Author: Nancy J. King Source: Computer Law and Security Review. Vol. 28, no. 3, 2012. pp. 308-319. Category: Information Technology Date of Journal Issue: March 2013