共 48 条
[21]
Dumortier J., 1999, Computer Law and Security Report, V15, P106, DOI 10.1016/S0267-3649(99)80022-3
[22]
GRIPMAN DL, 1999, J MARSHALL J COMPUTE, V17, P769
[23]
HARTLEY JA, 2003, PRACT LAWYER, V49, P51
[24]
Hays MJ, 2001, NOTRE DAME LAW REV, V76, P1183
[25]
HODKOWSKI WA, 1997, COMPUTER HIGH TECH L, V13, P217
[26]
JASON RR, 1999, J MARSHALL J COMPUTE, V17, P873
[27]
Jueneman R. R., 1998, Jurimetrics: Journal of Law, Science and Technology, V38, P427
[28]
Julia-Barcelo R., 1998, Computer Law and Security Report, V14, P79, DOI 10.1016/S0267-3649(97)82130-9
[29]
KEEFE CP, 1997, VIRGINIA J LAW TECHN, V1
[30]
Koger Jennifer L., 2001, TRANSATL L CONT PROB, V11, P491