Works matching DE "COMPUTER crime prevention laws"
1
- Michigan Law Review, 2012, v. 111, n. 3, p. 423
- Article
2
- University of New South Wales Law Journal, 2017, v. 40, n. 4, p. 1573, doi. 10.53637/dhuv6093
- Article
3
- Suffolk Transnational Law Review, 2016, v. 39, n. 1, p. 169
- Article
4
- George Washington Law Review, 2016, v. 84, n. 6, p. 1442
- Article
5
- Journal of Science & Technology MSU, 2016, v. 35, n. 2, p. 251
- สุวรรณษา, อรรถพล;
- พ่วงพรพิทักษ์, สมนึก
- Article
6
- Cardozo Journal of International & Comparative Law, 2009, v. 17, n. 3, p. 417
- Article
7
- Pace Law Review, 2014, v. 34, n. 2, p. 586, doi. 10.58948/2331-3528.1858
- Peterson, Jason H.;
- Segal, Lydia;
- Eonas, Anthony
- Article
8
- Global Media Journal: Pakistan Edition, 2017, v. 10, n. 2, p. 1
- Munir, Asad;
- Gondal, Maryam Tahira
- Article
9
- Policing & Society, 2013, v. 23, n. 4, p. 461, doi. 10.1080/10439463.2013.780225
- Williams, Matthew L.;
- Edwards, Adam;
- Housley, William;
- Burnap, Peter;
- Rana, Omer;
- Avis, Nick;
- Morgan, Jeffrey;
- Sloan, Luke
- Article
10
- Policing & Society, 2013, v. 23, n. 4, p. 437, doi. 10.1080/10439463.2013.780224
- Article
11
- Policing & Society, 2010, v. 20, n. 4, p. 416, doi. 10.1080/10439463.2010.523113
- Mitchell, KimberlyJ.;
- Finkelhor, David;
- Jones, LisaM.;
- Wolak, Janis
- Article
12
- Transnational Law & Contemporary Problems, 2016, v. 26, n. 1, p. 13
- Article
13
- Hofstra Law Review, 2014, v. 42, n. 3, p. 693
- Article
14
- Security & Communication Networks, 2015, v. 8, n. 5, p. 715, doi. 10.1002/sec.1019
- Hsu, Fu-Hau;
- Chen, Li-Han;
- Lin, Chia-Jun
- Article
15
- Asian Studies Review, 2023, v. 47, n. 2, p. 392, doi. 10.1080/10357823.2022.2109591
- Article
16
- Ateneo Law Journal, 2013, v. 57, n. 4, p. 949
- Negre, Ferdinand M.;
- D. V. Go III, Gonzalo
- Article
17
- Pacific Journalism Review: Te Koakoa, 2015, v. 21, n. 1, p. 211
- ROBIE, DAVID;
- ABCEDE, DEL M.
- Article
18
- Tennessee Bar Journal, 2014, v. 50, n. 4, p. 30
- Article
19
- Journal of Criminal Law & Criminology, 2013, v. 103, n. 3, p. 745
- GRAY, DAVID;
- CITRON, DANIELLE KEATS;
- RINEHART, LIZ CLARK
- Article
20
- Victoria University of Wellington Law Review, 2017, v. 48, n. 1, p. 29
- Article
21
- Fordham Urban Law Journal, 2017, v. 44, n. 4, p. 1217
- Article
22
- European Journal on Criminal Policy & Research, 2016, v. 22, n. 1, p. 127, doi. 10.1007/s10610-015-9277-7
- Rashkovski, Dragi;
- Naumovski, Vasko;
- Naumovski, Goce
- Article
23
- International Journal of Cyber Criminology, 2010, v. 4, n. 1/2, p. 699
- Article
24
- University of Pittsburgh Law Review, 2018, v. 80, n. 1, p. 33, doi. 10.5195/lawreview.2018.593
- Article
25
- UCLA Journal of Law & Technology, 2009, v. 13, n. 1, p. 1
- Article