Works matching DE "COMPUTER security laws"
1
- ISSA Journal, 2017, v. 15, n. 12, p. 16
- Wood, Charles Cresson;
- Rogers Jr., William S.;
- Poore, Ralph Spencer
- Article
2
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- Article
3
- Issues in Science & Technology, 2000, v. 17, n. 1, p. 29
- Article
4
- Financial Executive, 2013, v. 29, n. 3, p. 18
- Article
5
- American Journal of Economics & Sociology, 1993, v. 52, n. 3, p. 257
- Article
6
- Review of Management & Economic Engineering, 2010, v. 9, n. 1, p. 53
- Purcărea, Anca-Alexandra;
- Ťigănoaia, Bogdam-Dumitru
- Article
7
- Boston University Law Review, 2021, v. 101, n. 2, p. 761
- Article
8
- Boston University Law Review, 2012, v. 92, n. 5, p. 1663
- Article
9
- Journal of Counterterrorism & Homeland Security International, 2015, v. 21, n. 1, p. 12
- Article
10
- European Data Protection Law Review (EDPL), 2016, v. 2, n. 2, p. 209, doi. 10.21552/edpl/2016/2/10
- Ursic, Helena;
- Custers, Bart
- Article
11
- Florida Bar Journal, 2013, v. 87, n. 1, p. 36
- Article
12
- Contract Management, 2015, v. 55, n. 10, p. 72
- Article
13
- Contract Management, 2012, p. 76
- Article
14
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 144, doi. 10.3906/elk-1105-54
- ÜNAL, Devrim;
- ÇAĞLAYAN, Mehmet Ufuk
- Article
15
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- Article
16
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- Article
17
- Journal of Current Issues in Media & Telecommunications, 2015, v. 7, n. 2, p. 209
- Article
18
- Tort Trial & Insurance Practice Law Journal, 2020, v. 55, n. 2, p. 217
- Godfrey, Lauren D.;
- Horton, Matthew;
- Johnson, Ericka A.;
- Mooney, Joshua A.;
- Zimmermann, Michael C.
- Article
19
- Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 2, p. 403
- Black, Kyle D.;
- Alam, Christina B.;
- Bucher, Steven M.;
- Giannetti, Ashley J.;
- Godfrey, Lauren D.;
- Wear, Justin D.
- Article
20
- Tort Trial & Insurance Practice Law Journal, 2018, v. 53, n. 2, p. 291
- Wear, Justin D.;
- Flowers, Robert;
- Black, Kyle D.;
- Godfrey, Lauren D.;
- Anderson, Roberta D.
- Article
21
- International Lawyer, 2018, v. 51, n. 3, p. 537
- Article
22
- Jurimetrics: The Journal of Law, Science & Technology, 2017, v. 57, n. 4, p. 483
- Article
23
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- Massey, Aaron K.;
- Otto, Paul N.;
- Hayward, Lauren J.;
- Antón, Annie I.
- Article
24
- MIS Quarterly, 1990, v. 14, n. 2, p. 143, doi. 10.2307/248772
- Straub Jr., Detmar W.;
- Collins, Rosann Webb
- Article
25
- IEEE Software, 2004, v. 21, n. 4, p. 99
- Article
26
- International Journal of Electronics & Telecommunications, 2020, v. 66, n. 2, p. 321, doi. 10.24425/ijet.2020.131881
- Article
27
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 3, p. 124, doi. 10.1080/19393550903200466
- Manes, GavinW.;
- Downing, Elizabeth
- Article
28
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 1/2, p. 69
- Article
29
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1727
- Article
30
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1671
- Frieden, Jonathan D.;
- Price, Charity M.;
- Murray, Leigh M.
- Article
31
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1666
- Fleming, Michael F.;
- Kunz, Christina L.
- Article
32
- Chapman Law Review, 2016, v. 19, n. 2, p. 401
- Article
33
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- Article
34
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- Hajian, Sara;
- Domingo-Ferrer, Josep;
- Farràs, Oriol
- Article
35
- Dreptul, 2012, n. 10, p. 204
- Article
37
- Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109
- Article
38
- International Journal of Law & Information Technology, 2010, v. 18, n. 4, p. 356, doi. 10.1093/ijlit/eaq010
- Sartor, Giovanni;
- Viola de Azevedo Cunha, Mario
- Article
39
- International Journal of Law & Information Technology, 2002, v. 10, n. 2, p. 224, doi. 10.1093/ijlit/10.2.224
- Article
40
- Journal of Contemporary Legal Issues, 2010, v. 19, n. 1, p. 513
- Article
41
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- Article
42
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 329
- Article
43
- Revista de Derecho Politico, 2012, n. 85, p. 13, doi. 10.5944/rdp.85.2012.10244
- Article
44
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- Article
45
- International Policy Digest, 2017, v. 4, n. 5, p. 37
- Article
46
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 3
- Article
47
- George Mason Law Review, 2011, v. 19, n. 1, p. 113
- Article
48
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 103
- Article
49
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 87
- Article
50
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 450
- Article