Works matching DE "COMPUTER hackers"
1
- Psychiatry, Psychology & Law, 2020, v. 27, n. 2, p. 181, doi. 10.1080/13218719.2020.1727645
- Article
2
- Science, Technology & Human Values, 2017, v. 42, n. 5, p. 969, doi. 10.1177/0162243916688094
- Article
3
- Theory & Society, 2007, v. 36, n. 1, p. 55, doi. 10.1007/s11186-007-9021-5
- Article
4
- Style, 1999, v. 33, n. 2, p. 283
- Article
5
- Social Alternatives, 2012, v. 31, n. 2, p. 27
- Article
6
- South African Journal of Philosophy, 2021, v. 40, n. 2, p. 162, doi. 10.1080/02580136.2021.1933733
- Hanusch, Yonnique Francesca
- Article
7
- International Journal of Information Technology & Decision Making, 2002, v. 1, n. 3, p. 367, doi. 10.1142/S0219622002000233
- Tianfield, Huaglory;
- Unland, Rainer
- Article
8
- Machine Learning, 2003, v. 51, n. 1, p. 73, doi. 10.1023/A:1021830128811
- Terran Lane;
- Carla E. Brodley
- Article
10
- Multimedia Systems, 2008, v. 14, n. 4, p. 221, doi. 10.1007/s00530-008-0113-5
- Article
11
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 2911, doi. 10.1007/s11277-017-4641-1
- Hsieh, Wen-Bin;
- Leu, Jenq-Shiou
- Article
12
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 995, doi. 10.1007/s11277-014-1797-9
- Tapaswi, Shashikala;
- Mahboob, Adnan;
- Shukla, Ajay;
- Gupta, Ishan;
- Verma, Pranshu;
- Dhar, Joydip
- Article
13
- Journal of Artificial Societies & Social Simulation, 2013, v. 16, n. 3, p. 13, doi. 10.18564/jasss.2181
- Renaud, Karen;
- Mackenzie, Lewis
- Article
14
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 11, p. 1, doi. 10.54751/revistafoco.v16n11-086
- Campos Marcelino, Cássio;
- Fonseca de Oliveira, Jirlaine;
- Carlos Cazorla, João;
- Misaghi, Mehran
- Article
15
- Studia Socjologiczne, 2008, v. 2008, n. 4, p. 67
- Article
16
- Brooklyn Law Review, 2017, v. 82, n. 3, p. 1305
- Article
17
- Information Technology & Control, 2018, v. 47, n. 1, p. 56, doi. 10.5755/j01.itc.47.1.16137
- Yang Lu;
- Gang Wang;
- Jiguo Li
- Article
19
- Journal of Law, Medicine & Ethics, 2020, v. 48, p. 37, doi. 10.1177/1073110520917028
- Doerr, Megan;
- Guerrini, Christi;
- Rothstein, Mark A.;
- Wilbanks, John T.
- Article
20
- IM + io, 2023, n. 3, p. 24
- Article
21
- Document News, 2012, v. 30, n. 2, p. 5
- Article
22
- Journal of Behavioral Addictions, 2023, v. 12, p. 128
- PARK, JENNIFER J.;
- KING, DANIEL L.;
- WILKINSON-MEYERS, LAURA;
- RODDA, SIMONE N.
- Article
23
- Annals of Business Administrative Science (ABAS), 2021, v. 20, n. 6, p. 223, doi. 10.7880/abas.0210923a
- Article
24
- Comparative Strategy, 2013, v. 32, n. 4, p. 301, doi. 10.1080/01495933.2013.821843
- Article
25
- CyberPsychology & Behavior, 2003, v. 6, n. 2, p. 171, doi. 10.1089/109493103321640365
- Voiskounsky, Alexander E.;
- Smyslova, Olga V.
- Article
26
- Philosophical Investigations, 2023, v. 46, n. 4, p. 462, doi. 10.1111/phin.12376
- Article
28
- British Journal of Criminology, 2015, v. 55, n. 1, p. 125, doi. 10.1093/bjc/azu061
- Article
29
- International Journal of Advanced Computer Science & Applications, 2023, v. 14, n. 11, p. 1271, doi. 10.14569/ijacsa.2023.01411129
- Roy, Dharani Kanta;
- Patgiri, Ripon
- Article
30
- Singidunum Scientific Review / Singidunum Revija, 2011, v. 8, n. 1, p. 133
- Grubor, Gojko;
- Franc, Igor
- Article
31
- Games (20734336), 2017, v. 8, n. 2, p. 23, doi. 10.3390/g8020023
- Article
32
- Journal of Applied Electromagnetism, 2009, v. 11, n. 2, p. 26
- Article
33
- International Journal of Distributed Sensor Networks, 2021, v. 17, n. 5, p. 1, doi. 10.1177/15501477211015145
- Cheng Huang;
- Yongyan Guo;
- Wenbo Guo;
- Ying Li
- Article
34
- International Studies Perspectives, 2016, v. 17, n. 3, p. 307, doi. 10.1093/isp/ekv023
- COHEN, MATTHEW S.;
- FREILICH, CHARLES D.;
- SIBONI, GABI
- Article
35
- Information Systems Frontiers, 2021, v. 23, n. 2, p. 329, doi. 10.1007/s10796-019-09949-3
- Silic, Mario;
- Lowry, Paul Benjamin
- Article
36
- Information Systems Frontiers, 2015, v. 17, n. 6, p. 1239, doi. 10.1007/s10796-015-9567-0
- Zhang, Xiong;
- Tsang, Alex;
- Yue, Wei;
- Chau, Michael
- Article
37
- Information Systems Frontiers, 2015, v. 17, n. 5, p. 1029, doi. 10.1007/s10796-015-9570-5
- Article
38
- Information Systems Frontiers, 2014, v. 16, n. 4, p. 643, doi. 10.1007/s10796-012-9373-x
- Bandyopadhyay, Tridib;
- Liu, Dengpan;
- Mookerjee, Vijay;
- Wilhite, Allen
- Article
39
- Information Systems Frontiers, 2010, v. 12, n. 4, p. 425, doi. 10.1007/s10796-009-9203-y
- Warren, Matthew;
- Leitch, Shona
- Article
40
- Information Systems Frontiers, 2010, v. 12, n. 4, p. 415, doi. 10.1007/s10796-009-9201-0
- Ahmed, Malik;
- Hoven, Jeroen
- Article
41
- Annals of DAAAM & Proceedings, 2010, p. 1271
- Article
42
- International Game Theory Review, 2018, v. 20, n. 1, p. -1, doi. 10.1142/S021919891750027X
- Article
43
- International Game Theory Review, 2017, v. 19, n. 2, p. -1, doi. 10.1142/S0219198917500104
- Article
44
- Harvard Political Review, 2012, v. 39, n. 4, p. 11
- Article
45
- European Review of Public Law, 2024, v. 36, n. 1, p. 37
- GUERRA MARTINS, ANA MARIA
- Article
46
- CDS Review, 2022, p. 8
- Article
47
- Theory in Action, 2015, v. 8, n. 1, p. 1, doi. 10.3798/tia.1937-0237.15001
- Article
48
- Ekscentar, 2010, n. 13, p. 15
- Article
49
- Revista Latina de Comunicación Social, 2001, n. 43, p. 1
- Sandoval Martín, María Teresa
- Article
50
- Perl Review, 2006, v. 3, n. 0, p. 3
- Article