Works matching DE "COMPUTER security laws"
1
- ISSA Journal, 2017, v. 15, n. 12, p. 16
- Wood, Charles Cresson;
- Rogers Jr., William S.;
- Poore, Ralph Spencer
- Article
2
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- Article
3
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- Article
4
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 1/2, p. 69
- Article
5
- Journal of Contemporary Legal Issues, 2010, v. 19, n. 1, p. 513
- Article
6
- ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
- Walker-Osborn, Charlotte;
- Khalid, Farhan
- Article
7
- ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
- Walker-Osborn, Charlotte;
- Harto, Nadia
- Article
8
- ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
- Article
9
- ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
- Article
10
- ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
- Article
11
- European Data Protection Law Review (EDPL), 2016, v. 2, n. 2, p. 209, doi. 10.21552/edpl/2016/2/10
- Ursic, Helena;
- Custers, Bart
- Article
12
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 450
- Article
13
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 692, doi. 10.1093/jigpal/jzs027
- Amato, Flora;
- Casola, Valentina;
- Mazzocca, Nicola;
- Romano, Sara
- Article
14
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- Article
15
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 144, doi. 10.3906/elk-1105-54
- ÜNAL, Devrim;
- ÇAĞLAYAN, Mehmet Ufuk
- Article
16
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 3
- Article
17
- Business Lawyer, 2009, v. 65, n. 1, p. 285
- Siegel, Ariane;
- Denny, William;
- Poff, Kristen W.;
- Larose, Cynthia;
- Hale, Robert;
- Hintze, Mike
- Article
18
- Deviant Behavior, 1987, v. 8, n. 2, p. 113, doi. 10.1080/01639625.1987.9967737
- Article
19
- Boston University Law Review, 2021, v. 101, n. 2, p. 761
- Article
20
- Boston University Law Review, 2012, v. 92, n. 5, p. 1663
- Article
22
- Florida Bar Journal, 2013, v. 87, n. 1, p. 36
- Article
23
- Diplomatic History, 2019, v. 43, n. 1, p. 157, doi. 10.1093/dh/dhy038
- Article
25
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- Article
26
- Iowa Law Review, 2018, v. 103, n. 3, p. 985
- Article
27
- Contract Management, 2012, p. 76
- Article
28
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- Massey, Aaron K.;
- Otto, Paul N.;
- Hayward, Lauren J.;
- Antón, Annie I.
- Article
29
- Revista de Derecho Politico, 2012, n. 85, p. 13, doi. 10.5944/rdp.85.2012.10244
- Article
30
- Review of Management & Economic Engineering, 2010, v. 9, n. 1, p. 53
- Purcărea, Anca-Alexandra;
- Ťigănoaia, Bogdam-Dumitru
- Article
31
- UCLA Journal of Law & Technology, 2009, v. 13, n. 1, p. 1
- Article
32
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 87
- Article
33
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 103
- Article
34
- Contract Management, 2015, v. 55, n. 10, p. 72
- Article
35
- IEEE Software, 2004, v. 21, n. 4, p. 99
- Article
36
- International Journal of Electronics & Telecommunications, 2020, v. 66, n. 2, p. 321, doi. 10.24425/ijet.2020.131881
- Article
37
- Dreptul, 2012, n. 10, p. 204
- Article
38
- Journal of Current Issues in Media & Telecommunications, 2015, v. 7, n. 2, p. 209
- Article
39
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1727
- Article
40
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1671
- Frieden, Jonathan D.;
- Price, Charity M.;
- Murray, Leigh M.
- Article
41
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1666
- Fleming, Michael F.;
- Kunz, Christina L.
- Article
42
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- Hajian, Sara;
- Domingo-Ferrer, Josep;
- Farràs, Oriol
- Article
43
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- Article
44
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 329
- Article
45
- International Journal of Information Security, 2017, v. 16, n. 6, p. 673, doi. 10.1007/s10207-016-0345-x
- Joh, HyunChul;
- Malaiya, Yashwant
- Article
46
- International Journal of Law & Information Technology, 2010, v. 18, n. 4, p. 356, doi. 10.1093/ijlit/eaq010
- Sartor, Giovanni;
- Viola de Azevedo Cunha, Mario
- Article
47
- International Journal of Law & Information Technology, 2002, v. 10, n. 2, p. 224, doi. 10.1093/ijlit/10.2.224
- Article
48
- American Journal of Economics & Sociology, 1993, v. 52, n. 3, p. 257
- Article
49
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- Article
50
- Business Law Review (15337421), 2012, v. 45, p. 75
- Article