scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 1992"


Journal ArticleDOI
TL;DR: The legal position concerning threats to, and protection of, computer security is examined and this will be followed by further sections on crime and privacy.

385 citations


Journal ArticleDOI
TL;DR: The authors consider that it might therefore be both entertaining and stimulating to provide readers with an overview of the world of cyberspace and to draw attention to some elements of the works where further analysis and discussion is called for.

23 citations



Journal ArticleDOI
TL;DR: The legal implications of putting typefaces into a form which the computer can manipulate, and the protection of the programs which perform the task and of the data which result are explored.

13 citations


Journal ArticleDOI
TL;DR: The outlines of the Proposal for a directive concerning the liability for services will be sketched and will on some points be compared with the Directive.

13 citations


Journal ArticleDOI
TL;DR: An analysis of the proposed Directive on the legal protection of databases, which will apply copyright protection to the collection or arrangement of material in electronic databases and provide the maker of a database with the right to prevent unfair extraction and use of otherwise unprotected material from the database for commercial purposes.

13 citations


Journal ArticleDOI
TL;DR: This article is intended to provide directors and executives of emerging technology companies with an overview of the process of finding and negotiating partnering arrangements and provides a framework for analyzing the technology company and its potential partners, outlining the steps required for successful partnering.

12 citations


Journal ArticleDOI
TL;DR: This article is intended to provide directors and executives of emerging technology companies with an overview of the process of finding and negotiating partnering arrangements and provides a framework for analyzing the technology company and its potential partners, outlining the steps required for successful partnering.

8 citations


Journal ArticleDOI
TL;DR: The aim of this article is not to provide answers to all legal aspects of Transborder Data Flows (or TBDF), but rather to provide guidance on the types of questions to be asked in the first place.

6 citations


Journal ArticleDOI
TL;DR: This paper by Kees Stuurman, Attorney, provides a brief overview of the main characteristics of the process of IT&T standardization (organizations involved, interests, backgrounds, types of standards, figures).

5 citations


Journal ArticleDOI
TL;DR: The article examines the investigation procedure, what the main concerns and problems are, along with the doubts over the effectiveness of the Computer Misuse Act 1990.

Journal ArticleDOI
TL;DR: Expert system technology is still in its infancy, and users would do well to take note of their legal ambivalence, and require the vendor to take all needed steps to limit the user's legal exposure.




Journal ArticleDOI
TL;DR: The second part of Professor Grant Hammond's article considering the evolution of law in its approach to the protection of ideas looks at the role of courts in this regard.

Journal ArticleDOI
TL;DR: The initiatives of the Organisation for Economic Cooperation and Development in relation to information security are discussed, raising some important questions about the way in which the social implications of technology tend to get submerged by more immediate concerns to exploit technological advances at all costs.

Journal ArticleDOI
TL;DR: The use of standard structured analysis techniques are discussed to provide modelling support for risk analysis, and structured risk analysis (SRA) is introduced, a technique originally developed at Hyperion by the authors.

Journal ArticleDOI
TL;DR: A survey of the significant legal and business issues raised by the Digital Signature Standard within the context of EDI is provided.

Journal ArticleDOI
TL;DR: Abstract Part 2 of Robert Bigelow's analysis of the financial and proprietary considerations applicable to computer crime, computer security and personal privacy in the USA.

Journal ArticleDOI
TL;DR: The present level of progress in the formulation of council policy on data protection and computer crime is analyzed in the Directorate of Legal Affairs, Council of Europe.