Works matching Wiretapping
1
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 5, p. 2166, doi. 10.3837/tiis.2016.05.012
- Shu Wang;
- Xinyu Da;
- Zhenyong Chu
- Article
2
- Vermont Law Review, 2018, v. 43, n. 2, p. 369
- Article
3
- ILSA Journal of International & Comparative Law, 2017, v. 23, n. 1, p. 55
- Article
4
- Case Western Reserve Journal of International Law, 2006, v. 37, n. 2/3, p. 509
- Article
5
- University of Florida Journal of Law & Public Policy, 2006, v. 17, n. 3, p. 429
- Baldwin Jr., Fletcher N.;
- Shaw, Robert B.
- Article
6
- Journal of Criminal Law, Criminology & Police Science, 1961, v. 51, n. 6, p. 630, doi. 10.2307/1141650
- Article
7
- Journal of Criminal Law, Criminology & Police Science, 1961, v. 51, n. 5, p. 534, doi. 10.2307/1141416
- Article
8
- Journal of Criminal Law, Criminology & Police Science, 1960, v. 51, n. 4, p. 441, doi. 10.2307/1140662
- Article
9
- Journal of Criminal Law, Criminology & Police Science, 1958, v. 49, n. 4, p. 342, doi. 10.2307/1141592
- Article
10
- Political Behavior, 2021, v. 43, n. 3, p. 997, doi. 10.1007/s11109-019-09580-7
- Christensen, Dag Arne;
- Aars, Jacob
- Article
11
- Hamline Law Review, 2011, v. 34, n. 2, p. 205
- Article
12
- Texas Law Review, 2010, v. 88, n. 7, p. 1401
- Article
13
- Journal of Gender, Race & Justice, 2012, v. 15, n. 1, p. 165
- Article
14
- Environmental & Social Management Journal / Revista de Gestão Social e Ambiental, 2024, v. 18, n. 8, p. 1, doi. 10.24857/rgsa.v18n8-095
- Lestaluhu, Abd. Latip;
- Jeane N. S.;
- Gunadi, Ariawan
- Article
15
- St. Louis University Law Journal, 2013, v. 57, n. 4, p. 1085
- Article
16
- Journalism & Media, 2024, v. 5, n. 3, p. 1348, doi. 10.3390/journalmedia5030085
- Dimitriadis, Ilias;
- Giakatos, Dimitrios P.;
- Karamanidis, Stelios;
- Sermpezis, Pavlos;
- Kiki, Kelly;
- Vakali, Athena
- Article
17
- Justitiële Verkenningen, 2012, n. 3, p. 20, doi. 10.5553/jv/016758502012038003003
- Article
18
- ILSA Journal of International & Comparative Law, 2016, v. 23, n. 1, p. 55
- Article
19
- San Diego Law Review, 2007, v. 44, n. 4, p. 723
- Article
20
- Historical Journal of Massachusetts, 2007, v. 35, n. 1, p. 52
- Article
21
- Public Opinion Quarterly, 1989, v. 53, n. 2, p. 225, doi. 10.1086/269504
- Article
22
- Wireless Personal Communications, 2015, v. 84, n. 4, p. 2493, doi. 10.1007/s11277-015-2716-4
- Article
23
- Texas Journal on Civil Liberties & Civil Rights, 2006, v. 12, n. 1/2, p. 1
- Article
24
- Journal of Criminal Law, Criminology & Police Science, 1964, v. 55, n. 1, p. 114, doi. 10.2307/1140461
- Article
25
- International Journal of Ethics (1556-4444), 2012, v. 8, n. 1/2, p. 95
- Article
26
- Criminology, 1970, v. 8, n. 1, p. 98
- Article
27
- IEEE Internet Computing, 2006, v. 10, n. 1, p. 8, doi. 10.1109/MIC.2006.12
- Article
28
- American Business Law Journal, 1973, v. 11, n. 2, p. 197
- Article
30
- American University Journal of Gender, Social Policy & the Law, 2011, v. 19, n. 4, p. 1327
- Article
32
- Stanford Law Review, 2007, v. 60, n. 2, p. 553
- Article
34
- Manitoba Law Journal, 2017, v. 40, n. 2, p. 249, doi. 10.29173/mlj987
- Article
35
- International Journal of Public Administration, 2006, v. 29, n. 14, p. 1397, doi. 10.1080/01900690600954389
- Lind, Nancy S.;
- Otenyo, Eric E.
- Article
39
- Historian, 1999, v. 61, n. 2, p. 361, doi. 10.1111/j.1540-6563.1999.tb01031.x
- Article
40
- Studia Universitatis Babes-Bolyai, Iurisprudentia, 2011, n. 4, p. 118
- Article
42
- IET Communications (Wiley-Blackwell), 2020, v. 14, n. 15, p. 2564, doi. 10.1049/iet-com.2019.1264
- Article
43
- Veritas Luris, 2022, v. 5, n. 1, p. 98
- Article
44
- Journal of Social Science (2963-1866), 2025, v. 4, n. 1, p. 35, doi. 10.57185/joss.v4i1.413
- Kusuma, Dedy Parta;
- Sihotang, Erikson;
- Saputra, Komang Edy Dharma
- Article
45
- Przegląd Elektrotechniczny, 2017, v. 93, n. 2, p. 250, doi. 10.15199/48.2017.02.55
- KHOMA, Volodymyr;
- IVANYUK, Vitalii
- Article
46
- Estudios Penales y Criminológicos, 2012, n. 32, p. 39
- Article
47
- Dreptul, 2013, n. 10, p. 81
- Article
48
- Journal of Business Ethics, 2001, v. 29, n. 3, p. 227, doi. 10.1023/A:1026432924759
- Article
49
- Security: Theory & Practice / Bezpieczeństwo.Teoria i Praktyka, 2024, v. 56, n. 3, p. 95, doi. 10.48269/2451-0718-btip-2024-3-007
- Article
50
- Translation & Interpreting, 2024, v. 16, n. 1, p. 17, doi. 10.12807/ti.116201.2024.a02
- Article