Author: Kim Frost and Henrik Udsen Source: Computer law and security report. Vol. 22, no. 3, 2006, pp. 241-249. Category: Information Technology Date of Journal Issue: September 2006