scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 1989"


Journal ArticleDOI
TL;DR: Roger Clarke develops ideas reporting on a proposed new product liability law in Australia and Michael Scott examines some liability issues in medicine with regard to patient care systems.

6 citations


Journal ArticleDOI
TL;DR: The Danish experience of issuing identity numbers to the general public is described and Peter Blume describes the Danish experience and the issues it raises.

3 citations


Journal ArticleDOI
TL;DR: A brief background is provided to consumer EFTS, as basis for subsequent discussion of security aspects, regulatory mechanisms and privacy implications, and a series of short articles addressing the subject of consumers EFTS are addressed.

2 citations


Journal ArticleDOI
TL;DR: It is shown that given enough hardware and software, the authors can protect most systems, however, they must remember that with every level of security they add, they suffer a decrease in the productivity of their users.

1 citations


Journal ArticleDOI

1 citations



Journal ArticleDOI
TL;DR: A brief analysis of the Act is provided, including an overview of the legal background against which the Act was adopted, a description of the operative provisions of the new law, and conclusions and recommendations for dealing with the legislative changes.

1 citations


Journal ArticleDOI
TL;DR: Risk management of computer use is presented in terms of quick solutions: a security “box” added to the hardware or a set of guidelines for company staff to follow, with little thought given to the people risks and what motivates individuals to act as they do.

1 citations


Journal ArticleDOI
TL;DR: The author argues that the new legal principles will have to be as radically different from past approaches to legal regulation as the new technology is different from the past media of communicating information.

1 citations


Journal ArticleDOI
TL;DR: Whether a liquidator might, under the Act, defeat the licensees' access claim or other expectations and what steps the license can take to minimise these problems is considered.

Journal ArticleDOI
TL;DR: Professor Ray August looks at the Commission's proposals from a US perspective and believes that certain changes need to be made to knock the draft into shape if harmonisation of rules (within the EC) is to be achieved.


Journal ArticleDOI
TL;DR: Martin Wasik examines the issue in respect of computers and computer use in the 1980's with extortionists perpetrating several ingenious attempts to raise money.