Works matching DE "SPYWARE (Computer software)"
1
- Journal of Natural Sciences & Mathematics (JNSM), 2022, v. 7, n. 13/14, p. 12
- CIVULI, Abdulla;
- LUMA-OSMANI, Shkurte;
- RUFATI, Eip;
- ARIFI, Gjulie
- Article
2
- ISSA Journal, 2018, v. 16, n. 11, p. 7
- Article
3
- Issues in Science & Technology, 2022, v. 38, n. 2, p. 15
- Article
4
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 3, doi. 10.1007/s10796-007-9035-6
- Sipior, Janice C.;
- Ward, Burke T.
- Article
5
- Social Science Computer Review, 2007, v. 25, n. 1, p. 78, doi. 10.1177/0894439306292346
- Hughes, Lorine A.;
- DeLone, Gregory J.
- Article
6
- New York Law School Law Review, 2016, v. 61, n. 3/4, p. 449
- Article
7
- Journalism Practice, 2022, v. 16, n. 9, p. 1849, doi. 10.1080/17512786.2021.2014346
- Article
8
- Trends & Issues in Crime & Criminal Justice, 2010, n. 400, p. 1
- Article
9
- Cuadernos de Derecho Penal, 2021, n. 26, p. 93
- Article
10
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2008, v. 23, n. 1, p. 165
- Canbek, Gürol;
- Sağiroğlu, Şeref
- Article
11
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2007, v. 22, n. 1, p. 121
- Canbek, Gürol;
- Sağiroğlu, Şeref
- Article
12
- Rutgers Computer & Technology Law Journal, 2008, v. 35, n. 1, p. 77
- Article
13
- Berkeley Technology Law Journal, 2007, v. 22, n. 1, p. 555
- Article
14
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1433
- Article
15
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1345
- Article
16
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1269
- Article
17
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1363
- Article
18
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1283
- Article
19
- Berkeley Technology Law Journal, 2005, v. 20, n. 1, p. 340
- Article
20
- Journal of Global Information Management, 2008, v. 16, n. 2, p. 91, doi. 10.4018/jgim.2008040106
- Schmidt, Mark B.;
- Johnston, Allen C.;
- Arnett, Kirk P.;
- Chen, Jim Q.;
- Suicheng Li
- Article
21
- Podiatry Management, 2005, v. 24, n. 9, p. 47
- Article
22
- Jordanian Journal of Computers & Information Technology, 2025, v. 11, n. 1, p. 1
- Mimi, Mousumi Ahmed;
- Hu Ng;
- Vun Yap, Timothy Tzen
- Article
23
- Our Schools / Our Selves, 2011, v. 20, n. 2, p. 9
- Article
24
- Parliamentarian, 2010, v. 91, n. 4, p. 400
- Article
25
- CURIE Journal, 2010, v. 3, n. 1, p. 41
- Article
26
- Central Asia & the Caucasus (14046091), 2022, v. 23, n. 1, p. 794, doi. 10.37178/ca-c.23.1.071
- Article
27
- Tort Trial & Insurance Practice Law Journal, 2014, v. 49, n. 2, p. 529
- Article
28
- Diacritics, 2014, v. 42, n. 1, p. 110
- Article
29
- Knowledge & Information Systems, 2012, v. 32, n. 1, p. 167, doi. 10.1007/s10115-011-0438-9
- Lavesson, Niklas;
- Axelsson, Stefan
- Article
30
- Knowledge & Information Systems, 2011, v. 26, n. 2, p. 285, doi. 10.1007/s10115-009-0278-z
- Lavesson, Niklas;
- Boldt, Martin;
- Davidsson, Paul;
- Jacobsson, Andreas
- Article
31
- Journal of the Association for Information Systems, 2007, v. 8, n. 7, p. 386
- Article
32
- Communications of the Association for Information Systems, 2004, v. 14, p. 291, doi. 10.17705/1CAIS.01415
- Stafford, Thomas F.;
- Urbaczewski, Andrew
- Article
33
- Journal of Computer Networks & Communications, 2011, p. 1, doi. 10.1155/2011/569829
- Zhongqiang Chen;
- Zhanyan Liang;
- Yuan Zhang;
- Zhongrong Chen
- Article
34
- International Journal of Intelligence & Counterintelligence, 2024, v. 37, n. 1, p. 286, doi. 10.1080/08850607.2023.2202345
- Article
35
- Strategic Finance, 2007, v. 88, n. 11, p. 55
- Article
36
- Strategic Finance, 2006, v. 88, n. 6, p. 49
- Article
37
- Strategic Finance, 2004, v. 85, n. 9, p. 57
- Article
38
- Thunderbird International Business Review, 2023, v. 65, n. 3, p. 355, doi. 10.1002/tie.22321
- Kaster, Sean D.;
- Ensign, Prescott C.
- Article
39
- Public Relations Tactics, 2012, v. 19, n. 9, p. 7
- Article
40
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/237125
- Taejin Kim;
- Jeong Hyun Yi;
- Changho Seo
- Article
41
- Grenze International Journal of Engineering & Technology (GIJET), 2022, v. 8, n. 1, p. 557
- Article
42
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 2, p. 26
- Singleton, Tommie;
- Singleton, Aaron;
- Gottlieb, Geoff
- Article
43
- Security & Communication Networks, 2015, v. 8, n. 1, p. 51, doi. 10.1002/sec.705
- Fan, Lejun;
- Wang, Yuanzhuo;
- Cheng, Xueqi;
- Li, Jinming;
- Jin, Shuyuan
- Article
44
- Journal of the CPA Practitioner, 2012, v. 4, n. 3, p. 6
- Article
45
- Automatika: Journal for Control, Measurement, Electronics, Computing & Communications, 2024, v. 65, n. 3, p. 803, doi. 10.1080/00051144.2024.2310458
- T, Jimshith V.;
- Amala Bai, V. Mary
- Article
46
- Journal of Information System Security, 2011, v. 7, n. 2, p. 15
- Martins, W.;
- Furnell, S. M.
- Article
47
- Journal of Internet Commerce, 2006, v. 5, n. 3, p. 109, doi. 10.1300/J179v05n03_05
- Marshall, Kimball P.;
- Swartwout, Nansi
- Article
48
- Journal of Critical Realism, 2022, v. 21, n. 5, p. 502, doi. 10.1080/14767430.2022.2100612
- Article
49
- IT Professional, 2008, v. 10, n. 2, p. 7
- Article
50
- IT Professional, 2006, v. 8, n. 4, p. 5
- Article