Search results for: Kit Burden
Computer Law & Security Review > 2018 > 34 > 1 > 166-174
Computer Law & Security Review > 2017 > 33 > 6 > 884-891
Computer Law & Security Review > 2017 > 33 > 5 > 729-738
Computer Law & Security Review > 2017 > 33 > 4 > 564-568
Computer Law & Security Review > 2017 > 33 > 3 > 396-400
Computer Law & Security Review > 2017 > 33 > 2 > 256-260
Computer Law & Security Review > 2017 > 33 > 1 > 112-118
Computer Law & Security Review > 2016 > 32 > 6 > 907-911
Computer Law & Security Review > 2016 > 32 > 5 > 778-783
Computer Law & Security Review > 2016 > 32 > 4 > 650-654
Computer Law & Security Review > 2016 > 32 > 3 > 540-545
Computer Law & Security Review > 2016 > 32 > 2 > 363-368
Computer Law & Security Review > 2016 > 32 > 1 > 156-161
Computer Law & Security Review: The International Journal of Technology... > 2015 > 31 > 6 > 810-815
Computer Law & Security Review: The International Journal of Technology... > 2015 > 31 > 5 > 701-704
Computer Law & Security Review: The International Journal of Technology... > 2015 > 31 > 4 > 556-562
Computer Law & Security Review: The International Journal of Technology... > 2015 > 31 > 2 > 293-299
Computer Law & Security Review: The International Journal of Technology... > 2015 > 31 > 1 > 139-145
Computer Law & Security Review: The International Journal of Technology... > 2014 > 30 > 2 > 196-198