Last update: Wed Sep 26 02:07:32 MDT 2018
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Kay:1992:CCL,
author = "D. G. Kay",
title = "A course in computer law",
journal = j-SIGCSE,
volume = "24",
number = "1",
pages = "252--254",
month = mar,
year = "1992",
CODEN = "SIGSD3",
DOI = "https://doi.org/10.1145/135250.134560",
ISSN = "0097-8418 (print), 2331-3927 (electronic)",
ISSN-L = "0097-8418",
bibdate = "Sat Nov 17 18:57:17 MST 2012",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/sigcse1990.bib",
abstract = "We describe a course for computer science students
that covers the legal issues that apply to computing,
from intellectual property protection to liability for
system failures to computer crime.",
acknowledgement = ack-nhfb,
fjournal = "SIGCSE Bulletin (ACM Special Interest Group on
Computer Science Education)",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J688",
}
Related entries
- apply,
24(4)11,
25(2)59,
25(3)26,
26(1)309,
27(1)186,
27(1)273,
28(1)73,
28(1)93,
28(1)266,
29(1)145,
29(1)204,
29(1)390,
29(2)39,
29(3)11,
30(1)6,
30(1)112,
31(1)43,
31(1)242,
31(1)326,
31(3)99
- cover,
22(3)7,
22(4)5,
23(3)36,
23(4)31,
24(1)15,
24(1)87,
25(4)13,
26(1)213,
27(1)82,
27(1)273,
29(1)53,
29(1)82,
29(1)209,
29(1)233,
29(2)54,
30(1)20,
30(1)97,
30(1)161,
31(1)252,
31(3)155
- failure,
22(3)47,
26(1)97,
28(1)214,
30(1)212,
30(3)223
- intellectual,
28(4)55,
30(1)252,
30(3)90,
31(3)115,
31(4)35
- law,
29(2)35
- legal,
26(1)253,
26(1)300,
29(3)91,
31(1)22,
31(3)115
- liability,
30(1)58
- property,
22(3)7,
26(1)92,
26(3)22,
27(1)24,
27(1)56,
28(1)112,
29(3)133,
30(3)46,
30(4)46,
31(1)100,
31(3)115
- protection,
31(3)115