Results: 182
Why do legislators keep failing victims in online harms?
- Published in:
- International Review of Law, Computers & Technology, 2024, v. 38, n. 2, p. 195, doi. 10.1080/13600869.2023.2295100
- By:
- Publication type:
- Article
African governments and the influence of corruption on the proliferation of cybercrime in Africa: wherein lies the rule of law?
- Published in:
- International Review of Law, Computers & Technology, 2021, v. 35, n. 2, p. 131, doi. 10.1080/13600869.2021.1885105
- By:
- Publication type:
- Article
REGULAMENTAÇÃO SUPRANACIONAL SOBRE CRIMINALIDADE INFORMÁTICA E TÉCNICAS DE TRANSPOSIÇÃO. O DIREITO PENAL PORTUGUÊS E ESPANHOL COMO PARADIGMAS.
- Published in:
- Actualidad Jurídica (1578-956X), 2018, n. 48, p. 48
- By:
- Publication type:
- Article
A LEI DO CIBERCRIME E A COLABORAÇÃO DO ARGUIDO NO ACESSO AOS DADOS INFORMÁTICOS.
- Published in:
- Actualidad Jurídica (1578-956X), 2014, n. 38, p. 146
- By:
- Publication type:
- Article
Thailand's evolving Internet policies: the search for a balance between national security and the right to information.
- Published in:
- Asian Journal of Communication, 2013, v. 23, n. 1, p. 1, doi. 10.1080/01292986.2012.717089
- By:
- Publication type:
- Article
CHAOS AND CONVERGENCE.
- Published in:
- Overland, 2013, n. 210, p. 87
- By:
- Publication type:
- Article
Cybercrime and Punishment: The Russian Mafia and Russian Responsibility to Exercise Due Diligence to Prevent Trans-boundary Cybercrime.
- Published in:
- Brigham Young University Law Review, 2015, v. 2015, n. 1, p. 177
- By:
- Publication type:
- Article
Developments in Advertising and Consumer Protection.
- Published in:
- Business Lawyer, 2022, v. 78, n. 1, p. 305
- By:
- Publication type:
- Article
Recent Developments in Cyberspace Law: A View from Brazil.
- Published in:
- Business Lawyer, 2013, v. 69, n. 1, p. 301
- By:
- Publication type:
- Article
Survey of Computer Fraud and Abuse Act Cases.
- Published in:
- Business Lawyer, 2011, v. 67, n. 1, p. 321
- By:
- Publication type:
- Article
THE INCESSANT IMAGE: HOW DOMINANT NEWS COVERAGE SHAPED CANADIAN CYBERBULLYING LAW.
- Published in:
- University of New Brunswick Law Journal, 2015, v. 66, p. 137
- By:
- Publication type:
- Article
La regulación de los daños informáticos en el código penal italiano.
- Published in:
- IDP: Revista de Internet, Derecho y Politica, 2013, n. 16, p. 74, doi. 10.7238/idp.v0i16.1831
- By:
- Publication type:
- Article
"I AGREE" TO CRIMINAL LIABILITY: LORI DREW'S PROSECUTION UNDER §1030(A)(2)(C) OF THE COMPUTER FRAUD AND ABUSE ACT, AND WHY EVERY INTERNET USER SHOULD CARE.
- Published in:
- Journal of Law, Technology & Policy, 2009, v. 2009, n. 2, p. 561
- By:
- Publication type:
- Article
TRADE SECRET LAW AND THE COMPUTER FRAUD AND ABUSE ACT: TWO PROBLEMS AND TWO SOLUTIONS.
- Published in:
- Journal of Law, Technology & Policy, 2009, v. 2009, n. 2, p. 429
- By:
- Publication type:
- Article
Sex in Spam: A Content Analysis.
- Published in:
- International Journal of Criminal Justice Sciences, 2014, v. 9, n. 1, p. 35
- By:
- Publication type:
- Article
Cybercrime and the Law: Challenges, Issues, and Outcomes.
- Published in:
- 2013
- By:
- Publication type:
- Book Review
The Third Dimension of Victimization.
- Published in:
- Ohio State Journal of Criminal Law, 2015, v. 13, n. 1, p. 139
- By:
- Publication type:
- Article
THE INTERNET AS A GAME CHANGER: REEVALUATING THE TRUE THREATS DOCTRINE.
- Published in:
- Texas Tech Law Review, 2011, v. 44, n. 1, p. 183
- By:
- Publication type:
- Article
CYBER WARFARE.
- Published in:
- Military Law Review, 2014, v. 219, p. 1
- By:
- Publication type:
- Article
An Un-Standard Condition: Restricting Internet Use as a Condition of Supervised Release.
- Published in:
- Federal Sentencing Reporter, 2008, v. 20, n. 3, p. 201, doi. 10.1525/fsr.2008.20.3.201
- By:
- Publication type:
- Article
Internet Law: Latest Developments in Cyber Laws in Malaysia.
- Published in:
- International Journal of Legal Information, 2012, v. 40, n. 1/2, p. 257, doi. 10.1017/S0731126500006491
- By:
- Publication type:
- Article
CYBERCRIME DETERRENCE AND INTERNATIONAL LEGISLATION: EVIDENCE FROM DISTRIBUTED DENIAL OF SERVICE ATTACKS.
- Published in:
- MIS Quarterly, 2017, v. 41, n. 2, p. 497
- By:
- Publication type:
- Article
KIBERNETINIO SAUGUMO TEISINIS REGULIAVIMAS: KIBERNETINIO SAUGUMO STRATEGIJOS.
- Published in:
- Social Technologies / Socialines Technologijos, 2013, v. 3, n. 1, p. 189, doi. 10.13165/st-13-3-1-13
- By:
- Publication type:
- Article
CRIMINALIZING HACKING, NOT DATING: RECONSTRUCTING THE CFAA INTENT REQUIREMENT.
- Published in:
- Journal of Criminal Law & Criminology, 2013, v. 103, n. 3, p. 907
- By:
- Publication type:
- Article
Fighting the Cybercrime Plague.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2013, v. 24, n. 5, p. 3, doi. 10.1002/jcaf.21869
- By:
- Publication type:
- Article
Striking the Balance between Human Rights Online and State Security Concerns: The Russian Way in a Comparative Context.
- Published in:
- German Law Journal, 2018, v. 9, n. 1, p. 85
- By:
- Publication type:
- Article
Artificial Intelligence and the Law: Cybercrime and Criminal Liability. By Dennis J. Baker and Paul H. Robinson (Routledge, 2021, 280pp. £120 hb).
- Published in:
- 2022
- By:
- Publication type:
- Book Review
COMPUTER FRAUD AND ABUSE OR PROSECUTORIAL FRAUD AND ABUSE: TIME FOR CHANGE.
- Published in:
- Journal of Law, Technology & the Internet, 2014, v. 6, n. 1, p. 67
- By:
- Publication type:
- Article
EXPLORING DEVIANT HACKER NETWORKS (DHN) ON SOCIAL MEDIA PLATFORMS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 2, p. 7
- By:
- Publication type:
- Article
A REASONABLE RENDITION OF REGISTRATION: GOPETS V. HISE, SCHMIDHEINY V. WEBER, AND CONGRESSIONAL INTENT.
- Published in:
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- By:
- Publication type:
- Article
MULTISTAKEHOLDER APPROACH TO INTERNET GOVERNANCE: A COLLABORATIVE EFFORT COMBATING ILLEGAL INTERNET ACTIVITIES.
- Published in:
- Suffolk Transnational Law Review, 2015, v. 38, n. 1, p. 69
- By:
- Publication type:
- Article
Human Trafficking and Online Networks: Policy, Analysis, and Ignorance.
- Published in:
- Antipode, 2016, v. 48, n. 3, p. 665, doi. 10.1111/anti.12213
- By:
- Publication type:
- Article
The Normative Response to Problems of Detection and Investigation of Cyber Crime.
- Published in:
- Novi Sad Faculty of Law: Collected Papers / Zbornik Radova: Pravni Fakultet u Novom Sadu, 2013, v. 47, n. 1, p. 291, doi. 10.5937/zrpfns47-3618
- By:
- Publication type:
- Article
IDENTITY THEFT ON SOCIAL NETWORKING SITES: DEVELOPING ISSUES OF INTERNET IMPERSONATION.
- Published in:
- Touro Law Review, 2013, v. 29, n. 2, p. 455
- By:
- Publication type:
- Article
GOOD INTENTIONS AND UNINTENDED CONSEQUENCES: SESTA/FOSTA'S FIRST TWO YEARS.
- Published in:
- Temple Law Review, 2020, v. 93, n. 1, p. 151
- By:
- Publication type:
- Article
Explanations of a Number of Issues in the Specific Application of the Law on Handling Criminal Cases of Using the Internet, Mobile Communication Terminals, and Voice Sets for the Production, Reproduction, Publication, Sale, and Dissemination of Obscene Electronic Information
- Published in:
- Chinese Law & Government, 2010, v. 43, n. 5, p. 40, doi. 10.2753/CLG0009-4609430506
- By:
- Publication type:
- Article
Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target Under International Humanitarian Law.
- Published in:
- Vanderbilt Journal of Transnational Law, 2014, v. 47, n. 1, p. 67
- By:
- Publication type:
- Article
ONE-OFF & OFF-HAND: DEVELOPING AN APPROPRIATE COURSE OF LIABILITY IN THREATENING ONLINE MASS COMMUNICATION EVENTS.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2014, v. 32, n. 3, p. 1027
- By:
- Publication type:
- Article
Using Frugal Innovations to Support Cybercrime Legislations in Small Developing States: Introducing the Cyber-Legislation Development and Implementation Process Model (CyberLeg-DPM).
- Published in:
- Information Technology for Development, 2014, v. 20, n. 2, p. 165, doi. 10.1080/02681102.2013.841630
- By:
- Publication type:
- Article
A FEW COMMENTS ON THE COUNCIL OF EUROPE CONVENTION ON CYBERCRIME.
- Published in:
- Journal of Law & Administrative Sciences, 2017, n. 8, p. 28
- By:
- Publication type:
- Article
A Review of the ECOWAS Cybercrime Directive.
- Published in:
- Computer Law Review International, 2019, v. 20, n. 2, p. 40, doi. 10.9785/cri-2019-200204
- By:
- Publication type:
- Article
Updates.
- Published in:
- Computer Law Review International, 2015, v. 16, n. 5, p. 156, doi. 10.9785/cri-2015-0506
- Publication type:
- Article
Cyber Extortion, Ransomware and the South African Cybercrimes and Cybersecurity Bill.
- Published in:
- Statute Law Review, 2019, v. 40, n. 2, p. 143, doi. 10.1093/slr/hmx028
- By:
- Publication type:
- Article
The Territorial Jurisdiction of the ICC for Core Crimes Committed Through the Internet.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 523, doi. 10.1093/jcsl/krw021
- By:
- Publication type:
- Article
Non-State Actors, Ungoverned Spaces and International Responsibility for Cyber Acts.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 455, doi. 10.1093/jcsl/krw020
- By:
- Publication type:
- Article
Crime News in a Loyalist Press Environment.
- Published in:
- Arab Media & Society, 2023, n. 35, p. 69, doi. 10.70090/jg23cnlp
- By:
- Publication type:
- Article
Governing the ungovernable: international relations, transnational cybercrime law, and the post-Westphalian regulatory state.
- Published in:
- Transnational Legal Theory, 2015, v. 6, n. 1, p. 211, doi. 10.1080/20414005.2015.1042226
- By:
- Publication type:
- Article
Implementing the Provision of the European Council Convention on Cybercrime în the Romanian Legislation.
- Published in:
- Acta Universitatis Danubius: Juridica, 2010, p. 13
- By:
- Publication type:
- Article
INFORMATION TECHNOLOGY ACT & CYBER CRIMES: A PERSPECTIVE.
- Published in:
- 2010
- By:
- Publication type:
- Opinion
THE LEGAL ENVIRONMENT OF ROMANIAN E-COMMERCE: A CRITICAL ANALYSIS AND RECOMMENDATIONS FOR IMPROVEMENT.
- Published in:
- Economics, Management & Financial Markets, 2012, v. 7, n. 4, p. 440
- By:
- Publication type:
- Article