Works matching DE "COMPUTER security laws"
1
- International Review of Law, Computers & Technology, 2009, v. 23, n. 1/2, p. 5, doi. 10.1080/13600860902742505
- Article
2
- International Review of Law, Computers & Technology, 2004, v. 18, n. 2, p. 251, doi. 10.1080/1360086042000223535
- Article
3
- International Review of Law, Computers & Technology, 2004, v. 18, n. 2, p. 231, doi. 10.1080/1360086042000223526
- Asinari *, María Verónica Pérez
- Article
4
- Government Technology, 2013, v. 26, n. 1, p. 7
- Article
5
- Government Technology, 2011, v. 24, n. 8, p. 46
- Article
6
- Government Technology, 2009, v. 22, n. 12, p. 42
- Article
7
- Revista de Derecho Politico, 2012, n. 85, p. 13, doi. 10.5944/rdp.85.2012.10244
- Article
8
- Issues in Science & Technology, 2000, v. 17, n. 1, p. 29
- Article
10
- IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
- Ruth, Stephen;
- Stone, Samuel
- Article
11
- IEEE Internet Computing, 2011, v. 15, n. 6, p. 80, doi. 10.1109/MIC.2011.160
- Article
12
- American University Law Review, 2013, v. 62, n. 5, p. 1145
- Article
13
- Tort Trial & Insurance Practice Law Journal, 2020, v. 55, n. 2, p. 217
- Godfrey, Lauren D.;
- Horton, Matthew;
- Johnson, Ericka A.;
- Mooney, Joshua A.;
- Zimmermann, Michael C.
- Article
14
- Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 2, p. 403
- Black, Kyle D.;
- Alam, Christina B.;
- Bucher, Steven M.;
- Giannetti, Ashley J.;
- Godfrey, Lauren D.;
- Wear, Justin D.
- Article
15
- Tort Trial & Insurance Practice Law Journal, 2018, v. 53, n. 2, p. 291
- Wear, Justin D.;
- Flowers, Robert;
- Black, Kyle D.;
- Godfrey, Lauren D.;
- Anderson, Roberta D.
- Article
16
- International Lawyer, 2018, v. 51, n. 3, p. 537
- Article
17
- Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109
- Article
18
- Deviant Behavior, 1987, v. 8, n. 2, p. 113, doi. 10.1080/01639625.1987.9967737
- Article
19
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 692, doi. 10.1093/jigpal/jzs027
- Amato, Flora;
- Casola, Valentina;
- Mazzocca, Nicola;
- Romano, Sara
- Article
20
- George Mason Law Review, 2011, v. 19, n. 1, p. 113
- Article
21
- International Policy Digest, 2017, v. 4, n. 5, p. 37
- Article
22
- International Journal of Law & Information Technology, 2010, v. 18, n. 4, p. 356, doi. 10.1093/ijlit/eaq010
- Sartor, Giovanni;
- Viola de Azevedo Cunha, Mario
- Article
23
- International Journal of Law & Information Technology, 2002, v. 10, n. 2, p. 224, doi. 10.1093/ijlit/10.2.224
- Article
24
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- Article
25
- Journal of Current Issues in Media & Telecommunications, 2015, v. 7, n. 2, p. 209
- Article
26
- Jurimetrics: The Journal of Law, Science & Technology, 2017, v. 57, n. 4, p. 483
- Article
27
- Iowa Law Review, 2018, v. 103, n. 3, p. 985
- Article
28
- Minnesota Law Review, 2011, v. 96, n. 2, p. 584
- Article
29
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- Hajian, Sara;
- Domingo-Ferrer, Josep;
- Farràs, Oriol
- Article
30
- American University International Law Review, 2011, v. 26, n. 3, p. 601
- Article
31
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 3
- Article
32
- European Journal of International Law, 2020, v. 31, n. 3, p. 941, doi. 10.1093/ejil/chaa057
- Tsagourias, Nicholas;
- Farrell, Michael
- Article
33
- European Journal of International Law, 2020, v. 31, n. 3, p. 969, doi. 10.1093/ejil/chaa056
- Finnemore, Martha;
- Hollis, Duncan B
- Article
34
- European Journal of International Law, 2010, v. 21, n. 2, p. 441, doi. 10.1093/ejil/chq025
- Article
35
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 450
- Article
37
- Chapman Law Review, 2016, v. 19, n. 2, p. 401
- Article
38
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- Massey, Aaron K.;
- Otto, Paul N.;
- Hayward, Lauren J.;
- Antón, Annie I.
- Article
39
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- Article
40
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 329
- Article
41
- European Data Protection Law Review (EDPL), 2016, v. 2, n. 2, p. 209, doi. 10.21552/edpl/2016/2/10
- Ursic, Helena;
- Custers, Bart
- Article
42
- ISSA Journal, 2017, v. 15, n. 12, p. 16
- Wood, Charles Cresson;
- Rogers Jr., William S.;
- Poore, Ralph Spencer
- Article
43
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- Article
44
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- Article
45
- Diplomatic History, 2019, v. 43, n. 1, p. 157, doi. 10.1093/dh/dhy038
- Article
46
- American Journal of Economics & Sociology, 1993, v. 52, n. 3, p. 257
- Article
47
- Boston University Law Review, 2021, v. 101, n. 2, p. 761
- Article
48
- Boston University Law Review, 2012, v. 92, n. 5, p. 1663
- Article
49
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- Article
50
- International Journal of Micrographics & Optical Technology, 2007, v. 25, n. 5, p. 7
- Article