Found: 64
Select item for more details and to access through your institution.
PROBLEMS OF UNAUTHORIZED INTERFERENCE TO THE WORK OF UAV AND METHODS OF ITS SOLVING.
- Published in:
- Science-Based Technologies, 2016, v. 30, n. 2, p. 206, doi. 10.18372/2310-5461.30.10565
- By:
- Publication type:
- Article
Too Hot to Cybersquat: How Franchisors Can Use the Anticybersquatting Consumer Protection Act.
- Published in:
- Franchise Law Journal, 2012, v. 31, n. 4, p. 215
- By:
- Publication type:
- Article
RETOMIS LIGOMIS SERGANČIŲ PACIENTŲ TEISINĖS GALIMYBĖS GYDYTIS NEREGISTRUOTAIS VAISTAIS.
- Published in:
- Socialinių Mokslų Studijos, 2010, v. 2, n. 6, p. 207
- By:
- Publication type:
- Article
Role Refinement in Access Control: Model and Analysis.
- Published in:
- INFORMS Journal on Computing, 2014, v. 26, n. 4, p. 866, doi. 10.1287/ijoc.2014.0603
- By:
- Publication type:
- Article
RUNNING ON EMPTY: THE PROBLEM WITH POLITICIANS AND STEALING (MUSIC).
- Published in:
- Loyola of Los Angeles Entertainment Law Review, 2012, v. 32, n. 1, p. 75
- By:
- Publication type:
- Article
RAMEY V. DARKSIDE PRODUCTIONS, INC. No. 02-730 (GK), 2004 U.S. Dist. LEXIS 10107 (D.D.C. May 17, 2004).
- Published in:
- Berkeley Technology Law Journal, 2005, v. 20, n. 1, p. 336
- Publication type:
- Article
Lightweight secure storage model with fault-tolerance in cloud environment.
- Published in:
- Electronic Commerce Research, 2014, v. 14, n. 3, p. 271, doi. 10.1007/s10660-014-9140-9
- By:
- Publication type:
- Article
Firearm Storage Behaviors — Behavioral Risk Factor Surveillance System, Eight States, 2021–2022.
- Published in:
- MMWR: Morbidity & Mortality Weekly Report, 2024, v. 73, n. 23, p. 523, doi. 10.15585/mmwr.mm7323a1
- By:
- Publication type:
- Article
Issues of Digital Data Security in Library Environment.
- Published in:
- International Journal of Information Dissemination & Technology, 2011, v. 1, n. 4, p. 244
- By:
- Publication type:
- Article
BRIGHT LIGHTS, BRIGHT-LINE: TOWARD SEPARATION AND REFORMATION OF THE TRANSFORMATIVE USE ANALYSIS.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2014, v. 32, n. 3, p. 995
- By:
- Publication type:
- Article
ARTICLE THREE Rights and Responsibilities of RDFIs and Their Receivers: SECTION 3.12 Written Statement of Unauthorized Debit.
- Published in:
- Nacha Operating Rules & Guidelines, 2021, p. OR55
- Publication type:
- Article
ARTICLE ONE General Rules: SECTION 1.15 Limitation of Claims Based on Unauthorized Entries (new section).
- Published in:
- Nacha Operating Rules & Guidelines, 2021, p. OR5
- Publication type:
- Article
ARTICLE ONE General Rules: SECTION 1.11 Unauthorized Entry Fee.
- Published in:
- Nacha Operating Rules & Guidelines, 2021, p. OR4
- Publication type:
- Article
Revisions to the Nacha Operating Rules: Differentiating Unauthorized Return Reasons (Phase 2).
- Published in:
- Nacha Operating Rules & Guidelines, 2021, p. ORxxviii
- Publication type:
- Article
Network Administration Fees: Unauthorized Entry Fee.
- Published in:
- Nacha Operating Rules & Guidelines, 2021, p. ORxxiii
- Publication type:
- Article
Nacha Board of Directors Policy Statements: Nacha Board of Directors Interim Policy Statement on ACH Data Breach Notification Requirements.
- Published in:
- Nacha Operating Rules & Guidelines, 2021, p. ORiii
- Publication type:
- Article
An Intelligent Access Control System Based on Passive Radio-Frequency Identification.
- Published in:
- Sensors & Materials, 2017, v. 29, n. 4, p. 355, doi. 10.18494/SAM.2017.1516
- By:
- Publication type:
- Article
Holographic encryption system in the Fresnel domain with convergent random illumination.
- Published in:
- Optical Engineering, 2010, v. 49, n. 9, p. 095803, doi. 10.1117/1.3488043
- By:
- Publication type:
- Article
Six Kleptocratic Continua.
- Published in:
- Journal of Business Ethics, 2005, v. 60, n. 4, p. 411, doi. 10.1007/s10551-005-3778-0
- By:
- Publication type:
- Article
REDUCING UNAUTHORIZED DIGITAL DOWNLOADING OF MUSIC BY OBTAINING VOLUNTARY COMPLIANCE WITH COPYRIGHT LAW THROUGH THE REMOVAL OF CORPORATE POWER IN THE RECORDING INDUSTRY.
- Published in:
- Thomas Jefferson Law Review, 2012, v. 34, n. 2, p. 225
- By:
- Publication type:
- Article
PRAVNO NEDOPUŠTENA PRIMJENA ORUŽANE SILE U ODNOSIMA IZMEĐU DRŽAVA.
- Published in:
- Journal of Criminal Justice Issues / Kriminalisticke Teme, 2010, v. 10, n. 1/2, p. 43
- By:
- Publication type:
- Article
Property's End: Why Competition Policy Should Limit the Right of Publicity.
- Published in:
- Connecticut Law Review, 2011, v. 43, n. 3, p. 753
- By:
- Publication type:
- Article
The Problem of Trademark Dilution and the Antidilution Statutes.
- Published in:
- California Law Review, 1956, v. 44, n. 3, p. 439, doi. 10.2307/3478748
- By:
- Publication type:
- Article
COMMERCIAL APPROPRIATION OF A PERSON'S IMAGE: WELLS V ATOLL MEDIA (PTY) LTD (UNREPORTED 11961/2006) [2009] ZAWCHC 173 (9 NOVEMBER 2009).
- Published in:
- Potchefstroom Electronic Law Journal, 2011, v. 14, n. 2, p. 182, doi. 10.4314/pelj.v14i2.8
- By:
- Publication type:
- Article
VULNERABLE SOFTWARE: PRODUCT-RISK NORMS AND THE PROBLEM OF UNAUTHORIZED ACCESS.
- Published in:
- Journal of Law, Technology & Policy, 2012, v. 2012, n. 1, p. 45
- By:
- Publication type:
- Article
Tissue-sample payments anger lawmakers.
- Published in:
- Nature, 2006, v. 441, n. 7096, p. 912, doi. 10.1038/441912a
- By:
- Publication type:
- Article
SUPLANTACIÓN DE IDENTIDAD Y USO DE NOMBRE SUPUESTO EN EL COMERCIO TRADICIONAL Y ELECTRÓNICO.
- Published in:
- Revista de Derecho Penal y Criminologia, 2010, v. 3, p. 73
- By:
- Publication type:
- Article
Putting Lamborghini Doors on the Escalade: A Legal Analysis of the Unauthorized Use of Brand Names in Rap/Hip-Hop.
- Published in:
- Texas Review of Entertainment & Sports Law, 2007, v. 8, n. 1, p. 1
- By:
- Publication type:
- Article
Oblivious access control policies for cloud based data sharing systems.
- Published in:
- Computing, 2012, v. 94, n. 12, p. 915, doi. 10.1007/s00607-012-0206-z
- By:
- Publication type:
- Article
Unauthorized Access to Computerized Information.
- Published in:
- Business Lawyer, 2017, v. 73, n. 1, p. 199
- By:
- Publication type:
- Article
The fault of trespass.
- Published in:
- University of Toronto Law Journal, 2015, v. 65, n. 1, p. 48, doi. 10.3138/utlj.2637
- By:
- Publication type:
- Article
Promoting academic integrity at a Midwestern University: Critical review and current challenges.
- Published in:
- International Journal for Educational Integrity, 2008, v. 4, n. 2, p. 41, doi. 10.21913/ijei.v4i2.413
- By:
- Publication type:
- Article
Consenting to Computer Use.
- Published in:
- George Washington Law Review, 2016, v. 84, n. 6, p. 1500
- By:
- Publication type:
- Article
A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act.
- Published in:
- George Washington Law Review, 2016, v. 84, n. 6, p. 1442
- By:
- Publication type:
- Article
Authority and Authors and Codes.
- Published in:
- George Washington Law Review, 2016, v. 84, n. 6, p. 1616
- By:
- Publication type:
- Article
A Proposed Amendment to 18 U.S.C. § 1030--The Problem of Employee Theft.
- Published in:
- George Washington Law Review, 2016, v. 84, n. 6, p. 1591
- By:
- Publication type:
- Article
Measuring Computer Use Norms.
- Published in:
- George Washington Law Review, 2016, v. 84, n. 6, p. 1568
- By:
- Publication type:
- Article
Trademark Dilution: Empirical Measures for an Elusive Concept.
- Published in:
- Journal of Public Policy & Marketing, 2000, v. 19, n. 2, p. 265, doi. 10.1509/jppm.19.2.265.17137
- By:
- Publication type:
- Article
Confidentiality and Employment.
- Published in:
- ITNOW, 2010, v. 52, n. 5, p. 26, doi. 10.1093/itnow/bwq200
- By:
- Publication type:
- Article
NEVADA SUPREME COURT REVERSES GRANT OF SUMMARY JUDGMENT IN FAVOR OF BANK WHEN MATERIAL ISSUE OF FACT EXISTED OVER WHETHER CUSTOMER UNDER A DUTY TO EXAMINE ACCOUNT FOR UNAUTHORIZED ACTIVITY.
- Published in:
- Banking Law Journal, 2016, v. 133, n. 1, p. 44
- By:
- Publication type:
- Article
OBJECTIVE FACTOR OF FURTUM: CONTRECTATIO.
- Published in:
- Law & Justice Review, 2017, v. 9, n. 15, p. 81
- By:
- Publication type:
- Article
Plagiarism in Medical Science - The Forbidden Fruit.
- Published in:
- 2011
- By:
- Publication type:
- Opinion
Recognition of Research Participants' Need for Autonomy: Remembering the Legacy of Henrietta Lacks.
- Published in:
- 2020
- By:
- Publication type:
- journal article
Remixing the Remix: Fannish Appropriation and the Limits of Unauthorised Use.
- Published in:
- M/C Journal, 2013, v. 16, n. 4, p. 10, doi. 10.5204/mcj.659
- By:
- Publication type:
- Article
FAIR USE OF FOUL BALLS: MAJOR LEAGUE BASEBALL ADVANCED MEDIA AND ITS COUNTERPRODUCTIVE TAKEDOWN NOTICES TO FANS.
- Published in:
- Marquette Sports Law Review, 2016, v. 27, n. 1, p. 133
- By:
- Publication type:
- Article
Available, Granted, Revoked: A New Framework for Assessing Unauthorized Access Under the Computer Fraud and Abuse Act.
- Published in:
- University of Chicago Law Review, 2020, v. 87, n. 5, p. 1437
- By:
- Publication type:
- Article
Toward the Personalization of Copyright Law.
- Published in:
- University of Chicago Law Review, 2019, v. 86, n. 2, p. 527
- By:
- Publication type:
- Article
Novel assessment method for accessing private data in social network security services.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 7, p. 3307, doi. 10.1007/s11227-017-2018-6
- By:
- Publication type:
- Article
PERSONAL LIBERTY AND THE COMPUTER.
- Published in:
- Interfaces, 1971, v. 2, n. 1, p. 44, doi. 10.1287/inte.2.1.44
- By:
- Publication type:
- Article
Elder Financial Abuse in the News.
- Published in:
- Public Policy & Aging Report, 2012, v. 22, n. 1, p. 33, doi. 10.1093/ppar/22.1.33
- By:
- Publication type:
- Article