Author: Pryor, A.
Source: Computer Law and Security Report, Volume 15, Number 2, 1 March 1999, pp. 115-116(2)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Research Article
Publication date: March 1, 1999