Showing papers in "Computer Law & Security Review in 1992"
••
[...]
TL;DR: The legal position concerning threats to, and protection of, computer security is examined and this will be followed by further sections on crime and privacy.
385 citations
••
[...]
TL;DR: The authors consider that it might therefore be both entertaining and stimulating to provide readers with an overview of the world of cyberspace and to draw attention to some elements of the works where further analysis and discussion is called for.
23 citations
••
TL;DR: The legal implications of putting typefaces into a form which the computer can manipulate, and the protection of the programs which perform the task and of the data which result are explored.
13 citations
••
TL;DR: The outlines of the Proposal for a directive concerning the liability for services will be sketched and will on some points be compared with the Directive.
13 citations
••
TL;DR: An analysis of the proposed Directive on the legal protection of databases, which will apply copyright protection to the collection or arrangement of material in electronic databases and provide the maker of a database with the right to prevent unfair extraction and use of otherwise unprotected material from the database for commercial purposes.
13 citations
••
TL;DR: This article is intended to provide directors and executives of emerging technology companies with an overview of the process of finding and negotiating partnering arrangements and provides a framework for analyzing the technology company and its potential partners, outlining the steps required for successful partnering.
12 citations
••
TL;DR: This article is intended to provide directors and executives of emerging technology companies with an overview of the process of finding and negotiating partnering arrangements and provides a framework for analyzing the technology company and its potential partners, outlining the steps required for successful partnering.
8 citations
••
TL;DR: The aim of this article is not to provide answers to all legal aspects of Transborder Data Flows (or TBDF), but rather to provide guidance on the types of questions to be asked in the first place.
6 citations
••
TL;DR: This paper by Kees Stuurman, Attorney, provides a brief overview of the main characteristics of the process of IT&T standardization (organizations involved, interests, backgrounds, types of standards, figures).
5 citations
••
TL;DR: The article examines the investigation procedure, what the main concerns and problems are, along with the doubts over the effectiveness of the Computer Misuse Act 1990.
••
TL;DR: Expert system technology is still in its infancy, and users would do well to take note of their legal ambivalence, and require the vendor to take all needed steps to limit the user's legal exposure.
••
TL;DR: The second part of Professor Grant Hammond's article considering the evolution of law in its approach to the protection of ideas looks at the role of courts in this regard.
••
TL;DR: The initiatives of the Organisation for Economic Cooperation and Development in relation to information security are discussed, raising some important questions about the way in which the social implications of technology tend to get submerged by more immediate concerns to exploit technological advances at all costs.
••
TL;DR: The use of standard structured analysis techniques are discussed to provide modelling support for risk analysis, and structured risk analysis (SRA) is introduced, a technique originally developed at Hyperion by the authors.
••
TL;DR: A survey of the significant legal and business issues raised by the Digital Signature Standard within the context of EDI is provided.
••
TL;DR: Abstract Part 2 of Robert Bigelow's analysis of the financial and proprietary considerations applicable to computer crime, computer security and personal privacy in the USA.
••
TL;DR: The present level of progress in the formulation of council policy on data protection and computer crime is analyzed in the Directorate of Legal Affairs, Council of Europe.