Author: Saxby, S.
Source: Computer Law and Security Report, Volume 16, Number 1, January 2000, pp. 55-72(18)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Research Article
Publication date: January 1, 2000