Works matching Copyright of electronic data
2
- Annals of Library & Information Studies, 2005, v. 52, n. 1, p. 1
- Article
3
- Fraser Forum, 2006, p. 16
- Collins, Gemma;
- Flanagan, Tom
- Article
4
- Publishing Research Quarterly, 1996, v. 12, n. 4, p. 50, doi. 10.1007/BF02680574
- Article
5
- Publishing Research Quarterly, 1991, v. 7, n. 4, p. 13, doi. 10.1007/BF02678329
- Article
6
- Journal of Library Administration, 2006, v. 45, n. 3-4, p. 513, doi. 10.1300/J111v45n03_13
- Article
7
- Journal of Broadcasting & Electronic Media, 1988, v. 32, n. 1, p. 89, doi. 10.1080/08838158809386686
- Article
8
- Seybold Report: Analyzing Publishing Technologies, 2001, v. 1, n. 8, p. 3
- Article
9
- Case Western Reserve Journal of International Law, 2003, v. 35, n. 1, p. 89
- Article
10
- Brigham Young University Education & Law Journal, 2003, v. 2003, n. 1, p. 95
- Article
11
- Visual Communications Journal, 2013, v. 49, n. 1, p. 39
- Article
12
- Internet Reference Services Quarterly, 2010, v. 15, n. 2, p. 87, doi. 10.1080/10875301003757211
- Buczynski, JamesA.;
- Mall, SairaRachel
- Article
13
- Internet Reference Services Quarterly, 2006, v. 11, n. 4, p. 69
- Article
14
- Strategic Finance, 2001, v. 82, n. 8, p. 52
- Article
15
- International Journal of Electronic Commerce, 2008, v. 12, n. 4, p. 99
- García, Roberto;
- Gil, Rosa
- Article
16
- Berkeley Technology Law Journal, 2009, v. 24, n. 1, p. 484
- Article
17
- Berkeley Technology Law Journal, 2009, v. 24, n. 1, p. 363
- Article
18
- Berkeley Technology Law Journal, 2008, v. 23, n. 4, p. 1367
- Article
19
- Berkeley Technology Law Journal, 2008, v. 23, n. 1, p. 437
- Article
20
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 586
- Article
21
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 398
- Article
22
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 395
- Article
23
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 365
- Article
24
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 213
- Article
25
- Berkeley Technology Law Journal, 2006, v. 21, n. 1, p. 189
- Article
26
- Berkeley Technology Law Journal, 2003, v. 18, n. 3, p. 773
- Article
27
- Berkeley Technology Law Journal, 2003, v. 18, n. 1, p. 349
- Article
28
- Berkeley Technology Law Journal, 2003, v. 18, n. 1, p. 69
- Article
29
- Berkeley Technology Law Journal, 2003, v. 18, n. 1, p. 43
- Article
30
- Berkeley Technology Law Journal, 2003, v. 18, n. 1, p. 7
- Article
31
- ITNOW, 2009, v. 51, n. 1, p. 33
- Article
32
- TechTrends: Linking Research & Practice to Improve Learning, 2009, v. 53, n. 5, p. 14, doi. 10.1007/s11528-009-0317-3
- Article
34
- Learned Publishing, 2011, v. 24, n. 4, p. 299, doi. 10.1087/20110407
- He, Xiao-jun;
- Chen, Zhen-ying
- Article
35
- Learned Publishing, 2007, v. 20, n. 2, p. 113, doi. 10.1087/174148507X185072
- Article
36
- Learned Publishing, 2006, v. 19, n. 3, p. 168, doi. 10.1087/095315106777877539
- Article
37
- Journal of World Intellectual Property, 2009, v. 12, n. 4, p. 266, doi. 10.1111/j.1747-1796.2009.00367.x
- Article
38
- Journal of Information Assurance & Security, 2013, v. 8, n. 2, p. 97
- Article
39
- International Information & Library Review, 2008, v. 40, n. 4, p. 226, doi. 10.1016/j.iilr.2008.09.002
- Article
40
- International Journal of Cyber Criminology, 2009, v. 3, n. 1, p. 441
- Moore, Robert;
- McMullan, Elizabeth C.
- Article
41
- Jurisprudence / Jurisprudencija, 2009, v. 2, n. 116, p. 211
- Article
43
- Texas Law Review, 2007, v. 85, n. 3, p. 703
- Article
44
- JMM: The International Journal on Media Management, 2002, v. 4, n. 3, p. 172, doi. 10.1080/14241270209389997
- Article
45
- JMM: The International Journal on Media Management, 2002, v. 4, n. 3, p. 164, doi. 10.1080/14241270209389996
- Article
46
- 2002
- Burkert, Herbert;
- Zimmermann, Hans-Dieter
- Editorial
47
- Historical Materialism, 2009, v. 17, n. 3, p. 31, doi. 10.1163/146544609X12469428108466
- Article
48
- Museum Management & Curatorship, 1993, v. 12, n. 3, p. 321
- Article
49
- Seybold Report: Analyzing Publishing Technologies, 2003, v. 3, n. 5, p. 3
- Article
50
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 49
- Article