scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2003"


Journal ArticleDOI
TL;DR: This article seeks to summarize the key areas of online criminal activity in order to summarise the types of crime which the authors are dealing with, and to seek to place them in an appropriate context in which their impact can be judged.

47 citations


Journal ArticleDOI
TL;DR: Some of the legal implications of the popular consumer-to-consumer electronic commerce model, in particular the implication of the successful and popular auctions site eBay, are addressed.

20 citations


Journal ArticleDOI
TL;DR: Carnivore as discussed by the authors is a surveillance technology, a software program housed in a computer unit, which is installed by properly authorized FBI agents on a particular Internet Service Provider's (ISP) network.

14 citations


Journal ArticleDOI
TL;DR: How effectively the Directive on Privacy and Electronic Communications achieves this by examining the main provisions of that Directive relating to privacy and how they will change the current regime in the UK is considered.

12 citations


Journal ArticleDOI
TL;DR: The recent, and well-publicised Easyinternetcafe case appears part of a new trend on the part of copyright owners to take legal action against intermediaries as discussed by the authors, and is there a risk that ISPs in the UK could find themselves liable for copyright infringements committed by their users on peer-to-peer (P2P) file sharing networks?

9 citations


Journal ArticleDOI
TL;DR: The purpose of this article is to look in more depth at two key issues: will the Regulations make a difference to unsolicited email and SMS and what are the compliance effects for legitimate businesses in view of the DTI's guidance on the Privacy Directive.

9 citations


Journal ArticleDOI
TL;DR: In this paper, a process oriented analysis of agent activities, within the context of augmented reality, is presented, specifically in this case to supermarket shopping, focusing on contract and consumer protection law, as well as privacy.

8 citations


Journal ArticleDOI
TL;DR: The key question is whether the UK should follow the precedent set by the US legal community and utilise the civil courts to prevent interference or damage to websites or computer networks or whether theUK should remain resolutely committed to the prosecution of such offences through the criminal courts.

8 citations



Journal ArticleDOI
TL;DR: In this article, the opportunities offered by multi-application smart card schemes can be reconciled with data protection requirements in the first part, focusing on the regulatory framework of the smart card manufacturer and the legal requirements to develop less privacy-killing technologies.

7 citations


Journal ArticleDOI
TL;DR: Recent practical and legal developments in the ways of managing rights in digital content distributed over the Internet and through mobile services are examined.

Journal ArticleDOI
TL;DR: A process oriented legal analysis of two agents involved in advertising and contracting activities, within the context of augmented reality: the application of Internet technologies to a real world shopping experience is presented.

Journal ArticleDOI
TL;DR: A process oriented analysis of a shopping agent within the context of augmented reality: the application of Internet technologies to the real world, specifically in this case to supermarket shopping.

Journal ArticleDOI
TL;DR: It is suggested that the philosophical gap between European and American thinking about legal protection for personal privacy could be narrowed by placing greater emphasis on moral principles of justice in the European- US privacy dialogue.

Journal ArticleDOI
TL;DR: Recent legislative developments in this pivotal area of copyright protection in China are examined, including the promulgation background and main provisions of the Network Copyright Protection measure, which is the most relevant legal instrument to the issue of copyright infringement involving computer networks.

Journal ArticleDOI
TL;DR: The issues involved in major UK and multinational organisations “offshoring” a significant proportion of their business processes to low cost economies are explored.

Journal ArticleDOI
TL;DR: The comparison will examine how in the field of data protection public policy resolves the common tensions between upholding private rights and supporting commercial interests.

Journal ArticleDOI
TL;DR: The theme of public-private partnership underpinning emerging strategies for tackling IT security threats is considered, which further considers the theme of private-public partnerships underpinning public-sector involvement in tackling security threats.

Journal ArticleDOI
TL;DR: The High Court decision in the IT case of SAM Business Systems Limited v Hedley and Company provides useful guidance on the interpretation of software contracts, and follows the recent Court of Appeal decision in Watford Electronics v Sanderson CFL Limited by adopting an approach which is in favour of a freedom of contract stance.

Journal ArticleDOI
TL;DR: The current import regime is an amalgam of different rules for different products, so importers need to be careful that they are aware of the different rules and seek permission where required.

Journal ArticleDOI
TL;DR: The latest legislative initiative in the UK is the Electronic Commerce Regulations 2002 1 (the “Regulations”), which transposed the majority of provisions of the Electronic commerce Directive 2 ( the “Directive”) into UK law.


Journal ArticleDOI
TL;DR: A data retention policy is a bit of an enigmatic beast, and most companies recognize that it is vital to have a policy in place but what should it look like and how much detail is required?

Journal ArticleDOI
TL;DR: The complex issues that need to be understood by legislators in responding to software reverse engineering matters and how successfully these issues have been addressed in the Australian context are examined.

Journal ArticleDOI
TL;DR: The new UK rules and the opportunities they present for the financial services sector are explored in the light of the E-commerce Directive.

Journal ArticleDOI
TL;DR: This case note reports on the lessons of RACV Insurance Pty Ltd & Anor v Unisys Australia Ltd & Ors (2001) VSC 300 (24 August 2001) compared with Anglo Group plc v Winther Brown & Co Ltd & BML (Office Computers) Ltd [2000] EWHC Technology 127 (Toulmin CMG QC; 8 March 2000).

Journal ArticleDOI
TL;DR: The Asian Domain Name Dispute Resolution Centre has considered cases through both its Chinese and Hong Kong offices and, as of the beginning of November 2002, ten decisions had been issued.

Journal ArticleDOI
TL;DR: It is concluded that what is ‘adequate’ computer security will vary amongst the various sectors– government, military, banking, commercial etc.

Journal ArticleDOI
TL;DR: This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas.

Journal ArticleDOI
TL;DR: This paper will establish the key stages involved in establishing the foundations for a successful outsource project, and the pitfalls to avoid.