Works matching DE "COMPUTER crime laws"
1
- Academic Journal of Internal Affairs / Belügyi Szemle, 2025, v. 73, n. 7, p. 1528
- Géza, Finszter;
- László, Korinek
- Article
2
- Actualidad Jurídica (1578-956X), 2018, n. 48, p. 48
- PROENÇA DE CARVALHO, FRANCISCO;
- MORALES GARCÍA, OSCAR;
- ÁLVAREZ FEIJOO, MANUEL
- Article
3
- Actualidad Jurídica (1578-956X), 2014, n. 38, p. 146
- NEVES, RITA CASTANHEIRA;
- SANTOS CORREIA, HÉLDER
- Article
4
- New York University Law Review, 2015, v. 90, n. 2, p. 746
- Article
5
- Družboslovne Razprave, 2013, v. 29, n. 74, p. 107
- Article
6
- Social Technologies / Socialines Technologijos, 2013, v. 3, n. 1, p. 189, doi. 10.13165/st-13-3-1-13
- Article
7
- eLearning & Software for Education, 2017, v. 3, p. 358, doi. 10.12753/2066-026X-17-227
- Article
8
- Transnational Legal Theory, 2015, v. 6, n. 1, p. 211, doi. 10.1080/20414005.2015.1042226
- Article
9
- AGORA International Journal of Juridical Sciences, 2014, v. 2, p. 29
- Article
10
- Antipode, 2016, v. 48, n. 3, p. 665, doi. 10.1111/anti.12213
- Mendel, Jonathan;
- Sharapov, Kiril
- Article
11
- New York Law School Law Review, 2016, v. 61, n. 3/4, p. 369
- Article
12
- Novi Sad Faculty of Law: Collected Papers / Zbornik Radova: Pravni Fakultet u Novom Sadu, 2013, v. 47, n. 1, p. 291, doi. 10.5937/zrpfns47-3618
- Article
13
- Western New England Law Review, 2011, v. 33, n. 1, p. 757
- BARR, JAMISON;
- LUGUS, EMMY
- Article
14
- Temple Law Review, 2020, v. 93, n. 1, p. 151
- Article
15
- Monash University Law Review, 2014, v. 40, n. 3, p. 698
- Article
16
- Canadian Yearbook of International Law, 2014, v. 52, p. 437, doi. 10.1017/cyl.2015.12
- LOGVIN, ALEXANDRA;
- VANDERHEYDEN, ANDREA
- Article
17
- Southern California Law Review, 2012, v. 86, n. 1, p. 117
- Article
18
- Journal of Offender Monitoring, 2009, v. 21, n. 1, p. 27
- LaMagna, Richard C.;
- Berejka, Mark
- Article
19
- Journal of Offender Monitoring, 2009, v. 21, n. 1, p. 4
- Article
20
- Pertanika Journal of Social Sciences & Humanities, 2015, v. 23, p. 153
- Sa'di, Mursilalaili Mustapa;
- Kamarudin, Abdul Rani;
- Mohamed, Duryana;
- Ramlee, Zulfakar
- Article
21
- i-Manager's Journal on Data Science & Big Data Analytics (JDS), 2023, v. 1, n. 2, p. 20, doi. 10.26634/jds.1.2.20377
- H. A., DINESHA;
- DEVI, JAYANTHILA
- Article
22
- George Washington Law Review, 2016, v. 84, n. 6, p. 1703
- Article
23
- George Washington Law Review, 2016, v. 84, n. 6, p. 1644
- Article
24
- George Washington Law Review, 2016, v. 84, n. 6, p. 1568
- Article
25
- George Washington Law Review, 2016, v. 84, n. 6, p. 1477
- Goldfoot, Josh;
- Bamzai, Aditya
- Article
26
- Journal of Law & Administrative Sciences, 2017, n. 8, p. 28
- Article
27
- Revista de Ciencias Sociales (13159518), 2023, v. 29, n. 2, p. 356
- Mejía-Lobo, Mauricio;
- Hurtado-Gil, Sandra Victoria;
- Grisales-Aguirre, Andrés Mauricio
- Article
28
- California Law Review, 2021, v. 109, n. 1, p. 277, doi. 10.15779/Z38XW47X1J
- Article
29
- Mizan Law Review, 2015, v. 9, n. 1, p. 108, doi. 10.4314/mlr.v9i1.4
- Yilma, Kinfe Micheal;
- Abraha, Halefom Hailu
- Article
30
- Statute Law Review, 2019, v. 40, n. 2, p. 143, doi. 10.1093/slr/hmx028
- Article
31
- Journal of Science & Technology MSU, 2016, v. 35, n. 2, p. 251
- สุวรรณษา, อรรถพล;
- พ่วงพรพิทักษ์, สมนึก
- Article
32
- Southern Journal of Business & Ethics, 2009, v. 1, p. 26
- Hunt, Ryan J.;
- Karns, Jack E.;
- Mawer, William T.
- Article
33
- Arab Media & Society, 2023, n. 35, p. 69, doi. 10.70090/jg23cnlp
- Article
35
- Victoria University of Wellington Law Review, 2019, v. 50, n. 1, p. 57, doi. 10.26686/vuwlr.v50i1.5553
- Article
36
- Duke Law & Technology Review, 2018, v. 17, n. 1, p. 146
- Article
37
- Duke Law & Technology Review, 2010, n. 11/12, p. 1
- Article
38
- Jurisprudence / Jurisprudencija, 2010, v. 4, n. 122, p. 203
- Article
39
- Current Issues in Criminal Justice, 2009, v. 20, n. 3, p. 433, doi. 10.1080/10345329.2009.12035821
- Hutchings, Alice;
- Hayes, Hennessey
- Article
40
- International Journal of Information Security & Cybercrime, 2015, v. 4, n. 2, p. 33, doi. 10.19107/IJISC.2015.02.04
- Article
41
- Computer Law Review International, 2019, v. 20, n. 2, p. 40, doi. 10.9785/cri-2019-200204
- Article
42
- Revista de Direito Internacional, 2012, v. 9, n. 2, p. 11, doi. 10.5102/rdi.v9i2.1755
- Teixeira Fernandes, José Pedro
- Article
43
- Valahia University Law Study, 2012, v. 20, n. 2, p. 341
- Article
44
- Journal of Criminal Law & Criminology, 2013, v. 103, n. 3, p. 907
- Article
45
- German Law Journal, 2018, v. 9, n. 1, p. 85
- Pollicino, Oreste;
- Soldatov, Oleg
- Article
46
- Policing & Society, 2013, v. 23, n. 4, p. 516, doi. 10.1080/10439463.2013.780227
- Yip, Michael;
- Webber, Craig;
- Shadbolt, Nigel
- Article
47
- Policing & Society, 2013, v. 23, n. 4, p. 482, doi. 10.1080/10439463.2013.780226
- Article
48
- Policing & Society, 2013, v. 23, n. 4, p. 409, doi. 10.1080/10439463.2013.780222
- Wall, David S.;
- Williams, Matthew L.
- Article
49
- Policing & Society, 2013, v. 23, n. 4, p. 540, doi. 10.1080/10439463.2013.780221
- Article
50
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- Article