@article {Nissan:2013:1360-0834:213, author = "Nissan, Ephraim", title = "Legal evidence and advanced computing techniques for combatting crime: an overview", journal = "Information & Communications Technology Law", volume = "22", number = "3", year = "2013", itemtype = "article", issn = "1360-0834", eissn = "1469-8404", publication date ="2013-10-01T00:00:00", pages = "213-250", url = "https://www.ingentaconnect.com/content/routledg/cict/2013/00000022/00000003/art00001" parent_itemid = "infobike://routledg/cict", publishercode ="routledg" } @article {Zimmer:2013:1360-0834:251, author = "Zimmer, Scott", title = "The right to print arms: the effect on civil liberties of government restrictions on computer-aided design files shared on the Internet", journal = "Information & Communications Technology Law", volume = "22", number = "3", year = "2013", itemtype = "article", issn = "1360-0834", eissn = "1469-8404", publication date ="2013-10-01T00:00:00", pages = "251-263", url = "https://www.ingentaconnect.com/content/routledg/cict/2013/00000022/00000003/art00002" parent_itemid = "infobike://routledg/cict", publishercode ="routledg" } @article {Lodder:2013:1360-0834:264, author = "Lodder, Arno R.", title = "Ten Commandments of Internet Law revisited: basic principles for Internet Lawyers", journal = "Information & Communications Technology Law", volume = "22", number = "3", year = "2013", itemtype = "article", issn = "1360-0834", eissn = "1469-8404", publication date ="2013-10-01T00:00:00", pages = "264-276", url = "https://www.ingentaconnect.com/content/routledg/cict/2013/00000022/00000003/art00003" parent_itemid = "infobike://routledg/cict", publishercode ="routledg" } @article {Vasigh:2013:1360-0834:277, author = "Vasigh, Morgan", title = "Smile, you are under arrest: the misappropriation and misuse of mug shots online", journal = "Information & Communications Technology Law", volume = "22", number = "3", year = "2013", itemtype = "article", issn = "1360-0834", eissn = "1469-8404", publication date ="2013-10-01T00:00:00", pages = "277-298", url = "https://www.ingentaconnect.com/content/routledg/cict/2013/00000022/00000003/art00004" parent_itemid = "infobike://routledg/cict", publishercode ="routledg" } @article {Selvadurai:2013:1360-0834:299, author = "Selvadurai, Niloufer", title = "Protecting online information privacy in a converged digital environment the merits of the new Australian privacy principles", journal = "Information & Communications Technology Law", volume = "22", number = "3", year = "2013", itemtype = "article", issn = "1360-0834", eissn = "1469-8404", publication date ="2013-10-01T00:00:00", pages = "299-314", url = "https://www.ingentaconnect.com/content/routledg/cict/2013/00000022/00000003/art00005" parent_itemid = "infobike://routledg/cict", publishercode ="routledg" } @article {Ellis:2013:1360-0834:315, author = "Ellis, Chris", title = "Referring or linking to liability: does the Digital Millennium Copyright Act really mean what it says?", journal = "Information & Communications Technology Law", volume = "22", number = "3", year = "2013", itemtype = "article", issn = "1360-0834", eissn = "1469-8404", publication date ="2013-10-01T00:00:00", pages = "315-330", url = "https://www.ingentaconnect.com/content/routledg/cict/2013/00000022/00000003/art00006" parent_itemid = "infobike://routledg/cict", publishercode ="routledg" }