Works matching Computer hacking
1
- AGORA International Journal of Juridical Sciences, 2014, v. 2, p. 29
- Article
2
- Jurimetrics: The Journal of Law, Science & Technology, 2013, v. 53, n. 4, p. 447
- Article
3
- McGeorge Law Review, 2011, v. 42, n. 4, p. 929
- Article
4
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2011, v. 46, n. 1, p. 24
- Article
5
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 30
- Article
6
- Journal of Information Systems Education, 2023, v. 34, n. 4, p. 370
- Luse, Andy;
- Shadbad, Forough Nasirpouri
- Article
8
- Elevator World, 2020, v. 68, n. 4, p. 68
- Article
9
- Ethics & Information Technology, 2016, v. 18, n. 2, p. 117, doi. 10.1007/s10676-016-9398-9
- Ienca, Marcello;
- Haselager, Pim
- Article
10
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2021, v. 44, n. 3, p. 36
- Article
11
- Frontiers in Psychology, 2020, v. 11, p. 1, doi. 10.3389/fpsyg.2020.00840
- Lee, Jin Ree;
- Holt, Thomas J.
- Article
12
- Journal of Contemporary Criminal Justice, 2017, v. 33, n. 3, p. 212, doi. 10.1177/1043986217699100
- Holt, Thomas J.;
- Freilich, Joshua D.;
- Chermak, Steven M.
- Article
13
- Global Crime, 2018, v. 19, n. 2, p. 107, doi. 10.1080/17440572.2018.1448272
- Mann, Monique;
- Warren, Ian;
- Kennedy, Sally
- Article
14
- Journal for Religion, Film & Media, 2019, v. 5, n. 2, p. 15, doi. 10.25364/05.052019.2.2
- Article
15
- Terrorism & Political Violence, 2022, v. 34, n. 7, p. 1305, doi. 10.1080/09546553.2020.1777987
- Holt, Thomas J.;
- Lee, Jin Ree;
- Freilich, Joshua D.;
- Chermak, Steven M.;
- Bauer, Johannes M.;
- Shillair, Ruth;
- Ross, Arun
- Article
16
- IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
- Ruth, Stephen;
- Stone, Samuel
- Article
17
- Social Science Computer Review, 2022, v. 40, n. 6, p. 1614, doi. 10.1177/08944393211023324
- Holt, Thomas J.;
- Turner, Noah D.;
- Freilich, Joshua D.;
- Chermak, Steven M.
- Article
18
- IT Professional, 2015, v. 17, n. 1, p. 30, doi. 10.1109/MITP.2015.1
- Article
19
- Journal of Crime & Justice, 2009, v. 32, n. 1, p. 1, doi. 10.1080/0735648X.2009.9721260
- Morris, Robert G.;
- Blackburn, Ashley G.
- Article
20
- Journal of Library Administration, 2014, v. 54, n. 1, p. 46, doi. 10.1080/01930826.2014.893116
- Arlitsch, Kenning;
- Edelman, Adam
- Article
22
- ISSA Journal, 2018, v. 16, n. 3, p. 9
- Article
23
- Electronics (2079-9292), 2021, v. 10, n. 15, p. 1854, doi. 10.3390/electronics10151854
- Toldinas, Jevgenijus;
- Venčkauskas, Algimantas;
- Damaševičius, Robertas;
- Grigaliūnas, Šarūnas;
- Morkevičius, Nerijus;
- Baranauskas, Edgaras
- Article
24
- Bulletin of the Atomic Scientists, 2018, v. 74, n. 6, p. 368, doi. 10.1080/00963402.2018.1533185
- Article
25
- Berkeley Technology Law Journal, 2019, v. 34, n. 3, p. 891, doi. 10.15779/Z38M32N99Q
- Evtimov, Ivan;
- O'Hair, David;
- Fernandes, Earlence;
- Calo, Ryan;
- Kohno, Tadayoshi
- Article
26
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 905
- Article
27
- Lingue e Linguaggi, 2021, v. 45, p. 257, doi. 10.1285/i22390359v45p257
- Article
28
- Paragraph, 2023, v. 46, n. 1, p. 10, doi. 10.3366/para.2023.0415
- Article
29
- Texas Law Review, 2017, v. 95, n. 7, p. 1579
- Article
30
- Business Lawyer, 2007, v. 62, n. 4, p. 1395
- Article
31
- Banking Law Journal, 2013, v. 130, n. 10, p. 959
- Article
32
- Deviant Behavior, 2007, v. 28, n. 2, p. 199, doi. 10.1080/01639620701221568
- Article
33
- International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 11, p. 101, doi. 10.3991/ijim.v17i11.39063
- Alheeti, Khattab M. Ali;
- Lateef, Ali Azawii Abdu;
- Alzahrani, Abdulkareem;
- Imran, Azhar;
- Al_Dosary, Duaa
- Article
34
- 2006
- Conference Paper/Materials
35
- Criminology & Criminal Justice: An International Journal, 2025, v. 25, n. 2, p. 670, doi. 10.1177/17488958221128128
- Button, Mark;
- Shepherd, David;
- Blackbourn, Dean;
- Sugiura, Lisa;
- Kapend, Richard;
- Wang, Victoria
- Article
36
- Florida Bar Journal, 2016, v. 90, n. 8, p. 22
- Article
37
- Florida Bar Journal, 2016, v. 90, n. 7, p. 30
- Hooker, Michael;
- Pill, Jason
- Article
38
- Florida Bar Journal, 2016, v. 90, n. 7, p. 8
- Article
39
- Creighton Law Review, 2014, v. 47, n. 3, p. 423
- Article
41
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- Article
42
- International Journal of Social Sciences & Educational Studies, 2024, v. 12, n. 1, p. 19, doi. 10.23918/ijsses.v12i1p19
- Sani, Kamal Muhammad;
- Hassan, Mukhtar Abubakar;
- Saidu, Mubarak;
- Umar, Sirajo Kabiru;
- Tata, Umar Dahiru
- Article
43
- Journal of Information Systems & Operations Management, 2016, v. 10, n. 1, p. 1
- Gupta, Pranshu;
- Mata-Toledo, Ramon A.
- Article
44
- American Journal of Criminal Justice, 2021, v. 46, n. 6, p. 911, doi. 10.1007/s12103-021-09654-5
- Article
45
- International Journal of Information Security Science, 2020, v. 9, n. 2, p. 104
- Article
46
- British Journalism Review, 2008, v. 19, n. 4, p. 75, doi. 10.1177/0956474808100870
- Article
47
- Journal of Ethnicity in Criminal Justice, 2022, v. 20, n. 1, p. 73, doi. 10.1080/15377938.2022.2054890
- Phan, Diana K.;
- Espinoza, Russ K. E.;
- Sy, Susan R.
- Article
48
- New Zealand Sociology, 2009, v. 24, n. 2, p. 39
- Article
50
- Adaptation, 2021, v. 14, n. 1, p. 1, doi. 10.1093/adaptation/apaa026
- Article