no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Computers in criminal justice — Realising the potential
|
Maclean, A.D. |
|
|
4 |
4 |
p. 25-26 |
article |
2 |
Documents
|
|
|
|
4 |
4 |
p. 38-40 |
article |
3 |
Editorial
|
|
|
|
4 |
4 |
p. 1 |
article |
4 |
High technology risks — The limitations of insurance
|
Davies, David |
|
|
4 |
4 |
p. 32-33 |
article |
5 |
ICC position statement on computer crime computer related crime and criminal law an international business view — Part I potential threats
|
|
|
|
4 |
4 |
p. 20-24 |
article |
6 |
Litigation: Reports on recent cases
|
Saxby, Stephen |
|
|
4 |
4 |
p. 41-44 |
article |
7 |
Protecting your confidential information
|
Lewis, David P. |
|
|
4 |
4 |
p. 28-31 |
article |
8 |
Submission from the British Computer Society
|
Hart, Robert |
|
|
4 |
4 |
p. 5-10 |
article |
9 |
Telecommunications terminal equipment: EEC commission opens the market
|
Scherer, Joachim |
|
|
4 |
4 |
p. 16-19 |
article |
10 |
The EC green paper — A comment
|
Greaves, David |
|
|
4 |
4 |
p. 5 |
article |
11 |
The fourth in a series of reports by David Davies analysing the experiences of those involved in a computer disaster
|
Davies, David |
|
|
4 |
4 |
p. 2-4 |
article |
12 |
The legal advisory board on the information market — A progress report
|
|
|
|
4 |
4 |
p. 11-15 |
article |
13 |
The legal implications of viruses
|
Zajac Jr., Bernard P. |
|
|
4 |
4 |
p. 36-37 |
article |
14 |
The security of network systems — A review
|
Henniker-Heaton, Sir Yvo |
|
|
4 |
4 |
p. 34-35 |
article |