Works matching DE "COMPUTER hackers"
1
- MIS Quarterly Executive, 2025, v. 24, n. 2, p. 167, doi. 10.17705/2msqe.00115
- Article
2
- Journal of Futures Studies, 2025, v. 29, n. 4, p. 117, doi. 10.6531/JFS.202506_29(4).0012
- Article
3
- Future Internet, 2025, v. 17, n. 5, p. 207, doi. 10.3390/fi17050207
- Giannilias, Theodoros;
- Papadakis, Andreas;
- Nikolaou, Nikolaos;
- Zahariadis, Theodore
- Article
4
- Social Policy, 2022, v. 52, n. 3, p. 52
- Article
6
- Social Alternatives, 2012, v. 31, n. 2, p. 27
- Article
7
- South African Journal of Philosophy, 2021, v. 40, n. 2, p. 162, doi. 10.1080/02580136.2021.1933733
- Hanusch, Yonnique Francesca
- Article
8
- International Review of Law, Computers & Technology, 2011, v. 25, n. 1/2, p. 47, doi. 10.1080/13600869.2011.594656
- Article
9
- International Review of Law, Computers & Technology, 2009, v. 23, n. 1/2, p. 99, doi. 10.1080/13600860902836869
- Article
10
- International Review of Law, Computers & Technology, 2008, v. 22, n. 1/2, p. 45, doi. 10.1080/13600860801924907
- Article
11
- International Review of Law, Computers & Technology, 2008, v. 22, n. 1/2, p. 145, doi. 10.1080/13600860801925086
- Article
12
- Qualitative Research Reports in Communication, 2001, v. 2, n. 1, p. 1
- Article
13
- Decision Analysis, 2022, v. 19, n. 2, p. 99, doi. 10.1287/deca.2021.0442
- Wu, Yong;
- Xu, Mengyao;
- Cheng, Dong;
- Dai, Tao
- Article
14
- Decision Analysis, 2018, v. 15, n. 2, p. 90, doi. 10.1287/deca.2017.0363
- Mai, Bin;
- Kulkarni, Shailesh
- Article
15
- Decision Analysis, 2013, v. 10, n. 4, p. 352, doi. 10.1287/deca.2013.0278
- Xing Gao;
- Weijun Zhong;
- Shue Mei
- Article
16
- Journal of Computer-Mediated Communication, 2007, v. 12, n. 4, p. 1229, doi. 10.1111/j.1083-6101.2007.00371.x
- Erickson, Kris;
- Howard, Philip N.
- Article
17
- Government Technology, 2023, v. 36, n. 5, p. 36
- Article
18
- Government Technology, 2014, v. 27, n. 8, p. 8
- Article
19
- Government Technology, 2014, v. 27, n. 1, p. 26
- Article
20
- Government Technology, 2013, v. 26, n. 5, p. 12
- Article
21
- Government Technology, 2012, v. 25, n. 2, p. 38
- Article
22
- Government Technology, 2008, v. 21, n. 4, p. 26
- Article
23
- Government Technology, 2007, v. 20, n. 4, p. 16
- Article
24
- Electronics Systems & Software, 2006, v. 4, n. 1, p. 10, doi. 10.1049/ess:20060101
- Article
25
- Electronics Systems & Software, 2005, v. 3, n. 6, p. 7
- Article
26
- Computing & Control Engineering, 2005, v. 16, n. 6, p. 24
- Article
27
- Bio-IT World, 2009, v. 8, n. 6, p. 11
- Article
28
- 2011
- Dobrodeev, A.;
- Gorshkov, A.;
- Tulemisov, U.
- Correction Notice
29
- Measurement Techniques, 2011, v. 54, n. 4, p. 442, doi. 10.1007/s11018-011-9745-5
- Dobrodeev, A.;
- Gorshkov, A.;
- Tulemisov, Yu.
- Article
30
- Journal of Popular Culture (Wiley-Blackwell), 2001, v. 35, n. 3, p. 175, doi. 10.1111/j.0022-3840.2001.3503_175.x
- Article
31
- International Journal of Intelligent Computing & Information Sciences, 2023, v. 23, n. 4, p. 50, doi. 10.21608/ijicis.2023.247380.1306
- Aly, Abdelrahman;
- Al-Qutt, Mirvat;
- Fayez, Mahmoud;
- Hamad, Ahmed M.
- Article
32
- Journal of Corporation Law, 2013, v. 38, n. 3, p. 659
- Article
33
- Journal of Public Affairs (14723891), 2003, v. 3, n. 4, p. 326, doi. 10.1002/pa.161
- Article
34
- Celal Bayar University Journal of Social Sciences / Celal Bayar Üniversitesi Sosyal Bilimler Dergisi, 2022, v. 20, n. 2, p. 236, doi. 10.18026/cbayarsos.1056051
- Article
35
- Radical Teacher, 2014, v. 99, p. 43, doi. 10.5195/rt.2014.106
- Article
36
- Document News, 2012, v. 30, n. 2, p. 5
- Article
37
- Journal of Industrial & Management Optimization, 2023, v. 19, n. 8, p. 1, doi. 10.3934/jimo.2022208
- Article
38
- Journal of Industrial & Management Optimization, 2023, v. 19, n. 6, p. 1, doi. 10.3934/jimo.2022127
- Article
39
- British Dental Journal, 2007, v. 203, n. 1, p. 11, doi. 10.1038/bdj.2007.587
- Article
40
- Translation Spaces, 2013, v. 2, n. 2, p. 19, doi. 10.1075/ts.2.02ric
- Article
41
- Translation Spaces, 2013, v. 2, n. 1, p. 19, doi. 10.1075/ts.2.02ric
- Article
42
- Computer und Recht, 2020, v. 36, n. 11, p. 730, doi. 10.9785/cr-2020-361109
- Article
43
- China Business Review, 2014, p. 1
- Article
44
- Feminist Media Studies, 2018, v. 18, n. 5, p. 825, doi. 10.1080/14680777.2017.1350197
- Article
45
- Feminist Media Studies, 2017, v. 17, n. 6, p. 941, doi. 10.1080/14680777.2017.1316754
- Article
46
- New Perspectives on Healthcare Risk Management, Control & Governance, 2017, v. 36, n. 1, p. 7
- Hartman, Victor;
- Ramamoorti, Sridhar
- Article
47
- Information & Security, 2020, v. 47, n. 1, p. 135, doi. 10.11610/isij.4709
- Staneva, Elisaveta;
- Rachev, Mariyan
- Article
48
- Information & Security, 2020, v. 47, n. 2, p. 221, doi. 10.11610/isij.4715
- Stetsenko, Inna V.;
- Demydenko, Maksym
- Article
49
- Information (2078-2489), 2018, v. 9, n. 11, p. 280, doi. 10.3390/info9110280
- Deb, Ashok;
- Lerman, Kristina;
- Ferrara, Emilio
- Article
50
- Information (2078-2489), 2018, v. 9, n. 8, p. 189, doi. 10.3390/info9080189
- Paredes, Jose N.;
- Simari, Gerardo I.;
- Martinez, Maria Vanina;
- Falappa, Marcelo A.
- Article