Showing papers in "Computer Law & Security Review in 1989"
••
TL;DR: Roger Clarke develops ideas reporting on a proposed new product liability law in Australia and Michael Scott examines some liability issues in medicine with regard to patient care systems.
6 citations
••
TL;DR: The Danish experience of issuing identity numbers to the general public is described and Peter Blume describes the Danish experience and the issues it raises.
3 citations
••
TL;DR: A brief background is provided to consumer EFTS, as basis for subsequent discussion of security aspects, regulatory mechanisms and privacy implications, and a series of short articles addressing the subject of consumers EFTS are addressed.
2 citations
••
TL;DR: It is shown that given enough hardware and software, the authors can protect most systems, however, they must remember that with every level of security they add, they suffer a decrease in the productivity of their users.
1 citations
••
1 citations
••
TL;DR: A brief analysis of the Act is provided, including an overview of the legal background against which the Act was adopted, a description of the operative provisions of the new law, and conclusions and recommendations for dealing with the legislative changes.
1 citations
••
[...]
TL;DR: Risk management of computer use is presented in terms of quick solutions: a security “box” added to the hardware or a set of guidelines for company staff to follow, with little thought given to the people risks and what motivates individuals to act as they do.
1 citations
••
TL;DR: The author argues that the new legal principles will have to be as radically different from past approaches to legal regulation as the new technology is different from the past media of communicating information.
1 citations
••
TL;DR: Whether a liquidator might, under the Act, defeat the licensees' access claim or other expectations and what steps the license can take to minimise these problems is considered.
••
TL;DR: Professor Ray August looks at the Commission's proposals from a US perspective and believes that certain changes need to be made to knock the draft into shape if harmonisation of rules (within the EC) is to be achieved.
••
••
TL;DR: Martin Wasik examines the issue in respect of computers and computer use in the 1980's with extortionists perpetrating several ingenious attempts to raise money.