Works matching DE "COMPUTER crimes -- Government policy"
Results: 16
Attitudes in Korea toward Introducing Smart Policing Technologies: Differences between the General Public and Police Officers.
- Published in:
- Sustainability (2071-1050), 2017, v. 9, n. 10, p. 1921, doi. 10.3390/su9101921
- By:
- Publication type:
- Article
FREEDOM OF EXPRESSION, ELECTRONIC MEDIA AND CYBERCRIME - A RAPIDLY EVOLVING LEGAL LANDSCAPE.
- Published in:
- European Review of Public Law, 2018, v. 30, n. 1, p. 185
- By:
- Publication type:
- Article
The New Policy World of Cybersecurity.
- Published in:
- Public Administration Review, 2011, v. 71, n. 3, p. 455, doi. 10.1111/j.1540-6210.2011.02366.x
- By:
- Publication type:
- Article
From cybercrime to cyberwar? The international policy shift and its implications for Canada?
- Published in:
- Canadian Foreign Policy Journal (CFPJ), 2013, v. 19, n. 2, p. 127, doi. 10.1080/11926422.2013.805150
- By:
- Publication type:
- Article
Following in the footsteps of terrorism? Cybersecurity as a crowded policy implementation space.
- Published in:
- Canadian Foreign Policy Journal (CFPJ), 2013, v. 19, n. 2, p. 123, doi. 10.1080/11926422.2013.773543
- By:
- Publication type:
- Article
From cybercrime to cyberwar: security through obscurity or security through absurdity?
- Published in:
- Canadian Foreign Policy Journal (CFPJ), 2013, v. 19, n. 2, p. 119, doi. 10.1080/11926422.2013.805154
- By:
- Publication type:
- Article
Fighting the obscene, pornographic, and unhealthy-an analysis of the nature, extent, and regulation of China's online pornography within a global context.
- Published in:
- Crime, Law & Social Change, 2012, v. 58, n. 2, p. 111, doi. 10.1007/s10611-012-9380-3
- By:
- Publication type:
- Article
A WEBSITE OWNER'S PRACTICAL GUIDE TO THE WAYBACK MACHINE.
- Published in:
- Journal on Telecommunications & High Technology Law, 2013, v. 11, n. 1, p. 251
- By:
- Publication type:
- Article
Fighting the Cybercrime Plague.
- Published in:
- Journal of Corporate Accounting & Finance (Wiley), 2013, v. 24, n. 5, p. 3, doi. 10.1002/jcaf.21869
- By:
- Publication type:
- Article
U.S. International Policy for Cybersecurity: Five Issues That Won't Go Away.
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 197
- By:
- Publication type:
- Article
Foundational Questions Regarding the Federal Role in Cybersecurity.
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 233
- By:
- Publication type:
- Article
Cybercrime and Punishment: The Russian Mafia and Russian Responsibility to Exercise Due Diligence to Prevent Trans-boundary Cybercrime.
- Published in:
- Brigham Young University Law Review, 2015, v. 2015, n. 1, p. 177
- By:
- Publication type:
- Article
Why the Offline Are Offline: A Survey of Internet Use by Educated Pakistani Adults.
- Published in:
- CyberPsychology & Behavior, 2009, v. 12, n. 3, p. 351, doi. 10.1089/cpb.2008.0122
- By:
- Publication type:
- Article
THE INTERNET, FREE SPEECH, AND CRIMINAL LAW: IS IT TIME FOR A NEW INTERNATIONAL TREATY ON THE INTERNET?
- Published in:
- Texas Tech Law Review, 2011, v. 44, n. 1, p. 197
- By:
- Publication type:
- Article
Uganda.
- Published in:
- Africa Research Bulletin: Economic, Financial & Technical Series, 2017, v. 54, n. 8, p. 21832B, doi. 10.1111/j.1467-6346.2017.07900.x
- Publication type:
- Article
Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security.
- Published in:
- Journal of Homeland Security & Emergency Management, 2018, v. 15, n. 3, p. N.PAG, doi. 10.1515/jhsem-2017-0048
- By:
- Publication type:
- Article