Works matching DE "COMPUTER network laws"
Results: 65
Individual Criminal Responsibility for Cyber Aggression.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 495, doi. 10.1093/jcsl/krw010
- By:
- Publication type:
- Article
Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 429, doi. 10.1093/jcsl/krw011
- By:
- Publication type:
- Article
'Proxies' and Cyberspace.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 383, doi. 10.1093/jcsl/krw015
- By:
- Publication type:
- Article
Google Sets Sail: Ocean-Based Server Farms and International Law.
- Published in:
- Connecticut Law Review, 2011, v. 43, n. 3, p. 709
- By:
- Publication type:
- Article
Towards the International Rule of Law in Cyberspace: Contrasting Chinese and Western Approaches.
- Published in:
- Chinese Journal of International Law, 2017, v. 16, n. 2, p. 271, doi. 10.1093/chinesejil/jmx011
- By:
- Publication type:
- Article
FROM CELL TO SLAMMER: FLAWS OF THE HYBRID THEORY.
- Published in:
- Arizona Law Review, 2011, v. 53, n. 2, p. 663
- By:
- Publication type:
- Article
A Brief Report on the Ethical and Legal Guides For Technology Use in Marriage and Family Therapy.
- Published in:
- 2017
- By:
- Publication type:
- journal article
HANDY: a hybrid association rules mining approach for network layer discovery of services for mobile ad hoc network.
- Published in:
- Wireless Networks (10220038), 2013, v. 19, n. 8, p. 1961, doi. 10.1007/s11276-013-0571-3
- By:
- Publication type:
- Article
Privacy of electronic medical information.
- Published in:
- 2000
- By:
- Publication type:
- commentary
Legal issues concerning electronic health information: privacy, quality, and liability.
- Published in:
- 1999
- By:
- Publication type:
- journal article
Transdisciplinaridade, Complexidade e Pluralidade Maquinímica: aportes para pensar o Ciberdireito.
- Published in:
- Revista Seqüência, 2011, v. 32, n. 63, p. 159, doi. 10.5007/2177-7055.2011v32n63159
- By:
- Publication type:
- Article
INTERNET OF THINGS WORKSHOP REPORT: SEPARATE STATEMENT OF COMMISSIONER MAUREEN K. OHLHAUSEN.
- Published in:
- Journal of Current Issues in Media & Telecommunications, 2015, v. 7, n. 2, p. 189
- Publication type:
- Article
REGULATION IN CYBERSPACE: CONTROL IN THE ONLINE ENVIRONMENT.
- Published in:
- 2007
- By:
- Publication type:
- Book Review
WARSHAK: A TEST CASE FOR THE INTERSECTION OF LAW ENFORCEMENT AND CYBER SECURITY.
- Published in:
- Journal of Law, Technology & Policy, 2010, v. 2010, n. 2, p. 345
- By:
- Publication type:
- Article
BRINGING NEUTRALITY TO NETWORK NEUTRALITY.
- Published in:
- Berkeley Technology Law Journal, 2007, v. 22, n. 1, p. 615
- By:
- Publication type:
- Article
ADDITIONAL DEVELOPMENTS -- CYBERLAW.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 543
- Publication type:
- Article
UNITED STATES V. AMERICAN LIBRARY ASS'N: THE CHILDREN'S INTERNET PROTECTION ACT, LIBRARY FILTERING, AND INSTITUTIONAL ROLES.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 555
- By:
- Publication type:
- Article
A SURVEY OF PERSONAL JURISDICTION BASED ON INTERNET ACTIVITY: A RETURN TO TRADITION.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 519
- By:
- Publication type:
- Article
RECENT DEVELOPMENTS -- FOREIGN & INTERNATIONAL LAW.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 613
- Publication type:
- Article
INTEL CORP. V. HAMIDI: TRESPASS TO CHATTELS AND A DOCTRINE OF CYBER-NUISANCE.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 427
- By:
- Publication type:
- Article
INTERNET AND DOMAIN NAME GOVERNANCE: ANTITRUST LITIGATION AND ICANN.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 387
- By:
- Publication type:
- Article
FOREWORD: THE RISE OF INTERNET INTEREST GROUP POLITICS.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 1
- By:
- Publication type:
- Article
@SOCIALMEDIA: SPEECH WITH A CLICK OF A BUTTON? #SOCIALSHARINGBUTTONS.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2013, v. 32, n. 1, p. 377
- By:
- Publication type:
- Article
Spare the messenger!
- Published in:
- Nature, 1995, v. 376, n. 6537, p. 200, doi. 10.1038/376200a0
- Publication type:
- Article
Cyberspace: The 21st Century Battlefield.
- Published in:
- National Security & Armed Conflict Law Review, 2016, v. 6, p. 233
- By:
- Publication type:
- Article
THE MODERNITY OF THE NATIONAL LEGAL FRAMEWORK ON REGULATING CYBERCRIME.
- Published in:
- Valahia University Law Study, 2012, v. 20, n. 2, p. 341
- By:
- Publication type:
- Article
THE LAW OF ARMED CONFLICT AND THE RESPONSIBLE CYBER COMMANDER.
- Published in:
- Vermont Law Review, 2013, v. 38, n. 1, p. 103
- By:
- Publication type:
- Article
Gaining Cyberspace "Sea Legs" : A Proposal for a Judicial Cyber Education Program in District Courts.
- Published in:
- University of San Francisco Law Review, 2014, v. 48, n. 3, p. 559
- By:
- Publication type:
- Article
Inhalt.
- Published in:
- Computer Law Review International, 2016, v. 17, n. 6, p. ii, doi. 10.9785/cri-2016-0601
- Publication type:
- Article
Titelei.
- Published in:
- Computer Law Review International, 2016, v. 17, n. 6, p. i, doi. 10.9785/cri-2016-frontmatter6
- Publication type:
- Article
Circular on the Issuance of the Implementation Regulations for the "Interim Provisions of the People's Republic of China on Management of the International Networking of Computer Information Networks".
- Published in:
- Chinese Law & Government, 2010, v. 43, n. 5, p. 21, doi. 10.2753/CLG0009-4609430503
- By:
- Publication type:
- Article
Sovereign Discourse on Cyber Conflict Under International Law.
- Published in:
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- By:
- Publication type:
- Article
A Tricky Situation: Deception in Cyberspace.
- Published in:
- Journal of Criminal Law, 2013, v. 77, n. 5, p. 417, doi. 10.1350/jcla.2013.77.5.867
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: An Introduction.
- Published in:
- Business Lawyer, 2020, v. 76, n. 1, p. 257
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Introduction.
- Published in:
- Business Lawyer, 2010, v. 66, n. 1, p. 155
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Domain Name Cases 2008.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 251
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Intellectual Property Cases 2008.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 229
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Introduction.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 227
- By:
- Publication type:
- Article
STATE SOVEREIGNTY AND SELF-DEFENSE IN CYBERSPACE: A NORMATIVE FRAMEWORK FOR BALANCING LEGAL RIGHTS.
- Published in:
- Emory International Law Review, 2012, v. 26, n. 2, p. 825
- By:
- Publication type:
- Article
LITTLE THINGS AND BIG CHALLENGES: INFORMATION PRIVACY AND THE INTERNET OF THINGS.
- Published in:
- American University Law Review, 2017, v. 66, n. 5, p. 1183
- By:
- Publication type:
- Article
Free Speech.
- Published in:
- Iowa Law Review, 2015, v. 100, n. 2, p. 501
- By:
- Publication type:
- Article
Perspectives for Cyber Strategists on Law for Cyberwar.
- Published in:
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 81
- By:
- Publication type:
- Article
Retaliatory Deterrence in Cyberspace.
- Published in:
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 62
- By:
- Publication type:
- Article
Rise of a Cybered Westphalian Age.
- Published in:
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 32
- By:
- Publication type:
- Article
Copyright infringement and users of P2P networks in multimedia applications: The case of the U.S. Copyright regime.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 1, p. 31, doi. 10.1007/s12083-012-0160-8
- By:
- Publication type:
- Article
EXCLUSION IN DIGITAL MARKETS.
- Published in:
- Michigan Telecommunications & Technology Law Review, 2018, v. 24, n. 2, p. 181
- By:
- Publication type:
- Article
Recognizing the Impact of E-Discovery Amendments on Electronic Records Management.
- Published in:
- Information Systems Management, 2009, v. 26, n. 4, p. 350, doi. 10.1080/10580530903245721
- By:
- Publication type:
- Article
Waking Sleeping Beauty? Exploring the Challenges of Cyber-Deterrence by Punishment.
- Published in:
- Loyola of Los Angeles International & Comparative Law Review, 2023, v. 46, n. 1, p. 45
- By:
- Publication type:
- Article
PRECONDITIONS FOR LEGAL REGULATION OF PERSONAL IDENTIFICATION IN CYBERSPACE.
- Published in:
- Jurisprudence / Jurisprudencija, 2011, v. 18, n. 2, p. 703
- By:
- Publication type:
- Article
THE CLOUD OF WAR: SECURING THE OPERATIONAL DOMAIN OF CYBERSPACE WITH A ROBUST MILITARY COMMAND.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 515
- By:
- Publication type:
- Article