Works matching Computer crime
1
- American Journal of Criminal Justice, 2012, v. 37, n. 3, p. 396, doi. 10.1007/s12103-011-9131-5
- Holt, Thomas;
- Bossler, Adam
- Article
2
- Jurisprudence / Jurisprudencija, 2006, v. 11, n. 89, p. 50
- Article
3
- British Journal of Criminology, 2013, v. 53, n. 2, p. 319, doi. 10.1093/bjc/azs067
- Maimon, David;
- Kamerdze, Amy;
- Cukier, Michel;
- Sobesto, Bertrand
- Article
4
- Fusion: Practice & Applications, 2024, v. 15, n. 2, p. 73, doi. 10.54216/FPA.150206
- Carlos Alfredo, Medına R.;
- Llerena M. Ángel, Guambo;
- Leonardo, Toapanta J.
- Article
5
- International Journal for Crime, Justice & Social Democracy, 2022, v. 11, n. 1, p. 225, doi. 10.5204/ijcjsd.2136
- Article
6
- Sociology Compass, 2023, v. 17, n. 4, p. 1, doi. 10.1111/soc4.13077
- Article
7
- Sinergia Académica, 2024, v. 7, n. 4, p. 452
- Coello Peralta, MagaliPaulina;
- Godoy Heredia, Marcelo Xavier;
- Taco Barragán, Christian Marcelo;
- Villamarin Irazábal, Diego Marcelo;
- Ferruzola Gómez, Enrique Colon;
- Romero Urréa, Holguer Estuardo
- Article
8
- Computer Science Journal of Moldova, 2020, v. 28, n. 1, p. 45
- Karimi, Abbas;
- Abbasabadei, Saber;
- Torkestani, Javad Akbari;
- Zarafshan, Faraneh
- Article
9
- Security Dialogues, 2017, v. 8, n. 2, p. 449, doi. 10.47054/sd171-20449n
- Article
10
- International Journal of Cyber Criminology, 2008, v. 2, n. 1, p. 308
- Article
11
- Singapore Journal of Library & Information Management, 2009, v. 38, p. 77
- Na Jin-Cheon;
- Wu Hao;
- Ji Yong;
- Tay Mia Hao;
- Kandan, Ramanathan Mani
- Article
12
- Journal of Global Information Management, 2022, v. 30, n. 7, p. 1, doi. 10.4018/JGIM.295450
- Article
13
- Cuadernos de Contabilidad, 2010, v. 11, n. 28, p. 41
- Ojeda-Pérez, Jorge Eliécer;
- Rincón-Rodríguez, Fernando;
- Arias-Flórez, Miguel Eugenio;
- Daza-Martínez, Libardo Alberto
- Article
14
- Estudios Penales y Criminológicos, 2009, n. 29, p. 311
- de la Mata Barranco, Norberto J.;
- Díaz, Leyre Hernández
- Article
15
- Journal of Information System Security, 2012, v. 8, n. 2, p. 19
- Article
16
- Vizione, 2024, n. 43, p. 191
- Article
17
- Journal of Polytechnic, 2024, v. 27, n. 5, p. 1945
- ALKAN, Abdulkerim Oğuzhan;
- DOĞRU, İbrahim Alper;
- ATACAK, İsmail
- Article
18
- Internal Auditor, 2004, v. 61, n. 4, p. 16
- Article
19
- Communications of the Association for Information Systems, 2006, v. 18, p. 2, doi. 10.17705/1CAIS.01810
- Article
20
- IEEE Software, 2004, v. 21, n. 4, p. 99
- Article
21
- Criminology, 1988, v. 26, n. 1, p. 101, doi. 10.1111/j.1745-9125.1988.tb00834.x
- Hollinger, Richard C.;
- Lanza-Kaduce, Lonn
- Article
22
- Novi Sad Faculty of Law: Collected Papers / Zbornik Radova: Pravni Fakultet u Novom Sadu, 2011, v. 45, n. 1, p. 487, doi. 10.5937/zrpfns1101487P
- Article
23
- Journal of Empirical Legal Studies, 2023, v. 20, n. 2, p. 434, doi. 10.1111/jels.12349
- Graves, James T.;
- Acquisti, Alessandro
- Article
24
- Industrial Management, 1991, v. 33, n. 4, p. 24
- Prasad, Jyoti N.;
- Kathawala, Yunus;
- Bocker, Hans J.;
- Sprague, David
- Article
25
- Bulletin of the Transilvania University of Brasov, Series VII: Social Sciences & Law, 2021, v. 14 (63), p. 197, doi. 10.31926/but.ssl.2021.14.63.3.25
- Article
26
- International Review of Law, Computers & Technology, 2008, v. 22, n. 1/2, p. 145, doi. 10.1080/13600860801925086
- Article
27
- Journal of Policy Analysis & Management, 1987, v. 6, n. 4, p. 714, doi. 10.2307/3323530
- Article
28
- Texas Review of Law & Politics, 1999, v. 4, n. 1, p. 59
- Article
29
- Hacettepe Law Review, 2020, v. 10, n. 2, p. 406, doi. 10.32957/hacettepehdf.726568
- Article
30
- Information & Communications Technology Law, 1997, v. 6, n. 3, p. 249, doi. 10.1080/13600834.1997.9965771
- Article
31
- International Journal of Cyber Criminology, 2023, v. 17, n. 1, p. 102, doi. 10.5281/zenodo.4766607
- Rightley, Claire E.;
- Seigfried-Spellar, Kathryn C.;
- Rogers, Marcus K.
- Article
32
- Journal of Offender Monitoring, 2002, v. 15, n. 2, p. 11
- Article
33
- Journal of Education for Business, 2011, v. 86, n. 2, p. 119, doi. 10.1080/08832323.2010.489587
- Foltz, C.Bryan;
- Renwick, JanetS.
- Article
34
- Internal Auditor, 1997, v. 54, n. 3, p. 9
- Article
36
- Journal of Business Ethics, 1989, v. 8, n. 4, p. 243, doi. 10.1007/BF00383337
- Forcht, Karen A.;
- Thomas, Daphyne;
- Wigginton, Karen
- Article
37
- Journal of Accounting & Finance Research, 2004, v. 12, n. 4, p. 10
- Davis, Harold E.;
- Honea, James H.
- Article
40
- Journal of Criminal Investigation, 2012, v. 5, n. 1, p. 92
- Article
41
- Acta Universitatis Danubius: Juridica, 2023, v. 19, n. 2, p. 66
- Article
42
- Strategic Finance, 1999, v. 81, n. 5, p. 38
- Article
43
- Romanian Journal of Forensic Science, 2018, n. 4, p. 34
- Article
44
- Revista de Derecho Penal y Criminologia, 2023, n. 30, p. 273
- Rodríguez Almirón, Francisco
- Article
47
- AGORA International Journal of Juridical Sciences, 2014, v. 2, p. 29
- Article
48
- American Journal of Criminal Law, 1999, v. 27, n. 1, p. 81
- Article
49
- Journal of Information Systems Education, 2021, v. 32, n. 2, p. 115
- Article
50
- Trends in Organized Crime, 2022, v. 25, n. 2, p. 226, doi. 10.1007/s12117-021-09422-1
- Article