Author: Stephen Mason and Catherine Casserley Source: Computer law and security report. Vol. 21, no. 4, 2005, pp. 298-309. Category: Information Technology Date of Journal Issue: December 2005