Showing papers in "Computer Law & Security Review in 1990"
••
TL;DR: It is argued that admissibility and authentication are separate issues, and that the failure to treat them independently gives rise to needless confusion and directs attention away from the urgent need for clear rules governing the authentication of computer evidence.
12 citations
••
TL;DR: The issue of liability for the provision and exploitation of automated information services was the focus of attention of the Legal Advisory Board (LAB) during its May 1989 meeting.
3 citations
••
TL;DR: The implications for computer crime risks of the development of computer technology and its application are examined, and some of the new types of losses being experienced are reviewed, and conclusions on the risk characteristics of thenew technology are drawn.
2 citations
••
2 citations
••
TL;DR: This article considers security from a broad perspective, and questions the conventional assumptions of system impregnbility and infallibility of EFT/POS.
2 citations
••
2 citations
••
1 citations
••