scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 1990"


Journal ArticleDOI
TL;DR: It is argued that admissibility and authentication are separate issues, and that the failure to treat them independently gives rise to needless confusion and directs attention away from the urgent need for clear rules governing the authentication of computer evidence.

12 citations



Journal ArticleDOI
TL;DR: The issue of liability for the provision and exploitation of automated information services was the focus of attention of the Legal Advisory Board (LAB) during its May 1989 meeting.

3 citations


Journal ArticleDOI
TL;DR: The implications for computer crime risks of the development of computer technology and its application are examined, and some of the new types of losses being experienced are reviewed, and conclusions on the risk characteristics of thenew technology are drawn.

2 citations



Journal ArticleDOI
TL;DR: This article considers security from a broad perspective, and questions the conventional assumptions of system impregnbility and infallibility of EFT/POS.

2 citations