Author: J.E.J Prins and others Source: Computer Law and Security Review. Vol. 28, no. 3, 2012. pp. 273-282. Category: Information Technology Date of Journal Issue: March 2013