Author: Kevin M. Rogers Source: Computer law and security report. Vol. 22, no. 3, 2006, pp. 228-240 Category: Information Technology Date of Journal Issue: September 2006