nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A legislative history of the communications act of 1934
|
|
|
|
7 |
2 |
p. 71 |
artikel |
2 |
Amongst friends in computers and law — A collection of essays in remembrance of Guy Vandenberghe
|
|
|
|
7 |
2 |
p. 96 |
artikel |
3 |
A review of the new Lloyds electronic and computer crime policy
|
Davies, David |
|
|
7 |
2 |
p. 82 |
artikel |
4 |
Australian computer virus prosecution Lynn v Barylak (February 1991) county court victoria
|
Hughes, Gordon |
|
|
7 |
2 |
p. 79-81 |
artikel |
5 |
Computer software protection/liability/law/forms
|
|
|
|
7 |
2 |
p. 81 |
artikel |
6 |
Computer viral risks — is the worst yet to come? an eerie look into the future
|
Zajac Jr., Bernard P. |
|
|
7 |
2 |
p. 77-78 |
artikel |
7 |
Editorial
|
|
|
|
7 |
2 |
p. 49 |
artikel |
8 |
Electronically recorded evidence — A guide to the use of tape and video recording in criminal and civil proceedings
|
|
|
|
7 |
2 |
p. 94 |
artikel |
9 |
Ethics and computing (Part II)
|
Zajac Jr., Bernard P. |
|
|
7 |
2 |
p. 83 |
artikel |
10 |
European initiatives in public procurement
|
Lewis, Mark |
|
|
7 |
2 |
p. 95-96 |
artikel |
11 |
Expert systems in auditing
|
|
|
|
7 |
2 |
p. 94 |
artikel |
12 |
How to perfect security interest in software
|
Wernick, Alan S. |
|
|
7 |
2 |
p. 61-62 |
artikel |
13 |
Information law
|
der Mirjana, Drakulić |
|
|
7 |
2 |
p. 63-65 |
artikel |
14 |
Intellectual property — A manager's guide
|
|
|
|
7 |
2 |
p. 65 |
artikel |
15 |
International legal protection for software
|
|
|
|
7 |
2 |
p. 53-59 |
artikel |
16 |
Legal and economic aspects of telecommunications
|
|
|
|
7 |
2 |
p. 71 |
artikel |
17 |
Legislative/regulatory developments in information technology and law from the US
|
Bequai, August |
|
|
7 |
2 |
p. 84-85 |
artikel |
18 |
Letter
|
|
|
|
7 |
2 |
p. 52 |
artikel |
19 |
Maintenance under the EEC directive on the legal protection of computer programs
|
Hart, Robert |
|
|
7 |
2 |
p. 51-52 |
artikel |
20 |
Managing information security — A non-technical management guide
|
Zajac Jr., Bernard P. |
|
|
7 |
2 |
p. 76 |
artikel |
21 |
New report correspondent
|
|
|
|
7 |
2 |
p. 76 |
artikel |
22 |
News and comment on recent developments from around the world
|
|
|
|
7 |
2 |
p. 86-94 |
artikel |
23 |
Nordic studies in information technology and law
|
|
|
|
7 |
2 |
p. 96 |
artikel |
24 |
Professional issues in software engineering
|
|
|
|
7 |
2 |
p. 69 |
artikel |
25 |
Protecting business ideas - an introduction
|
Irish, Vivien |
|
|
7 |
2 |
p. 60-61 |
artikel |
26 |
Security precautions for the disposal of confidential data
|
Bowles, Michael |
|
|
7 |
2 |
p. 75-76 |
artikel |
27 |
Seminar
|
|
|
|
7 |
2 |
p. 74 |
artikel |
28 |
System development auditing: A risk based approach
|
MacWillson, Alastair |
|
|
7 |
2 |
p. 72-74 |
artikel |
29 |
The EC commission green paper on satellite communications
|
Rowe, Heather |
|
|
7 |
2 |
p. 68-69 |
artikel |
30 |
The EC software directive: A user's perspective
|
White, Chris |
|
|
7 |
2 |
p. 50-51 |
artikel |
31 |
The first personal data protection act in Yugoslavia
|
Nelka Fikeys Krmić, L.L.M. |
|
|
7 |
2 |
p. 66-67 |
artikel |
32 |
The law of information technology in Europe 1992 — A comparison with the USA
|
|
|
|
7 |
2 |
p. 96 |
artikel |
33 |
The United Kingdom Duopoly review
|
Rowe, Heather |
|
|
7 |
2 |
p. 70-71 |
artikel |
34 |
Transborder flow of personal data within the EC
|
|
|
|
7 |
2 |
p. 96 |
artikel |