Works matching DE "COMPUTER crime prevention laws"
Results: 25
15. Cybercrime, criminal libel and the media.
- Published in:
- Pacific Journalism Review: Te Koakoa, 2015, v. 21, n. 1, p. 211
- By:
- Publication type:
- Article
Nationhood in the Cloud: Cyber Sovereignty in Thailand.
- Published in:
- Asian Studies Review, 2023, v. 47, n. 2, p. 392, doi. 10.1080/10357823.2022.2109591
- By:
- Publication type:
- Article
CYBERATTACKS AND THE COVERT ACTION STATUTE: TOWARD A DOMESTIC LEGAL FRAMEWORK FOR OFFENSIVE CYBEROPERATIONS.
- Published in:
- Michigan Law Review, 2012, v. 111, n. 3, p. 423
- By:
- Publication type:
- Article
Cybercrime Tendencies and Legislation in the Republic of Macedonia.
- Published in:
- European Journal on Criminal Policy & Research, 2016, v. 22, n. 1, p. 127, doi. 10.1007/s10610-015-9277-7
- By:
- Publication type:
- Article
The New Outlaws: Cybercriminals.
- Published in:
- Tennessee Bar Journal, 2014, v. 50, n. 4, p. 30
- By:
- Publication type:
- Article
Cyber Media and Vulnerability: A discourse on cyber laws and a probe on victimization of cybercrimes in Pakistan.
- Published in:
- Global Media Journal: Pakistan Edition, 2017, v. 10, n. 2, p. 1
- By:
- Publication type:
- Article
WHAT CAN BE DONE AGAINST CYBER HATE? FREEDOM OF SPEECH VERSUS HATE SPEECH IN THE COUNCIL OF EUROPE.
- Published in:
- Cardozo Journal of International & Comparative Law, 2009, v. 17, n. 3, p. 417
- By:
- Publication type:
- Article
NO FREE LUNCH (OR WI-FI): MICHIGAN'S UNCONSTITUTIONAL COMPUTER CRIME STATUTE.
- Published in:
- UCLA Journal of Law & Technology, 2009, v. 13, n. 1, p. 1
- By:
- Publication type:
- Article
FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES.
- Published in:
- Journal of Criminal Law & Criminology, 2013, v. 103, n. 3, p. 745
- By:
- Publication type:
- Article
Curbing Domain Name Registration Abuse: A Legal Framework in the Implementation of the Anti-Cybersquatting Provision of the Cybercrime Prevention Act of 2012.
- Published in:
- Ateneo Law Journal, 2013, v. 57, n. 4, p. 949
- By:
- Publication type:
- Article
Policing identity crimes.
- Published in:
- Policing & Society, 2013, v. 23, n. 4, p. 437, doi. 10.1080/10439463.2013.780224
- By:
- Publication type:
- Article
Policing cyber-neighbourhoods: tension monitoring and social media networks.
- Published in:
- Policing & Society, 2013, v. 23, n. 4, p. 461, doi. 10.1080/10439463.2013.780225
- By:
- Publication type:
- Article
Growth and change in undercover online child exploitation investigations, 2000-2006.
- Published in:
- Policing & Society, 2010, v. 20, n. 4, p. 416, doi. 10.1080/10439463.2010.523113
- By:
- Publication type:
- Article
การพัฒนาระบบควบคุมเครือข่ายจากภายในสู่ภายนอกสำหรับเครือข่ายแบบหลายจุด
- Published in:
- Journal of Science & Technology MSU, 2016, v. 35, n. 2, p. 251
- By:
- Publication type:
- Article
Stumbling Uncertainly into the Digital Age: Nigeria’s Futile Attempts to Devise a Credible Data Protection Regime.
- Published in:
- Transnational Law & Contemporary Problems, 2016, v. 26, n. 1, p. 13
- By:
- Publication type:
- Article
TAX CREDITS FOR TATTLETALES: LEGISLATING TO CATCH CRAIGSLIST CRIMINALS.
- Published in:
- Hofstra Law Review, 2014, v. 42, n. 3, p. 693
- By:
- Publication type:
- Article
Defeat scanning worms in cyber warfare.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 715, doi. 10.1002/sec.1019
- By:
- Publication type:
- Article
NATION-STATES AND THEIR CYBER OPERATIONS IN PLANTING OF MALWARE IN OTHER COUNTRIES: IS IT LEGAL UNDER INTERNATIONAL LAW?
- Published in:
- University of Pittsburgh Law Review, 2018, v. 80, n. 1, p. 33, doi. 10.5195/lawreview.2018.593
- By:
- Publication type:
- Article
DIGITAL DOMESTIC VIOLENCE: ARE VICTIMS OF INTIMATE PARTNER CYBER HARASSMENT SUFFICIENTLY PROTECTED BY NEW ZEALAND'S CURRENT LEGISLATION?
- Published in:
- Victoria University of Wellington Law Review, 2017, v. 48, n. 1, p. 29
- By:
- Publication type:
- Article
CYBERMOBS, CIVIL CONSPIRACY, AND TORT LIABILITY.
- Published in:
- Fordham Urban Law Journal, 2017, v. 44, n. 4, p. 1217
- By:
- Publication type:
- Article
CYBER-VIOLENCE: DIGITAL ABUSE IN THE CONTEXT OF DOMESTIC VIOLENCE.
- Published in:
- University of New South Wales Law Journal, 2017, v. 40, n. 4, p. 1573, doi. 10.53637/dhuv6093
- By:
- Publication type:
- Article
CYBERTERRORISM: COMBATING THE AVIATION INDUSTRY'S VULNERABILITY TO CYBERATTACK.
- Published in:
- Suffolk Transnational Law Review, 2016, v. 39, n. 1, p. 169
- By:
- Publication type:
- Article
The Council of Europe's Cyber Crime Treaty: An exercise in Symbolic Legislation.
- Published in:
- International Journal of Cyber Criminology, 2010, v. 4, n. 1/2, p. 699
- By:
- Publication type:
- Article
Global Cyber Intermediary Liability: A Legal & Cultural Strategy.
- Published in:
- Pace Law Review, 2014, v. 34, n. 2, p. 586, doi. 10.58948/2331-3528.1858
- By:
- Publication type:
- Article
A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act.
- Published in:
- George Washington Law Review, 2016, v. 84, n. 6, p. 1442
- By:
- Publication type:
- Article