Results: 182
THE MODERNITY OF THE NATIONAL LEGAL FRAMEWORK ON REGULATING CYBERCRIME.
- Published in:
- Valahia University Law Study, 2012, v. 20, n. 2, p. 341
- By:
- Publication type:
- Article
Artificial Intelligence and the Law: Cybercrime and Criminal Liability. By Dennis J. Baker and Paul H. Robinson (Routledge, 2021, 280pp. £120 hb).
- Published in:
- 2022
- By:
- Publication type:
- Book Review
Impact of Cyber Crime In Society, New Challenges.
- Published in:
- International Transactions in Humanities & Social Sciences, 2010, v. 2, n. 2, p. 171
- By:
- Publication type:
- Article
Human Trafficking and Online Networks: Policy, Analysis, and Ignorance.
- Published in:
- Antipode, 2016, v. 48, n. 3, p. 665, doi. 10.1111/anti.12213
- By:
- Publication type:
- Article
A novel approach for securing IPv6 link local communication.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 136, doi. 10.1080/19393555.2016.1180568
- By:
- Publication type:
- Article
Visibility enhancements of gray and color images with size invariant visual cryptography.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 124, doi. 10.1080/19393555.2016.1180567
- By:
- Publication type:
- Article
Cancellability and diversity analysis of fingerprint template protection scheme based on compact minutiae pattern.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 109, doi. 10.1080/19393555.2016.1179375
- By:
- Publication type:
- Article
Graphical One-Time Password (GOTPass): A usability evaluation.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 94, doi. 10.1080/19393555.2016.1179374
- By:
- Publication type:
- Article
Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 68, doi. 10.1080/19393555.2016.1170912
- By:
- Publication type:
- Article
On the use of open-source firewalls in ICS/SCADA systems.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 83, doi. 10.1080/19393555.2016.1172283
- By:
- Publication type:
- Article
Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 39, doi. 10.1080/19393555.2015.1134732
- By:
- Publication type:
- Article
Harmonized taxonomies for security and resilience.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 54, doi. 10.1080/19393555.2016.1145772
- By:
- Publication type:
- Article
Cyber crime risk awareness in Kyrgyz Republic.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 32, doi. 10.1080/19393555.2015.1132800
- By:
- Publication type:
- Article
The Philippine Cybercrime Prevention Act of 2012: To Protect or Destroy?
- Published in:
- DLSU Business & Economics Review, 2014, v. 24, n. 1, p. 96
- By:
- Publication type:
- Article
Abusing the Computer Fraud and Abuse Act: Why Broad Interpretations of the CFAA Fail.
- Published in:
- Hamline Law Review, 2013, v. 36, n. 1, p. 1
- By:
- Publication type:
- Article
LENITY ON ME: LVRC HOLDINGS LLC V. BREKKA POINTS THE WAY TOWARD DEFINING AUTHORIZATION AND SOLVING THE SPLIT OVER THE COMPUTER FRAUD AND ABUSE ACT.
- Published in:
- Georgia State University Law Review, 2011, v. 27, n. 2, p. 379
- By:
- Publication type:
- Article
AN ADAPTIVE APPROACH FOR AN EVOLVING CRIME: THE CASE FOR AN INTERNATIONAL CYBER COURT AND PENAL CODE.
- Published in:
- Brooklyn Journal of International Law, 2012, v. 37, n. 3, p. 1139
- By:
- Publication type:
- Article
Explanations of a Number of Issues in the Specific Application of the Law on Handling Criminal Cases of Using the Internet, Mobile Communication Terminals, and Voice Sets for the Production, Reproduction, Publication, Sale, and Dissemination of Obscene Electronic Information
- Published in:
- Chinese Law & Government, 2010, v. 43, n. 5, p. 40, doi. 10.2753/CLG0009-4609430506
- By:
- Publication type:
- Article
Investigating legal aspects of cyberbullying.
- Published in:
- Psicothema, 2012, v. 24, n. 4, p. 640
- By:
- Publication type:
- Article
THE INTERNET AS A GAME CHANGER: REEVALUATING THE TRUE THREATS DOCTRINE.
- Published in:
- Texas Tech Law Review, 2011, v. 44, n. 1, p. 183
- By:
- Publication type:
- Article
CYBER WARFARE.
- Published in:
- Military Law Review, 2014, v. 219, p. 1
- By:
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2013, v. 53, n. 7, p. 110
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2012, v. 52, n. 4, p. 78
- Publication type:
- Article
THREATS TO THE FUNCTIONING OF ORGANIZATIONAL UNITS OF THE PRISON SERVICE RELATED TO NEW TECHNOLOGIES - CYBERCRIMES.
- Published in:
- International Journal of Legal Studies ( IJOLS ), 2023, v. 14, n. 2, p. 51, doi. 10.5604/01.3001.0054.2691
- By:
- Publication type:
- Article
NASILJE MED MLADIMI V KIBERNETSKEM PROSTORU: NERAZISKANOST POJAVA V SLOVENIJI.
- Published in:
- Družboslovne Razprave, 2013, v. 29, n. 74, p. 107
- By:
- Publication type:
- Article
THE CYBERNETIC SEA: AUSTRALIA'S APPROACH TO THE WAVE OF CYBERCRIME.
- Published in:
- Queensland University of Technology Law Review, 2014, v. 14, n. 2, p. 52, doi. 10.5204/qutlr.v14i2.541
- By:
- Publication type:
- Article
Botnet Mitigation and International Law: Columbia Journal of Transnational Law Student Writing Prize in Comparative and International Law, Best Note Award.
- Published in:
- Columbia Journal of Transnational Law, 2019, v. 58, n. 1, p. 189
- By:
- Publication type:
- Article
The Internet and Regulatory Responses in Ethiopia: Telecoms, Cybercrimes, Privacy, E-commerce, and the New Media.
- Published in:
- Mizan Law Review, 2015, v. 9, n. 1, p. 108, doi. 10.4314/mlr.v9i1.4
- By:
- Publication type:
- Article
Developments in Advertising and Consumer Protection.
- Published in:
- Business Lawyer, 2022, v. 78, n. 1, p. 305
- By:
- Publication type:
- Article
Recent Developments in Cyberspace Law: A View from Brazil.
- Published in:
- Business Lawyer, 2013, v. 69, n. 1, p. 301
- By:
- Publication type:
- Article
Survey of Computer Fraud and Abuse Act Cases.
- Published in:
- Business Lawyer, 2011, v. 67, n. 1, p. 321
- By:
- Publication type:
- Article
Cyber Extortion, Ransomware and the South African Cybercrimes and Cybersecurity Bill.
- Published in:
- Statute Law Review, 2019, v. 40, n. 2, p. 143, doi. 10.1093/slr/hmx028
- By:
- Publication type:
- Article
REALISM ABOUT REMEDIES AND THE NEED FOR A CDA TAKEDOWN: A COMPARATIVE ANALYSIS OF § 230 OF THE CDA AND THE U.K. DEFAMATION ACT 2013.
- Published in:
- Florida Journal of International Law, 2015, v. 27, n. 2, p. 297
- By:
- Publication type:
- Article
GETTING TOUGH ON CYBER CRIME.
- Published in:
- ITNOW, 2015, v. 57, n. 2, p. 32, doi. 10.1093/itnow/bwv042
- By:
- Publication type:
- Article
Rules on dual use tools.
- Published in:
- ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
- By:
- Publication type:
- Article
Routine Activity Theory and Phishing Victimisation: Who Gets Caught in the 'Net'?
- Published in:
- Current Issues in Criminal Justice, 2009, v. 20, n. 3, p. 433, doi. 10.1080/10345329.2009.12035821
- By:
- Publication type:
- Article
The Third Dimension of Victimization.
- Published in:
- Ohio State Journal of Criminal Law, 2015, v. 13, n. 1, p. 139
- By:
- Publication type:
- Article
Why do legislators keep failing victims in online harms?
- Published in:
- International Review of Law, Computers & Technology, 2024, v. 38, n. 2, p. 195, doi. 10.1080/13600869.2023.2295100
- By:
- Publication type:
- Article
African governments and the influence of corruption on the proliferation of cybercrime in Africa: wherein lies the rule of law?
- Published in:
- International Review of Law, Computers & Technology, 2021, v. 35, n. 2, p. 131, doi. 10.1080/13600869.2021.1885105
- By:
- Publication type:
- Article
KIBERNETINIO SAUGUMO TEISINIS REGULIAVIMAS: KIBERNETINIO SAUGUMO STRATEGIJOS.
- Published in:
- Social Technologies / Socialines Technologijos, 2013, v. 3, n. 1, p. 189, doi. 10.13165/st-13-3-1-13
- By:
- Publication type:
- Article
UNELE ASPECTE ÎN LEGĂTURĂ CU INFRACŢIUNILE INFORMATICE DIN PERSPECTIVA LEGISLAŢIEI ÎN VIGOARE, PRECUM ŞI A NOULUI COD PENAL.
- Published in:
- Dreptul, 2012, n. 10, p. 204
- By:
- Publication type:
- Article
The European legal framework on cybercrime: striving for an effective implementation.
- Published in:
- Crime, Law & Social Change, 2010, v. 54, n. 5, p. 339, doi. 10.1007/s10611-010-9261-6
- By:
- Publication type:
- Article
Cybercrime and Punishment: The Russian Mafia and Russian Responsibility to Exercise Due Diligence to Prevent Trans-boundary Cybercrime.
- Published in:
- Brigham Young University Law Review, 2015, v. 2015, n. 1, p. 177
- By:
- Publication type:
- Article
INTERNET FRAUD TO DECEIVE EMAIL BY USING DIFFERENT TECHNOLOGIES.
- Published in:
- International Journal of Advanced Research in Computer Science, 2019, v. 10, n. 1, p. 1, doi. 10.26483/ijarcs.v10i1.6349
- By:
- Publication type:
- Article
Coverage Questions Concerning Cybercrimes.
- Published in:
- FDCC Quarterly, 2015, v. 64, n. 2, p. 114
- By:
- Publication type:
- Article
Deterring and Dissuading Cyberterrorism.
- Published in:
- Journal of Strategic Security, 2015, v. 8, n. 4, p. 23, doi. 10.5038/1944-0472.8.4.1460
- By:
- Publication type:
- Article
REGULATING CYBER RACISM IN THE UNITED STATES: LEGAL AND NON-LEGAL RESPONSES FROM A COMPARATIVE PERSPECTIVE.
- Published in:
- Wisconsin International Law Journal, 2021, v. 38, n. 3, p. 477
- By:
- Publication type:
- Article
HATE CRIMES IN CYBERSPACE.
- Published in:
- 2014
- By:
- Publication type:
- Book Review
COMMUNICATION IN CYBERSPACE.
- Published in:
- North Carolina Law Review, 2015, v. 94, n. 1, p. 105
- By:
- Publication type:
- Article
LETHAL WORDS: THE HARMFUL IMPACT OF CYBERBULLYING AND THE NEED FOR FEDERAL CRIMINALIZATION.
- Published in:
- 2016
- By:
- Publication type:
- Opinion