Facet browsing currently unavailable
Page 1 of 4396 results
Sort by: relevance publication year
A review of telecom markets in the EU: What did the European Commission learn or not from the past? JOURNAL ARTICLE published December 2014 in Computer Law & Security Review |
The EU PNR framework decision proposal: Towards completion of the PNR processing scene in Europe JOURNAL ARTICLE published July 2010 in Computer Law & Security Review |
Critiquing the U.S. characterization, attribution and retaliation laws and policies for cyberattacks JOURNAL ARTICLE published September 2023 in Computer Law & Security Review |
Facial recognition technology, democracy and human rights JOURNAL ARTICLE published September 2023 in Computer Law & Security Review |
INTELLECTUAL PROPERTY — RIGHTS MANAGEMENT JOURNAL ARTICLE published July 2002 in Computer Law & Security Review |
Computer contracts JOURNAL ARTICLE published July 1992 in Computer Law & Security Review |
Report on marketing and distributor agreements JOURNAL ARTICLE published November 1985 in Computer Law & Security Review |
Telecommunications law: Australian perspectives JOURNAL ARTICLE published November 1991 in Computer Law & Security Review |
Offshoring — which way to India? JOURNAL ARTICLE published September 2003 in Computer Law & Security Review |
The patentability of business methods in Australia and the United States – The difficulties continue JOURNAL ARTICLE published January 2007 in Computer Law & Security Review |
CASE REPORT — I JOURNAL ARTICLE published May 2001 in Computer Law & Security Review |
Licensing embedded programs JOURNAL ARTICLE published September 1993 in Computer Law & Security Review |
The legal protection of trade secrets JOURNAL ARTICLE published November 1992 in Computer Law & Security Review |
European National News JOURNAL ARTICLE published September 2020 in Computer Law & Security Review |
Police technology JOURNAL ARTICLE published March 1990 in Computer Law & Security Review |
Stop press JOURNAL ARTICLE published July 1987 in Computer Law & Security Review |
Thinking of data protection law's subject matter as a complex adaptive system: A heuristic display JOURNAL ARTICLE published April 2015 in Computer Law & Security Review |
Editorial JOURNAL ARTICLE published May 1994 in Computer Law & Security Review |
Hackers — Heroes of the computer revolution JOURNAL ARTICLE published March 1986 in Computer Law & Security Review |
Intellectual Property JOURNAL ARTICLE published October 2000 in Computer Law & Security Review |