Found: 119
Select item for more details and to access through your institution.
Safeguarding Ascension: The vital role of cyber and crime insurance for elevator contractors and suppliers.
- Published in:
- Elevator World, 2024, v. 72, n. 7, p. 36
- By:
- Publication type:
- Article
Digital Forensics According to International Organization for Standardization/International Organization for Standardization 27050 and Digital Evidence Forensics Standard Operating Procedure: Use of Sensor Technology.
- Published in:
- Sensors & Materials, 2024, v. 36, n. 6, Part 2, p. 2315, doi. 10.18494/SAM4871
- By:
- Publication type:
- Article
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 1679, doi. 10.1007/s10207-023-00809-5
- By:
- Publication type:
- Article
The Human Risk of AI Fraud: AI-generated cyber attacks and deepfakes mean new risks and new ways to fight them.
- Published in:
- Government Technology, 2024, v. 37, n. 4, p. 50
- By:
- Publication type:
- Article
CIVIL RICO: A TOOL OF ADVOCACY.
- Published in:
- Brief, 2024, v. 53, n. 2, p. 38
- By:
- Publication type:
- Article
Academic misconduct, fake authorship letters, cyber fraud: Evidence from the International Political Science Review.
- Published in:
- Learned Publishing, 2024, v. 37, n. 1, p. 39, doi. 10.1002/leap.1587
- By:
- Publication type:
- Article
APPLICATION OF ECONOMIC AND MATHEMATICAL MODELLING TO DETECT AND PREVENT FRAUD IN FINANCIAL STATEMENTS.
- Published in:
- Financial & Credit Activity: Problems of Theory & Practice, 2023, v. 6, n. 53, p. 217, doi. 10.55643/fcaptp.6.53.2023.4215
- By:
- Publication type:
- Article
La reforma de la ciberestafa y la incorporación de los medios de pago digitales en el Código Penal.
- Published in:
- IDP: Revista de Internet, Derecho y Politica, 2023, n. 38, p. 1
- By:
- Publication type:
- Article
Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 5, p. 5354, doi. 10.11591/ijece.v13i5.pp5354-5365
- By:
- Publication type:
- Article
Preventing computer crime by knowing the legal regulations that ensure the protection of computer systems.
- Published in:
- Juridical Tribune / Tribuna Juridica, 2023, v. 13, n. 3, p. 363, doi. 10.24818/TBJ/2023/13/3.03
- By:
- Publication type:
- Article
Discursive odds of a fraudulent scheme in cyberspace correspondence: A CDA approach.
- Published in:
- Researches in Linguistics, 2023, v. 15, n. 2, p. 53, doi. 10.22108/jrl.2023.138133.1764
- By:
- Publication type:
- Article
USER ERROR: REGULATORY FAILURES TO PROPERLY ADDRESS TECHNOLOGICAL ISSUES IN BUSINESS AND TAXATION.
- Published in:
- Richmond Journal of Law & Technology, 2023, v. 29, n. 3, p. 1
- By:
- Publication type:
- Article
Titelei.
- Published in:
- 2023
- Publication type:
- Table of Contents
An empirical analysis of sentencing of "Access to Information" computer crimes.
- Published in:
- Journal of Empirical Legal Studies, 2023, v. 20, n. 2, p. 434, doi. 10.1111/jels.12349
- By:
- Publication type:
- Article
Criminal law regulation of cyber fraud crimes—from the perspective of citizens' personal information protection in the era of edge computing.
- Published in:
- Journal of Cloud Computing (2192-113X), 2023, v. 12, n. 1, p. 1, doi. 10.1186/s13677-023-00437-3
- By:
- Publication type:
- Article
RESEARCH ON STUDENTS' PERCEPTION OF INFORMATION TECHNOLOGY SECURITY – A NEW ERA OF THREATS.
- Published in:
- Scientific Papers of Silesian University of Technology. Organization & Management / Zeszyty Naukowe Politechniki Slaskiej. Seria Organizacji i Zarzadzanie, 2023, n. 170, p. 709, doi. 10.29119/1641-3466.2023.170.43
- By:
- Publication type:
- Article
Thinking about the future of CYBER INSURANCE.
- Published in:
- Bench & Bar of Minnesota, 2023, v. 80, n. 1, p. 10
- By:
- Publication type:
- Article
Titelei.
- Published in:
- Computer und Recht, 2023, v. 39, n. 1, p. i, doi. 10.9785/cr-2023-frontmatter3901
- Publication type:
- Article
Blockchain Encryption using Biometric Authentication.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 1, p. 371
- By:
- Publication type:
- Article
NUEVAS TECNOLOGÍAS, ESTAFA INFORMÁTICA E IGNORANCIA DELIBERADA.
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2023, v. 12, n. 1, p. 1
- By:
- Publication type:
- Article
Cyber Sit-Ins: Bringing Protest Online by Modernizing the Computer Fraud and Abuse Act.
- Published in:
- Roger Williams University Law Review, 2023, v. 28, n. 1, p. 80
- By:
- Publication type:
- Article
Cyber Risk and Mitigation Associated with Healthcare Industry.
- Published in:
- Telecom Business Review, 2023, v. 16, n. 1, p. 51
- By:
- Publication type:
- Article
Developments in Advertising and Consumer Protection.
- Published in:
- Business Lawyer, 2022, v. 78, n. 1, p. 305
- By:
- Publication type:
- Article
Caracterización de la productividad de una empresa mexicana desarrolladora de tecnología mediante control difuso.
- Published in:
- Revista de Metodos Cuantitativos para la Economia y la Empresa, 2022, v. 34, p. 281, doi. 10.46661/revmetodoscuanteconempresa.5374
- By:
- Publication type:
- Article
Offline crime bounces back to pre-COVID levels, cyber stays high: interrupted time-series analysis in Northern Ireland.
- Published in:
- Crime Science, 2022, v. 10, n. 1, p. 1, doi. 10.1186/s40163-021-00162-9
- By:
- Publication type:
- Article
KEEPING GATES DOWN: FURTHER NARROWING THE COMPUTER FRAUD AND ABUSE ACT IN THE WAKE OF VAN BUREN.
- Published in:
- William & Mary Business Law Review, 2022, v. 14, n. 1, p. 215
- By:
- Publication type:
- Article
SOCIAL ENGINEERING OR COMPUTER FRAUD? In cyber insurance, the difference matters.
- Published in:
- Bench & Bar of Minnesota, 2022, v. 79, n. 8, p. 10
- By:
- Publication type:
- Article
Exploring Employees' Computer Fraud Behaviors using the Fraud Triangle Theory.
- Published in:
- Pacific Asia Journal of the Association for Information Systems, 2022, v. 14, n. 4, p. 100, doi. 10.17705/1pais.14404
- By:
- Publication type:
- Article
Cybercrime Policing in the Lagos State Command of the Nigeria Police Force.
- Published in:
- Salus Journal, 2022, v. 10, n. 2, p. 34
- By:
- Publication type:
- Article
THE PROSPECTS, CHALLENGES, AND LEGAL ISSUES OF DIGITAL BANKING IN NIGERIA.
- Published in:
- Cogito (2066-7094), 2022, v. 14, n. 3, p. 186
- By:
- Publication type:
- Article
THE DEPICTION OF CYBERCRIME VICTIMS USING DATA MINING TECHNIQUES.
- Published in:
- Scientific Bulletin of National Mining University, 2022, v. 37, n. 5, p. 174, doi. 10.33271/nvngu/2022-5/174
- By:
- Publication type:
- Article
Summary Issues of Cybercrime.
- Published in:
- Law Review: Judicial Doctrine & Case-Law, 2022, v. 12, n. 2, p. 121
- By:
- Publication type:
- Article
ADJUSTING THE SOCIAL ENGINEERING CLAIM.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2022, v. 57, n. 3, p. 801
- By:
- Publication type:
- Article
Masthead.
- Published in:
- 2022
- Publication type:
- Table of Contents
USA: Preliminary Injunction on basis of Computer Fraud and Abuse Act.
- Published in:
- Computer Law Review International, 2022, v. 23, n. 3, p. 75, doi. 10.9785/cri-2022-230304
- Publication type:
- Article
Table of Contents.
- Published in:
- 2022
- Publication type:
- Table of Contents
The modus operandi of transnational computer fraud: a crime script analysis in Vietnam.
- Published in:
- Trends in Organized Crime, 2022, v. 25, n. 2, p. 226, doi. 10.1007/s12117-021-09422-1
- By:
- Publication type:
- Article
A Review of the Supreme Court Cases from the October 2020 Term That Impact Labor and Employment Issues.
- Published in:
- ABA Journal of Labor & Employment Law, 2022, v. 36, n. 2, p. 203
- By:
- Publication type:
- Article
Shot in the Dark: Can Private Sector “Hackbacks” Work?
- Published in:
- Journal of National Security Law & Policy, 2022, v. 13, n. 1, p. 211
- By:
- Publication type:
- Article
SUPREME COURT'S 2020 TERM EMPLOYMENT LAW CASES: RAILROAD RETIREMENT, STUDENT-ATHLETES RELIGIOUS RIGHTS, UNION ACCESS, AND COMPUTER FRAUD.
- Published in:
- Employee Rights & Employment Policy Journal, 2021, v. 24, n. 2, p. 125
- By:
- Publication type:
- Article
Discovery Considerations Presented by Group Collaboration Tools.
- Published in:
- Brief, 2021, v. 51, n. 1, p. 51
- By:
- Publication type:
- Article
LET THE BOTS BE BOTS: WHY THE CFAA MUST BE CLARIFIED TO PREVENT THE SELECTIVE BANNING OF DATA COLLECTION FACILITATING PRIVATE SOCIAL MEDIA INFORMATION MONOPOLIZATION.
- Published in:
- Brooklyn Journal of Corporate, Financial & Commercial Law, 2021, v. 16, n. 1, p. 279
- By:
- Publication type:
- Article
Search Patch Warrants.
- Published in:
- ISSA Journal, 2021, v. 19, n. 7, p. 7
- By:
- Publication type:
- Article
THE LAW OF SPACE CYBER OPERATIONS: GRIPPING MYSTERIES, ENTANGLED FRONTIERS, AND SECURITY CHALLENGES.
- Published in:
- Journal of Law, Technology & the Internet, 2021, v. 13, n. 1, p. 148
- By:
- Publication type:
- Article
RECENT DEVELOPMENTS IN FIDELITY AND SURETY LAW.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2021, v. 56, n. 2, p. 377
- By:
- Publication type:
- Article
The Timeless Question of "How Many Occurrences?".
- Published in:
- Brief, 2021, v. 50, n. 3, p. 50
- By:
- Publication type:
- Article
The Most Disruptive Technology (Sort of...).
- Published in:
- ISSA Journal, 2021, v. 19, n. 1, p. 5
- By:
- Publication type:
- Article
Delitos informáticos en el Código penal argentino.
- Published in:
- Revista Chilena de Derecho y Ciencia Política, 2020, v. 11, n. 2, p. 122, doi. 10.7770/RCHDCP-V11N2-ART2289
- By:
- Publication type:
- Article
SPOILING FOR A FIGHT: HACKING BACK WITH THE ACTIVE CYBER DEFENSE CERTAINTY ACT.
- Published in:
- South Dakota Law Review, 2020, v. 65, n. 3, p. 467
- By:
- Publication type:
- Article
Standing Under the Computer Fraud and Abuse Act.
- Published in:
- Penn State Law Review, 2020, v. 124, n. 3, p. 743
- By:
- Publication type:
- Article