Author: Roger Clarke Source: Computer law and security report. Vol. 22, no. 4, 2006, pp. 288-298 Category: Information Technology Date of Journal Issue: March 2007