Works matching Computer hacking
1
- AGORA International Journal of Juridical Sciences, 2014, v. 2, p. 29
- Article
2
- Jurimetrics: The Journal of Law, Science & Technology, 2013, v. 53, n. 4, p. 447
- Article
3
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2011, v. 46, n. 1, p. 24
- Article
4
- Tibetan Review: The Monthly Magazine on all Aspects of Tibet, 2007, v. 42, n. 10, p. 30
- Article
5
- Journal of Information Systems Education, 2023, v. 34, n. 4, p. 370
- Luse, Andy;
- Shadbad, Forough Nasirpouri
- Article
6
- McGeorge Law Review, 2011, v. 42, n. 4, p. 929
- Article
7
- Elevator World, 2020, v. 68, n. 4, p. 68
- Article
9
- Journal of the Australian & New Zealand Institute of Insurance & Finance, 2021, v. 44, n. 3, p. 36
- Article
10
- Ethics & Information Technology, 2016, v. 18, n. 2, p. 117, doi. 10.1007/s10676-016-9398-9
- Ienca, Marcello;
- Haselager, Pim
- Article
11
- Frontiers in Psychology, 2020, v. 11, p. 1, doi. 10.3389/fpsyg.2020.00840
- Lee, Jin Ree;
- Holt, Thomas J.
- Article
12
- Journal for Religion, Film & Media, 2019, v. 5, n. 2, p. 15, doi. 10.25364/05.052019.2.2
- Article
13
- IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
- Ruth, Stephen;
- Stone, Samuel
- Article
14
- Social Science Computer Review, 2022, v. 40, n. 6, p. 1614, doi. 10.1177/08944393211023324
- Holt, Thomas J.;
- Turner, Noah D.;
- Freilich, Joshua D.;
- Chermak, Steven M.
- Article
15
- Journal of Contemporary Criminal Justice, 2017, v. 33, n. 3, p. 212, doi. 10.1177/1043986217699100
- Holt, Thomas J.;
- Freilich, Joshua D.;
- Chermak, Steven M.
- Article
16
- Terrorism & Political Violence, 2022, v. 34, n. 7, p. 1305, doi. 10.1080/09546553.2020.1777987
- Holt, Thomas J.;
- Lee, Jin Ree;
- Freilich, Joshua D.;
- Chermak, Steven M.;
- Bauer, Johannes M.;
- Shillair, Ruth;
- Ross, Arun
- Article
17
- Global Crime, 2018, v. 19, n. 2, p. 107, doi. 10.1080/17440572.2018.1448272
- Mann, Monique;
- Warren, Ian;
- Kennedy, Sally
- Article
18
- IT Professional, 2015, v. 17, n. 1, p. 30, doi. 10.1109/MITP.2015.1
- Article
19
- Journal of Crime & Justice, 2009, v. 32, n. 1, p. 1, doi. 10.1080/0735648X.2009.9721260
- Morris, Robert G.;
- Blackburn, Ashley G.
- Article
20
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- Article
21
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1417, doi. 10.1007/s10796-021-10129-5
- Article
22
- Emory Law Journal, 2018, v. 68, n. 1, p. 183
- Article
23
- 2006
- Conference Paper/Materials
24
- Yale Law Journal, 2018, v. 127, n. 3, p. 570
- Article
26
- Journal of Information Systems & Operations Management, 2016, v. 10, n. 1, p. 1
- Gupta, Pranshu;
- Mata-Toledo, Ramon A.
- Article
27
- Banking Law Journal, 2013, v. 130, n. 10, p. 959
- Article
28
- British Journalism Review, 2008, v. 19, n. 4, p. 75, doi. 10.1177/0956474808100870
- Article
29
- Creighton Law Review, 2014, v. 47, n. 3, p. 423
- Article
30
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- Article
31
- Journal of Library Administration, 2014, v. 54, n. 1, p. 46, doi. 10.1080/01930826.2014.893116
- Arlitsch, Kenning;
- Edelman, Adam
- Article
32
- William & Mary Business Law Review, 2022, v. 14, n. 1, p. 215
- Article
33
- Criminology & Criminal Justice: An International Journal, 2025, v. 25, n. 2, p. 670, doi. 10.1177/17488958221128128
- Button, Mark;
- Shepherd, David;
- Blackbourn, Dean;
- Sugiura, Lisa;
- Kapend, Richard;
- Wang, Victoria
- Article
34
- Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
- Article
35
- Ohio State Law Journal, 2017, v. 78, n. 4, p. 947
- Article
36
- Architectural Design, 2017, v. 87, n. 1, p. 50, doi. 10.1002/ad.2131
- de Waal, Martijn;
- de Lange, Michiel;
- Bouw, Matthijs
- Article
37
- Journal of Criminal Law, 2018, v. 82, n. 4, p. 296, doi. 10.1177/0022018318791670
- Article
38
- Government Technology, 2016, v. 29, n. 3, p. 42
- Article
39
- Electronics (2079-9292), 2021, v. 10, n. 15, p. 1854, doi. 10.3390/electronics10151854
- Toldinas, Jevgenijus;
- Venčkauskas, Algimantas;
- Damaševičius, Robertas;
- Grigaliūnas, Šarūnas;
- Morkevičius, Nerijus;
- Baranauskas, Edgaras
- Article
40
- Financial Executive, 2012, v. 28, n. 4, p. 46
- Article
41
- Financial Executive, 2012, v. 28, n. 2, p. 58
- Article
42
- Business Lawyer, 2007, v. 62, n. 4, p. 1395
- Article
43
- Bulletin of the Atomic Scientists, 2018, v. 74, n. 6, p. 368, doi. 10.1080/00963402.2018.1533185
- Article
44
- In These Times, 2013, v. 37, n. 3, p. 55
- Article
45
- Journal of Counterterrorism & Homeland Security International, 2012, v. 18, n. 1, p. 8
- Article
46
- Victims & Offenders, 2016, v. 11, n. 4, p. 534, doi. 10.1080/15564886.2015.1121944
- Chua, Yi Ting;
- Holt, Thomas J.
- Article
47
- Journal of Ethnicity in Criminal Justice, 2022, v. 20, n. 1, p. 73, doi. 10.1080/15377938.2022.2054890
- Phan, Diana K.;
- Espinoza, Russ K. E.;
- Sy, Susan R.
- Article
48
- Economics & Business (1987-5789), 2023, n. 4, p. 7
- სიჭინავა, დემურ;
- მაღრაძე, მურთაზ
- Article
49
- i-Manager's Journal on Digital Signal Processing, 2023, v. 11, n. 1, p. 27, doi. 10.26634/jdp.11.1.19237
- CHAITANYA KUMAR, G. SAI;
- KUMAR, R. KIRAN;
- PRASAD, Y. SIVA;
- KUMAR, A. KALYAN;
- SAI, N. RAGHAVENDRA
- Article
50
- Journal of Applied Research for Business Instruction, 2004, v. 2, n. 4, p. 1
- Gueldenzoph, Lisa E.;
- Snyder, Mark Jon
- Article