Authors: Turner, M.; Traynor, M.; Smith, H.
Source: Computer Law and Security Report, Volume 19, Number 2, March 2003, pp. 112-120(9)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Discussion
Publication date: March 1, 2003