- 1 p. |
artikel |
20 |
Electronic freedom foundation sponsor conference on civil liberties and the electronic frontier
|
|
|
1991 |
7 |
1 |
p. 43- 1 p. |
artikel |
21 |
Electronics, computers and telephone switching
|
|
|
1991 |
7 |
1 |
p. 47- 1 p. |
artikel |
22 |
Encryption and regulatory controls in Europe
|
Lindsay, David |
|
1991 |
7 |
1 |
p. 28-30 3 p. |
artikel |
23 |
Expert systems for business - concepts and applications
|
|
|
1991 |
7 |
1 |
p. 47- 1 p. |
artikel |
24 |
Hughes v Canon Australia Pty Ltd - a case of loose promises
|
Hughes, Gordon |
|
1991 |
7 |
1 |
p. 33-34 2 p. |
artikel |
25 |
IBM to become green consultants - “You read it first in the report!”
|
|
|
1991 |
7 |
1 |
p. 39- 1 p. |
artikel |
26 |
Intellectual property protection for encrypted television broadcasts - illegal decoders
|
|
|
1991 |
7 |
1 |
p. 43- 1 p. |
artikel |
27 |
International chamber of commerce sets up EDI working party
|
|
|
1991 |
7 |
1 |
p. 40- 1 p. |
artikel |
28 |
International symposium on the prevention and prosecution of computer crime
|
|
|
1991 |
7 |
1 |
p. 7-12 6 p. |
artikel |
29 |
It and business
|
|
|
1991 |
7 |
1 |
p. 6- 1 p. |
artikel |
30 |
Kirby heads OECD committee on data security
|
|
|
1991 |
7 |
1 |
p. 46- 1 p. |
artikel |
31 |
Legal protection of computer software
|
|
|
1991 |
7 |
1 |
p. 36- 1 p. |
artikel |
32 |
Lotus drops its cd-rom database
|
|
|
1991 |
7 |
1 |
p. 43- 1 p. |
artikel |
33 |
Marconi instruments settles dispute with business software alliance
|
|
|
1991 |
7 |
1 |
p. 39- 1 p. |
artikel |
34 |
New discussion papers on intellectual property published
|
|
|
1991 |
7 |
1 |
p. 42- 1 p. |
artikel |
35 |
New report correspondents
|
|
|
1991 |
7 |
1 |
p. 46- 1 p. |
artikel |
36 |
Norwegian ‘Lovdata’ published on cd rom
|
|
|
1991 |
7 |
1 |
p. 43- 1 p. |
artikel |
37 |
Proposal for a [European community] council decision in the field of information security
|
Hennessy, Chris |
|
1991 |
7 |
1 |
p. 27- 1 p. |
artikel |
38 |
Proposed EC directives on data protection
|
|
|
1991 |
7 |
1 |
p. 20-23 4 p. |
artikel |
39 |
Re Gale court of appeal (civil division), unreported, 13 December 1990
|
|
|
1991 |
7 |
1 |
p. 38- 1 p. |
artikel |
40 |
R v Whieley, court of appeal (criminal division), the times, 6 February 1991
|
|
|
1991 |
7 |
1 |
p. 38-39 2 p. |
artikel |
41 |
Software and the law: The producer's viewpoint - A report on project scope study for the EC
|
Soave, Elissa |
|
1991 |
7 |
1 |
p. 31-32 2 p. |
artikel |
42 |
Software directive - in parliament
|
|
|
1991 |
7 |
1 |
p. 25-26 2 p. |
artikel |
43 |
Software Under Siege - Viruses and Worms
|
|
|
1991 |
7 |
1 |
p. 30- 1 p. |
artikel |
44 |
Spectacular computer crimes
|
|
|
1991 |
7 |
1 |
p. 48- 1 p. |
artikel |
45 |
Summary of the main changes
|
|
|
1991 |
7 |
1 |
p. 45- 1 p. |
artikel |
46 |
Summary of the report “computer crime in the Netherlands”
|
Charbon, F.H. |
|
1991 |
7 |
1 |
p. 2-6 5 p. |
artikel |
47 |
Survey reveals unix is the operating system of the future
|
|
|
1991 |
7 |
1 |
p. 39-40 2 p. |
artikel |
48 |
Swindle - How a man named John Grambling Jr cheated banks out of millions
|
|
|
1991 |
7 |
1 |
p. 48- 1 p. |
artikel |
49 |
Telecoms news
|
|
|
1991 |
7 |
1 |
p. 41- 1 p. |
artikel |
50 |
The caller id debate
|
|
|
1991 |
7 |
1 |
p. 37- 1 p. |
artikel |
51 |
The CBI response
|
|
|
1991 |
7 |
1 |
p. 23-24 2 p. |
artikel |
52 |
The state treaty as a basis for the creation of a data protection legislation on the territory of the GDR
|
|
|
1991 |
7 |
1 |
p. 18-19 2 p. |
artikel |
53 |
United nations un report on International credit transfer
|
|
|
1991 |
7 |
1 |
p. 44- 1 p. |
artikel |
54 |
US national group challenges crime laws application
|
|
|
1991 |
7 |
1 |
p. 13-14 2 p. |
artikel |