Works matching Computer hacking
Results: 1068
HACKING AND COMPUTER CRIMES COMPUTER FRAUD - A COMPARATIVE LOOK AT THE NEW CRIMINAL CODE AND THE CRIMINAL CODE OF THE REPUBLIC OF MOLDOVA.
- Published in:
- AGORA International Journal of Juridical Sciences, 2014, v. 2, p. 29
- By:
- Publication type:
- Article
THE COMPUTER FRAUD AND ABUSE ACT: HACKING INTO THE AUTHORIZATION DEBATE.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2013, v. 53, n. 4, p. 447
- By:
- Publication type:
- Article
US believed top Chinese leadership to have directed computer hackings.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2011, v. 46, n. 1, p. 24
- Publication type:
- Article
China caught hacking into other states' computers.
- Published in:
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 30
- Publication type:
- Article
Computer Hacking as a "Deceptive Device": Why the Courts Must Give Computers Legal Consciousness to Hold Hackers Liable for Insider Trading.
- Published in:
- McGeorge Law Review, 2011, v. 42, n. 4, p. 929
- By:
- Publication type:
- Article
Hackalytics: Using Computer Hacking to Engage Students in Analytics.
- Published in:
- Journal of Information Systems Education, 2023, v. 34, n. 4, p. 370
- By:
- Publication type:
- Article
Hacking the brain: brain-computer interfacing technology and the ethics of neurosecurity.
- Published in:
- Ethics & Information Technology, 2016, v. 18, n. 2, p. 117, doi. 10.1007/s10676-016-9398-9
- By:
- Publication type:
- Article
CYBERCRIME: A GROWING BUSINESS DURING COVID-19: While the world was in lockdown, cybercriminals were hard at work, finding more efficient ways to extract money from hacking into computer systems -- and Asia Pacific is firmly in their sights.
- Published in:
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2021, v. 44, n. 3, p. 36
- By:
- Publication type:
- Article
Hacking Europe. From computer cultures to demoscenes.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
ELEVATOR PHONE PHREAKING: In this Readers Platform, your author discuss the predecessor to computer hacking and how to safeguard your system.
- Published in:
- Elevator World, 2020, v. 68, n. 4, p. 68
- By:
- Publication type:
- Article
Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors.
- Published in:
- Frontiers in Psychology, 2020, v. 11, p. 1, doi. 10.3389/fpsyg.2020.00840
- By:
- Publication type:
- Article
Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory.
- Published in:
- Social Science Computer Review, 2022, v. 40, n. 6, p. 1614, doi. 10.1177/08944393211023324
- By:
- Publication type:
- Article
Exploring the Subculture of Ideologically Motivated Cyber-Attackers.
- Published in:
- Journal of Contemporary Criminal Justice, 2017, v. 33, n. 3, p. 212, doi. 10.1177/1043986217699100
- By:
- Publication type:
- Article
A Legislator's Dilemma.
- Published in:
- IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
- By:
- Publication type:
- Article
The legal geographies of transnational cyber-prosecutions: extradition, human rights and forum shifting.
- Published in:
- Global Crime, 2018, v. 19, n. 2, p. 107, doi. 10.1080/17440572.2018.1448272
- By:
- Publication type:
- Article
MR ROBOT: Hacking the Apocalypse.
- Published in:
- Journal for Religion, Film & Media, 2019, v. 5, n. 2, p. 15, doi. 10.25364/05.052019.2.2
- By:
- Publication type:
- Article
A Right to Cybercounter Strikes: The Risks of Legalizing Hack Backs.
- Published in:
- IT Professional, 2015, v. 17, n. 1, p. 30, doi. 10.1109/MITP.2015.1
- By:
- Publication type:
- Article
Cracking 128-bit Keys.
- Published in:
- ISSA Journal, 2018, v. 16, n. 3, p. 9
- By:
- Publication type:
- Article
High-tech Rascality: Asperger's Syndrome, Hackers, Geeks, and Personality Types in the ICT Industry.
- Published in:
- New Zealand Sociology, 2009, v. 24, n. 2, p. 39
- By:
- Publication type:
- Article
HACKING HAMLET: Sam Esmail's Mr. Robot as update, port and fork of the Shakespearean source code.
- Published in:
- Lingue e Linguaggi, 2021, v. 45, p. 257, doi. 10.1285/i22390359v45p257
- By:
- Publication type:
- Article
A Cross-National Examination of the Techniques of Neutralization to Account for Hacking Behaviors.
- Published in:
- Victims & Offenders, 2016, v. 11, n. 4, p. 534, doi. 10.1080/15564886.2015.1121944
- By:
- Publication type:
- Article
IS TRICKING A ROBOT HACKING?
- Published in:
- Berkeley Technology Law Journal, 2019, v. 34, n. 3, p. 891, doi. 10.15779/Z38M32N99Q
- By:
- Publication type:
- Article
COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 905
- Publication type:
- Article
Brainjacking in deep brain stimulation and autonomy.
- Published in:
- Ethics & Information Technology, 2018, v. 20, n. 3, p. 219, doi. 10.1007/s10676-018-9466-4
- By:
- Publication type:
- Article
Every Company is a Potential Cyberrisk Victim.
- Published in:
- Financial Executive, 2012, v. 28, n. 4, p. 46
- Publication type:
- Article
Insurance Options Following A Cyberattack.
- Published in:
- Financial Executive, 2012, v. 28, n. 2, p. 58
- Publication type:
- Article
Stealing Trade Secrets Will U.S. Crack Down?
- Published in:
- Financial Executive, 2003, v. 19, n. 5, p. 26
- By:
- Publication type:
- Article
Cyber Risk Management: Do You Know Your Threat Sources? Add more precision to your security framework.
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2015, v. 34, n. 3, p. 27
- By:
- Publication type:
- Article
Cloud Intrusion Detection System Based on SVM.
- Published in:
- International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 11, p. 101, doi. 10.3991/ijim.v17i11.39063
- By:
- Publication type:
- Article
Hacker Tells How He Broke into Routers, Stole VoIP Services.
- Published in:
- IT Professional, 2007, v. 9, n. 6, p. 4
- Publication type:
- Article
Cyberwar Spotlight: Iran.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 1, p. 8
- By:
- Publication type:
- Article
Did Russian Cyber Interference in the 2016 Election Violate International Law?
- Published in:
- Texas Law Review, 2017, v. 95, n. 7, p. 1579
- By:
- Publication type:
- Article
Government Hacking.
- Published in:
- Yale Law Journal, 2018, v. 127, n. 3, p. 570
- By:
- Publication type:
- Article
CYBERCRIME: IN DISGUISE CRIMES.
- Published in:
- Journal of Information Systems & Operations Management, 2016, v. 10, n. 1, p. 1
- By:
- Publication type:
- Article
The Art of the Exploit: Gender Hacking and Political Agency.
- Published in:
- Paragraph, 2023, v. 46, n. 1, p. 10, doi. 10.3366/para.2023.0415
- By:
- Publication type:
- Article
KEEPING GATES DOWN: FURTHER NARROWING THE COMPUTER FRAUD AND ABUSE ACT IN THE WAKE OF VAN BUREN.
- Published in:
- William & Mary Business Law Review, 2022, v. 14, n. 1, p. 215
- By:
- Publication type:
- Article
Instructional Strategies for Integrating CyberEthics Issues.
- Published in:
- Journal of Applied Research for Business Instruction, 2004, v. 2, n. 4, p. 1
- By:
- Publication type:
- Article
The Guilty Eye: Unauthorized Access, Trespass and Privacy.
- Published in:
- Business Lawyer, 2007, v. 62, n. 4, p. 1395
- By:
- Publication type:
- Article
About the Authors.
- Published in:
- Deviant Behavior, 2007, v. 28, n. 2, p. 199, doi. 10.1080/01639620701221568
- Publication type:
- Article
Assessing Privacy and Security of Information Systems from Audit Data.
- Published in:
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1417, doi. 10.1007/s10796-021-10129-5
- By:
- Publication type:
- Article
SHOOTING THE MESSENGER: REMEDIATION OF DISCLOSED VULNERABILITIES AS CFAA "LOSS".
- Published in:
- Richmond Journal of Law & Technology, 2023, v. 29, n. 1, p. 89
- By:
- Publication type:
- Article
Freedom to Hack.
- Published in:
- Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
- By:
- Publication type:
- Article
The Empirical First Amendment.
- Published in:
- Ohio State Law Journal, 2017, v. 78, n. 4, p. 947
- By:
- Publication type:
- Article
The Hackable City: Citymaking in a Platform Society.
- Published in:
- Architectural Design, 2017, v. 87, n. 1, p. 50, doi. 10.1002/ad.2131
- By:
- Publication type:
- Article
Staying Safe: Cyber Security for People and Organizations.
- Published in:
- Journal of Library Administration, 2014, v. 54, n. 1, p. 46, doi. 10.1080/01930826.2014.893116
- By:
- Publication type:
- Article
Intrusion Detection System Using Ensemble of Decision Trees and Genetic Search Algorithm as a Feature Selector.
- Published in:
- International Journal of Information Security Science, 2020, v. 9, n. 2, p. 104
- By:
- Publication type:
- Article
"My Computer Is My Castle": New Privacy Frameworks to Regulate Police Hacking.
- Published in:
- Brigham Young University Law Review, 2019, v. 2019, n. 4, p. 997
- By:
- Publication type:
- Article
Under New Jersey law, the economic loss doctrine did not bar bank's negligence claim against credit card information processor.
- Published in:
- Banking Law Journal, 2013, v. 130, n. 10, p. 959
- By:
- Publication type:
- Article
Counter-heroics Afterword.
- Published in:
- 2006
- By:
- Publication type:
- Conference Paper/Materials
THE CYBER CIVIL WAR.
- Published in:
- Hofstra Law Review, 2015, v. 44, n. 1, p. 41
- By:
- Publication type:
- Article