Works matching Computer fraud
Results: 441
Falsul şi frauda informatică.
- Published in:
- Criminal Law Writings / Caiete de Drept Penal, 2011, n. 3, p. 47
- By:
- Publication type:
- Article
The modus operandi of transnational computer fraud: a crime script analysis in Vietnam.
- Published in:
- Trends in Organized Crime, 2022, v. 25, n. 2, p. 226, doi. 10.1007/s12117-021-09422-1
- By:
- Publication type:
- Article
LEGAL PROVISIONS REGARDING THE JUDICIAL ANALYSIS OF COMPUTER FORGERY AND COMPUTER FRAUD.
- Published in:
- Law Review: Judicial Doctrine & Case-Law, 2017, v. 7, n. 2, p. 66
- By:
- Publication type:
- Article
Exploring Employees' Computer Fraud Behaviors using the Fraud Triangle Theory.
- Published in:
- Pacific Asia Journal of the Association for Information Systems, 2022, v. 14, n. 4, p. 100, doi. 10.17705/1pais.14404
- By:
- Publication type:
- Article
Computer fraud.
- Published in:
- European Science Review, 2015, n. 1/2, p. 126
- By:
- Publication type:
- Article
HACKING AND COMPUTER CRIMES COMPUTER FRAUD - A COMPARATIVE LOOK AT THE NEW CRIMINAL CODE AND THE CRIMINAL CODE OF THE REPUBLIC OF MOLDOVA.
- Published in:
- AGORA International Journal of Juridical Sciences, 2014, v. 2, p. 29
- By:
- Publication type:
- Article
Frauda informatica (art. 49, Legea nr. 161/2003). Neacordarea daunelor materiale de instanta de fond. Daune morale acordate in cazul unei infractiuni contra patrimoniului. Aprecierea existentei unei culpe comune in cazul prejudiciului moral.
- Published in:
- Criminal Law Writings / Caiete de Drept Penal, 2012, n. 2, p. 139
- By:
- Publication type:
- Article
COMPUTER SYSTEMS FRAUD - COMPUTER SYSTEMS FRAUD IN THE ERA OF BIG DATA AND EHRS.
- Published in:
- Touro Law Review, 2017, v. 33, n. 2, p. 541
- By:
- Publication type:
- Article
COMPUTER FRAUD AND ABUSE OR PROSECUTORIAL FRAUD AND ABUSE: TIME FOR CHANGE.
- Published in:
- Journal of Law, Technology & the Internet, 2014, v. 6, n. 1, p. 67
- By:
- Publication type:
- Article
United States v. Nosal and the CFAA: What Does DailySudoku.com Have to Do with Computer Fraud?
- Published in:
- New England Law Review, 2014, v. 48, n. 2, p. 421
- By:
- Publication type:
- Article
AARON'S LAW: BRINGING SENSIBILITY TO THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Southern Illinois University Law Journal, 2014, v. 38, n. 3, p. 469
- By:
- Publication type:
- Article
The Computer Fraud and Abuse Act: Protecting the United States from Cyber-Attacks, Fake Dating Profiles, and Employees Who Check Facebook at Work.
- Published in:
- National Security & Armed Conflict Law Review, 2014, p. 145
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: AN ATTRACTIVE BUT RISKY ALTERNATIVE TO TEXAS TRADE SECRET LAW.
- Published in:
- St. Mary's Law Journal, 2014, v. 45, n. 3, p. 491
- By:
- Publication type:
- Article
"OBTAINING" THE RIGHT RESULT: A NOVEL INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT THAT PROVIDES LIABILITY FOR INSIDER THEFT WITHOUT OVERBREADTH.
- Published in:
- 2014
- By:
- Publication type:
- Opinion
Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests.
- Published in:
- Information Systems Frontiers, 2017, v. 19, n. 3, p. 443, doi. 10.1007/s10796-017-9752-4
- By:
- Publication type:
- Article
"WHAT DOES CFAA MEAN AND WHY SHOULD I CARE?"--A PRIMER ON THE COMPUTER FRAUD AND ABUSE ACT FOR CIVIL LITIGATORS.
- Published in:
- South Carolina Law Review, 2011, v. 63, n. 1, p. 141
- By:
- Publication type:
- Article
USA: Preliminary Injunction on basis of Computer Fraud and Abuse Act.
- Published in:
- Computer Law Review International, 2022, v. 23, n. 3, p. 75, doi. 10.9785/cri-2022-230304
- Publication type:
- Article
It's Not Just Physical: Finding a Neutral Interpretation of Authorization Under the Computer Fraud and Abuse Act.
- Published in:
- ABA Journal of Labor & Employment Law, 2014, v. 29, n. 2, p. 373
- By:
- Publication type:
- Article
A Review on Computer Technology Applications in Fraud Detection and Prevention.
- Published in:
- Management & Accounting Review, 2017, v. 16, n. 2, p. 59, doi. 10.24191/mar.v16i2.671
- By:
- Publication type:
- Article
A FORTRESS MADE OF CLOUDS: COPYRIGHT LAW, THE COMPUTER FRAUD AND ABUSE ACT, AND CLOUD COMPUTING.
- Published in:
- Southern Law Journal, 2016, v. 26, n. 2, p. 191
- By:
- Publication type:
- Article
Available, Granted, Revoked: A New Framework for Assessing Unauthorized Access Under the Computer Fraud and Abuse Act.
- Published in:
- University of Chicago Law Review, 2020, v. 87, n. 5, p. 1437
- By:
- Publication type:
- Article
Preventing Fraud Using Computer Networks.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 63, doi. 10.5604/20805268.1094062
- By:
- Publication type:
- Article
Slovenian Criminal Code and Modern Criminal Law Approach to Computer-related Fraud: A Comparative Legal Analysis.
- Published in:
- International Journal of Cyber Criminology, 2012, v. 6, n. 2, p. 984
- By:
- Publication type:
- Article
Standing Under the Computer Fraud and Abuse Act.
- Published in:
- Penn State Law Review, 2020, v. 124, n. 3, p. 743
- By:
- Publication type:
- Article
Hacking into the Computer Fraud and Abuse Act: The CFAA at 30.
- Published in:
- 2016
- By:
- Publication type:
- Speech
SOCIAL MEDIA AND FEDERAL PROSECUTION: A CIRCUIT SPLIT ON CYBERCRIME AND THE INTERPRETATION OF THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- University of Cincinnati Law Review, 2018, v. 86, n. 1, p. 315
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT OR THE MODERN CRIMINAL AT WORK: THE DANGERS OF FACEBOOK FROM YOUR CUBICLE.
- Published in:
- University of Cincinnati Law Review, 2013, v. 82, n. 1, p. 359
- By:
- Publication type:
- Article
WHISTLEBLOWER? MORE LIKE CYBERCRIMINAL: THE COMPUTER FRAUD AND ABUSE ACT AS APPLIED TO SARBANES-OXLEY WHISTLEBLOWERS.
- Published in:
- Rutgers Computer & Technology Law Journal, 2016, v. 42, n. 1, p. 120
- By:
- Publication type:
- Article
COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 905
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: PUNISHING HACKERS AND SOLVING EMPLOYMENT DISPUTES IN THE SAME STATUTE.
- Published in:
- Northern Kentucky Law Review, 2017, v. 44, n. 1, p. 83
- By:
- Publication type:
- Article
CTRL + SHIFT: DEFINING AUTHORIZATION UNDER THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- George Mason Law Review, 2019, v. 26, n. 3, p. 965
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: HACKING INTO THE AUTHORIZATION DEBATE.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2013, v. 53, n. 4, p. 447
- By:
- Publication type:
- Article
NARROWING IT DOWN TO ONE NARROW VIEW: CLARIFYING AND LIMITING THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Charleston Law Review, 2013, v. 7, n. 3, p. 489
- By:
- Publication type:
- Article
KEEPING GATES DOWN: FURTHER NARROWING THE COMPUTER FRAUD AND ABUSE ACT IN THE WAKE OF VAN BUREN.
- Published in:
- William & Mary Business Law Review, 2022, v. 14, n. 1, p. 215
- By:
- Publication type:
- Article
EMPLOYEE ACCESS "WITHOUT AUTHORIZATION" UNDER THE COMPUTER FRAUD AND ABUSE ACT: A CASE STUDY.
- Published in:
- 2013
- By:
- Publication type:
- Case Study
SOCIAL ENGINEERING OR COMPUTER FRAUD? In cyber insurance, the difference matters.
- Published in:
- Bench & Bar of Minnesota, 2022, v. 79, n. 8, p. 10
- By:
- Publication type:
- Article
Survey of Computer Fraud and Abuse Act Cases.
- Published in:
- Business Lawyer, 2011, v. 67, n. 1, p. 321
- By:
- Publication type:
- Article
A HYBRID APPROACH TO ANALYZING AUTHORIZATION IN THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Journal of Science & Technology Law, 2015, v. 21, n. 2, p. 357
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: AS CONFLICT RAGES ON, THE UNITED STATES v. NOSAL RULING PROVIDES EMPLOYERS CLEAR GUIDANCE.
- Published in:
- Loyola of Los Angeles Law Review, 2014, v. 47, n. 3, p. 901
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: HOW COMPUTER SCIENCE CAN HELP WITH THE PROBLEM OF OVERBREADTH.
- Published in:
- Harvard Journal of Law & Technology, 2010, v. 24, n. 1, p. 233
- By:
- Publication type:
- Article
CAUSING DAMAGE WITHOUT AUTHORIZATION: THE LIMITATIONS OF CURRENT JUDICIAL INTERPRETATIONS OF EMPLOYEE AUTHORIZATION UNDER THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- William & Mary Law Review, 2011, v. 52, n. 4, p. 1369
- By:
- Publication type:
- Article
A THREAT TO OR PROTECTION OF AGENCY RELATIONSHIPS? THE IMPACT OF THE COMPUTER FRAUD AND ABUSE ACT ON BUSINESSES.
- Published in:
- American University Business Law Review, 2015, v. 4, n. 3, p. 531
- By:
- Publication type:
- Article
Abusing the Computer Fraud and Abuse Act: Why Broad Interpretations of the CFAA Fail.
- Published in:
- Hamline Law Review, 2013, v. 36, n. 1, p. 1
- By:
- Publication type:
- Article
LENITY ON ME: LVRC HOLDINGS LLC V. BREKKA POINTS THE WAY TOWARD DEFINING AUTHORIZATION AND SOLVING THE SPLIT OVER THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Georgia State University Law Review, 2011, v. 27, n. 2, p. 379
- By:
- Publication type:
- Article
PROSECUTING THE CIA: DOES THE COMPUTER FRAUD AND ABUSE ACT ALLOW FOR LIABILITY?
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- By:
- Publication type:
- Article
CYBERCRIME: AN OVERVIEW OF THE FEDERAL COMPUTER FRAUD AND ABUSE STATUTE AND RELATED FEDERAL CRIMINAL LAWS.
- Published in:
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 1/2, p. 69
- By:
- Publication type:
- Article
DISLOYAL COMPUTER USE AND THE COMPUTER FRAUD AND ABUSE ACT: NARROWING THE SCOPE.
- Published in:
- Duke Law & Technology Review, 2010, n. 11/12, p. 1
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT SHOULD NOT APPLY TO THE MISUSE OF INFORMATION ACCESSED WITH PERMISSION.
- Published in:
- Creighton Law Review, 2014, v. 47, n. 3, p. 423
- By:
- Publication type:
- Article
FRAUD INVOLVING A COMPUTER IS NOT AUTOMATICALLY "COMPUTER FRAUD".
- Published in:
- Brief, 2017, v. 46, n. 4, p. 26
- By:
- Publication type:
- Article
PREVENTING UNINTENDED INTERNET DISCRIMINATION: AN ANALYSIS OF THE COMPUTER FRAUD AND ABUSE ACT FOR ALGORITHMIC RACIAL STEERING.
- Published in:
- University of Illinois Law Review, 2018, v. 2018, n. 2, p. 847
- By:
- Publication type:
- Article