Works matching Computer hacking
1
- AGORA International Journal of Juridical Sciences, 2014, v. 2, p. 29
- Article
2
- Jurimetrics: The Journal of Law, Science & Technology, 2013, v. 53, n. 4, p. 447
- Article
3
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2011, v. 46, n. 1, p. 24
- Article
4
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 30
- Article
5
- McGeorge Law Review, 2011, v. 42, n. 4, p. 929
- Article
6
- Journal of Information Systems Education, 2023, v. 34, n. 4, p. 370
- Luse, Andy;
- Shadbad, Forough Nasirpouri
- Article
7
- Ethics & Information Technology, 2016, v. 18, n. 2, p. 117, doi. 10.1007/s10676-016-9398-9
- Ienca, Marcello;
- Haselager, Pim
- Article
9
- Elevator World, 2020, v. 68, n. 4, p. 68
- Article
10
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2021, v. 44, n. 3, p. 36
- Article
11
- Frontiers in Psychology, 2020, v. 11, p. 1, doi. 10.3389/fpsyg.2020.00840
- Lee, Jin Ree;
- Holt, Thomas J.
- Article
12
- Journal of Contemporary Criminal Justice, 2017, v. 33, n. 3, p. 212, doi. 10.1177/1043986217699100
- Holt, Thomas J.;
- Freilich, Joshua D.;
- Chermak, Steven M.
- Article
13
- Terrorism & Political Violence, 2022, v. 34, n. 7, p. 1305, doi. 10.1080/09546553.2020.1777987
- Holt, Thomas J.;
- Lee, Jin Ree;
- Freilich, Joshua D.;
- Chermak, Steven M.;
- Bauer, Johannes M.;
- Shillair, Ruth;
- Ross, Arun
- Article
14
- Social Science Computer Review, 2022, v. 40, n. 6, p. 1614, doi. 10.1177/08944393211023324
- Holt, Thomas J.;
- Turner, Noah D.;
- Freilich, Joshua D.;
- Chermak, Steven M.
- Article
15
- Global Crime, 2018, v. 19, n. 2, p. 107, doi. 10.1080/17440572.2018.1448272
- Mann, Monique;
- Warren, Ian;
- Kennedy, Sally
- Article
16
- Journal for Religion, Film & Media, 2019, v. 5, n. 2, p. 15, doi. 10.25364/05.052019.2.2
- Article
17
- IT Professional, 2015, v. 17, n. 1, p. 30, doi. 10.1109/MITP.2015.1
- Article
18
- IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
- Ruth, Stephen;
- Stone, Samuel
- Article
19
- Journal of Crime & Justice, 2009, v. 32, n. 1, p. 1, doi. 10.1080/0735648X.2009.9721260
- Morris, Robert G.;
- Blackburn, Ashley G.
- Article
20
- Yale Law Journal, 2018, v. 127, n. 3, p. 570
- Article
21
- Creighton Law Review, 2014, v. 47, n. 3, p. 423
- Article
22
- ISSA Journal, 2018, v. 16, n. 3, p. 9
- Article
23
- Banking Law Journal, 2013, v. 130, n. 10, p. 959
- Article
24
- Emory Law Journal, 2018, v. 68, n. 1, p. 183
- Article
25
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 1, p. 8
- Article
26
- Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
- Article
27
- Ohio State Law Journal, 2017, v. 78, n. 4, p. 947
- Article
28
- British Journalism Review, 2008, v. 19, n. 4, p. 75, doi. 10.1177/0956474808100870
- Article
30
- Paragraph, 2023, v. 46, n. 1, p. 10, doi. 10.3366/para.2023.0415
- Article
31
- Florida Bar Journal, 2016, v. 90, n. 8, p. 22
- Article
32
- Florida Bar Journal, 2016, v. 90, n. 7, p. 30
- Hooker, Michael;
- Pill, Jason
- Article
33
- Florida Bar Journal, 2016, v. 90, n. 7, p. 8
- Article
34
- Journal of Petroleum Research & Studies, 2023, n. 39, p. 100, doi. 10.52716/jprs.v13i2.580
- Article
35
- American Journal of Criminal Justice, 2021, v. 46, n. 6, p. 911, doi. 10.1007/s12103-021-09654-5
- Article
36
- International Journal of Information Security Science, 2020, v. 9, n. 2, p. 104
- Article
37
- Berkeley Technology Law Journal, 2019, v. 34, n. 3, p. 891, doi. 10.15779/Z38M32N99Q
- Evtimov, Ivan;
- O'Hair, David;
- Fernandes, Earlence;
- Calo, Ryan;
- Kohno, Tadayoshi
- Article
38
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 905
- Article
39
- Indiana Law Journal, 2023, v. 99, n. 1, p. 335
- Article
40
- Deviant Behavior, 2007, v. 28, n. 2, p. 199, doi. 10.1080/01639620701221568
- Article
41
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1417, doi. 10.1007/s10796-021-10129-5
- Article
42
- International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 11, p. 101, doi. 10.3991/ijim.v17i11.39063
- Alheeti, Khattab M. Ali;
- Lateef, Ali Azawii Abdu;
- Alzahrani, Abdulkareem;
- Imran, Azhar;
- Al_Dosary, Duaa
- Article
43
- Criminology & Criminal Justice: An International Journal, 2025, v. 25, n. 2, p. 670, doi. 10.1177/17488958221128128
- Button, Mark;
- Shepherd, David;
- Blackbourn, Dean;
- Sugiura, Lisa;
- Kapend, Richard;
- Wang, Victoria
- Article
44
- Hofstra Law Review, 2015, v. 44, n. 1, p. 41
- Article
45
- Journal of Ethnicity in Criminal Justice, 2022, v. 20, n. 1, p. 73, doi. 10.1080/15377938.2022.2054890
- Phan, Diana K.;
- Espinoza, Russ K. E.;
- Sy, Susan R.
- Article
46
- Journal of Library Administration, 2014, v. 54, n. 1, p. 46, doi. 10.1080/01930826.2014.893116
- Arlitsch, Kenning;
- Edelman, Adam
- Article
47
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- Article
48
- i-Manager's Journal on Digital Signal Processing, 2023, v. 11, n. 1, p. 27, doi. 10.26634/jdp.11.1.19237
- CHAITANYA KUMAR, G. SAI;
- KUMAR, R. KIRAN;
- PRASAD, Y. SIVA;
- KUMAR, A. KALYAN;
- SAI, N. RAGHAVENDRA
- Article
49
- Business Lawyer, 2007, v. 62, n. 4, p. 1395
- Article
50
- In These Times, 2013, v. 37, n. 3, p. 55
- Article