Works matching Computer security laws
1
- DESIDOC Bulletin of Information Technology, 2007, v. 27, n. 6, p. 41
- Tan Kar Peng;
- Ramaiah, Chennupati K.
- Article
2
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 1/2, p. 69
- Article
3
- Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109
- Article
5
- Revista de Derecho Politico, 2012, n. 85, p. 13, doi. 10.5944/rdp.85.2012.10244
- Article
6
- ISSA Journal, 2017, v. 15, n. 12, p. 16
- Wood, Charles Cresson;
- Rogers Jr., William S.;
- Poore, Ralph Spencer
- Article
7
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- Article
8
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- Article
10
- International Journal of Law & Information Technology, 2010, v. 18, n. 4, p. 356, doi. 10.1093/ijlit/eaq010
- Sartor, Giovanni;
- Viola de Azevedo Cunha, Mario
- Article
11
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- Article
12
- Business Law Review (15337421), 2012, v. 45, p. 75
- Article
13
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 692, doi. 10.1093/jigpal/jzs027
- Amato, Flora;
- Casola, Valentina;
- Mazzocca, Nicola;
- Romano, Sara
- Article
14
- Chapman Law Review, 2016, v. 19, n. 2, p. 401
- Article
15
- Journal of Contemporary Legal Issues, 2010, v. 19, n. 1, p. 513
- Article
16
- Journal of Counterterrorism & Homeland Security International, 2015, v. 21, n. 1, p. 12
- Article
17
- International Journal of Micrographics & Optical Technology, 2007, v. 25, n. 5, p. 7
- Article
18
- Washington Quarterly, 2017, v. 40, n. 3, p. 45, doi. 10.1080/0163660X.2017.1370359
- Article
19
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- Hajian, Sara;
- Domingo-Ferrer, Josep;
- Farràs, Oriol
- Article
20
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- Massey, Aaron K.;
- Otto, Paul N.;
- Hayward, Lauren J.;
- Antón, Annie I.
- Article
21
- Michigan Law Review, 2012, v. 111, n. 1, p. 1
- Article
23
- International Journal of Information Security, 2017, v. 16, n. 6, p. 673, doi. 10.1007/s10207-016-0345-x
- Joh, HyunChul;
- Malaiya, Yashwant
- Article
24
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- Article
25
- Tort Trial & Insurance Practice Law Journal, 2020, v. 55, n. 2, p. 217
- Godfrey, Lauren D.;
- Horton, Matthew;
- Johnson, Ericka A.;
- Mooney, Joshua A.;
- Zimmermann, Michael C.
- Article
26
- Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 2, p. 403
- Black, Kyle D.;
- Alam, Christina B.;
- Bucher, Steven M.;
- Giannetti, Ashley J.;
- Godfrey, Lauren D.;
- Wear, Justin D.
- Article
27
- Tort Trial & Insurance Practice Law Journal, 2018, v. 53, n. 2, p. 291
- Wear, Justin D.;
- Flowers, Robert;
- Black, Kyle D.;
- Godfrey, Lauren D.;
- Anderson, Roberta D.
- Article
28
- International Lawyer, 2018, v. 51, n. 3, p. 537
- Article
29
- ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
- Article
30
- ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
- Article
31
- Iowa Law Review, 2018, v. 103, n. 3, p. 985
- Article
32
- Minnesota Law Review, 2011, v. 96, n. 2, p. 584
- Article
33
- Government Technology, 2013, v. 26, n. 1, p. 7
- Article
34
- Government Technology, 2011, v. 24, n. 8, p. 46
- Article
35
- Government Technology, 2009, v. 22, n. 12, p. 42
- Article
36
- Issues in Science & Technology, 2012, v. 28, n. 4, p. 23
- Article
37
- Issues in Science & Technology, 2000, v. 17, n. 1, p. 29
- Article
38
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 3
- Article
39
- Boston University Law Review, 2021, v. 101, n. 2, p. 761
- Article
40
- Boston University Law Review, 2012, v. 92, n. 5, p. 1663
- Article
41
- Boston College International & Comparative Law Review, 2012, v. 35, n. 2, p. 511
- Article
42
- Boston College International & Comparative Law Review, 2012, v. 35, n. 2, p. 511
- Article
43
- Chinese Law & Government, 2016, v. 48, n. 1, p. 60, doi. 10.1080/00094609.2015.1048136
- Article
44
- American University Law Review, 2013, v. 62, n. 5, p. 1145
- Article
45
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 103
- Article
46
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 87
- Article
47
- ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
- Walker-Osborn, Charlotte;
- Khalid, Farhan
- Article
48
- ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
- Walker-Osborn, Charlotte;
- Harto, Nadia
- Article
49
- ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
- Article
50
- Contract Management, 2015, v. 55, n. 10, p. 72
- Article