Works matching DE "COMPUTER laws"
Results: 342
STRATEGIC DETERMINANTS OF DECISIONS NOT TO SETTLE PATENT LITIGATION.
- Published in:
- Strategic Management Journal (John Wiley & Sons, Inc.) - 1980 to 2009, 2003, v. 24, n. 1, p. 17, doi. 10.1002/smj.281
- By:
- Publication type:
- Article
TRUCKS, TRAINS, AND TRANSFORMATION: NET NEUTRALITY LESSONS FROM THE FIRST CYBERLAW SYMPOSIUM.
- Published in:
- 2016
- By:
- Publication type:
- Essay
Research in progress: report on the ICAIL 2017 doctoral consortium.
- Published in:
- Artificial Intelligence & Law, 2018, v. 26, n. 1, p. 49, doi. 10.1007/s10506-018-9220-6
- By:
- Publication type:
- Article
We and Cyberlaw: The Spatial Unity of Constitutional Orders.
- Published in:
- Indiana Journal of Global Legal Studies, 2013, v. 20, n. 2, p. 697, doi. 10.2979/indjglolegstu.20.2.697
- By:
- Publication type:
- Article
Networks of power. Analysing the evolution of the Danish internet infrastructure.
- Published in:
- Internet Histories, 2021, v. 5, n. 2, p. 79, doi. 10.1080/24701475.2020.1759010
- By:
- Publication type:
- Article
Hackers' Bazaar: The Markets for Cybercrime Tools and Stolen Data.
- Published in:
- Defense Counsel Journal, 2015, v. 82, n. 2, p. 143, doi. 10.12690/0161-8202-82.2.143
- By:
- Publication type:
- Article
PERSONAL DATA PROTECTION IN CHINA.
- Published in:
- China Business Review, 2002, v. 29, n. 4, p. 36
- By:
- Publication type:
- Article
Responsible Netism...
- Published in:
- Aweshkar Research Journal, 2018, v. 25, n. 2, p. 15
- By:
- Publication type:
- Article
IMPROVING SOLUTIONS TO AI-RELATED DIFFICULTIES.
- Published in:
- Rutgers Computer & Technology Law Journal, 2024, v. 50, n. 2, p. 159
- By:
- Publication type:
- Article
FIFTY-FOURTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW (January 2022 through December 2022).
- Published in:
- 2023
- Publication type:
- Bibliography
FIFTY-THIRD SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW (January 2021 Through December2021).
- Published in:
- 2022
- Publication type:
- Bibliography
FIFTY-SECOND SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW (January 2020 Through December 2020).
- Published in:
- 2021
- Publication type:
- Bibliography
FIFTIETH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
- Published in:
- 2019
- Publication type:
- Bibliography
FORTY-SIXTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW.
- Published in:
- 2015
- Publication type:
- Bibliography
FORTY- NINTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
- Published in:
- 2018
- Publication type:
- Bibliography
FORTY- EIGHTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
- Published in:
- 2017
- Publication type:
- Bibliography
FORTY-FIFTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
- Published in:
- 2014
- Publication type:
- Bibliography
FORTY-THIRD SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW.
- Published in:
- 2012
- Publication type:
- Bibliography
EQUINE CONSIDERATIONS AND COMPUTER LAW--REFLECTIONS FORTY YEARS ON.
- Published in:
- Rutgers Computer & Technology Law Journal, 2010, v. 36, n. 2, p. 161
- By:
- Publication type:
- Article
BACK TO THE FUTURE: CRIME AND PUNISHMENT IN SECOND LIFE.
- Published in:
- Rutgers Computer & Technology Law Journal, 2009, v. 36, n. 1, p. 18
- By:
- Publication type:
- Article
DEFRAGGING FEMINIST CYBERLAW.
- Published in:
- Berkeley Technology Law Journal, 2023, v. 38, n. 2, p. 797, doi. 10.15779/Z38KD1QM62
- By:
- Publication type:
- Article
IN SEARCH OF INSTITUTIONAL IDENTITY: THE FEDERAL CIRCUIT COMES OF AGE.
- Published in:
- Berkeley Technology Law Journal, 2008, v. 23, n. 2, p. 787
- By:
- Publication type:
- Article
THE OPTIMAL LIABILITY SYSTEM FOR ONLINE SERVICE PROVIDERS: HOW ZERAN V. AMERICA ONLINE GOT IT RIGHT AND WEB 2.0 PROVES IT.
- Published in:
- Berkeley Technology Law Journal, 2008, v. 23, n. 1, p. 583
- By:
- Publication type:
- Article
FOR BETTER OR WORSE: INTRODUCING THE GNU GENERAL PUBLIC LICENSE VERSION 3.
- Published in:
- Berkeley Technology Law Journal, 2008, v. 23, n. 1, p. 547
- By:
- Publication type:
- Article
ADDITIONAL DEVELOPMENTS--CYBERLAW.
- Published in:
- Berkeley Technology Law Journal, 2008, v. 23, n. 1, p. 645
- Publication type:
- Article
STRANGER DANGER AND THE ONLINE SOCIAL NETWORK.
- Published in:
- Berkeley Technology Law Journal, 2008, v. 23, n. 1, p. 617
- By:
- Publication type:
- Article
Notes from the Web that Was: The Platform Politics of Craigslist.
- Published in:
- Surveillance & Society, 2019, v. 17, n. 1/2, p. 21, doi. 10.24908/ss.v17i1/2.12939
- By:
- Publication type:
- Article
SECTION 101 AND COMPUTER-IMPLEMENTED INVENTIONS.
- Published in:
- Stanford Technology Law Review, 2012, p. 161
- By:
- Publication type:
- Article
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 459
- By:
- Publication type:
- Article
A Commercial Law for Software Contracting.
- Published in:
- Washington & Lee Law Review, 2019, v. 76, n. 2, p. 775
- By:
- Publication type:
- Article
Still the fire-proof house? An analysis of Canada's cyber security strategy.
- Published in:
- International Journal, 2011, v. 67, n. 1, p. 155
- By:
- Publication type:
- Article
Cyberlaw: Legal Principles of Emerging Technologies.
- Published in:
- 2006
- By:
- Publication type:
- Book Review
PERSONAL DATA MISUSE IN FINTECH LENDING PROVIDERS FROM PERSPECTIVE INDONESIAN CYBERLAW.
- Published in:
- Airlangga Development Journal, 2024, v. 8, n. 1, p. 8, doi. 10.20473/adj.v8i1.56398
- By:
- Publication type:
- Article
LA APLICACIÓN ESPAÑOLA DE LAS NORMAS DE DERECHO INTERNACIONAL CONTRA LA CORRUPCIÓN.
- Published in:
- Anuario de Derecho Internacional, 2008, v. 24, p. 241
- By:
- Publication type:
- Article
Smart contracts: between freedom and strict legal regulation.
- Published in:
- Information & Communications Technology Law, 2021, v. 30, n. 3, p. 333, doi. 10.1080/13600834.2021.1889759
- By:
- Publication type:
- Article
Computer Misuse Law in Singapore.
- Published in:
- Information & Communications Technology Law, 1999, v. 8, n. 1, p. 5, doi. 10.1080/13600834.1999.9965796
- By:
- Publication type:
- Article
The law relating to computer misuse in the Republic of Ireland.
- Published in:
- Information & Communications Technology Law, 1998, v. 7, n. 1, p. 31, doi. 10.1080/13600834.1998.9965776
- By:
- Publication type:
- Article
The Promise and Perils of China's Regulation of Artificial Intelligence.
- Published in:
- Columbia Journal of Transnational Law, 2025, v. 63, n. 1, p. 1
- By:
- Publication type:
- Article
The Proposed Computer Laws of Uganda: Moving Toward Secure E-Commerce Transactions and Cyber-Crime Control.
- Published in:
- Journal of Management Policy & Practice, 2010, v. 11, n. 5, p. 19
- By:
- Publication type:
- Article
Audits of IT Logical and Physical Access Controls.
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2015, v. 34, n. 1, p. 28
- By:
- Publication type:
- Article
BEYOND BALLOT-STUFFING: CURRENT GAPS IN INTERNATIONAL LAW REGARDING FOREIGN STATE HACKING TO INFLUENCE A FOREIGN ELECTION.
- Published in:
- Wisconsin International Law Journal, 2017, v. 35, n. 1, p. 179
- By:
- Publication type:
- Article
IT'S (NOT SO) PLAIN TO SEE: THE CIRCUIT SPLIT ON THE PLAIN VIEW DOCTRINE IN DIGITAL SEARCHES.
- Published in:
- George Mason University Civil Rights Law Journal, 2010, v. 21, n. 1, p. 83
- By:
- Publication type:
- Article
Systemic Regulation of Artificial Intelligence.
- Published in:
- Arizona State Law Journal, 2024, v. 56, n. 2, p. 545
- By:
- Publication type:
- Article
Squinting Through the Pinhole: A Dim View of Human Rights from Tallinn 2.0.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1599
- By:
- Publication type:
- Article
A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer?
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1555
- By:
- Publication type:
- Article
Interpretation Catalysts in Cyberspace.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1531
- By:
- Publication type:
- Article
Give Them an Inch, They'll Take a Terabyte: How States May Interpret Tallinn Manual 2.0's International Human Rights Law Chapter.
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1515
- By:
- Publication type:
- Article
Sovereign Discourse on Cyber Conflict Under International Law.
- Published in:
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- By:
- Publication type:
- Article
Routine Activity Theory and Phishing Victimisation: Who Gets Caught in the 'Net'?
- Published in:
- Current Issues in Criminal Justice, 2009, v. 20, n. 3, p. 433, doi. 10.1080/10345329.2009.12035821
- By:
- Publication type:
- Article
Internet Privacy Policies of the Largest International Companies.
- Published in:
- Journal of Electronic Commerce in Organizations, 2006, v. 4, n. 3, p. 46, doi. 10.4018/jeco.2006070103
- By:
- Publication type:
- Article