Authors: Jerrard, D.; Small, H.; Hope, K.; Conradi, M.
Source: Computer Law and Security Report, Volume 16, Number 3, 1 June 2000, pp. 195-201(7)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Discussion
Publication date: June 1, 2000