Works matching DE "COMPUTER network laws"
Results: 65
CYBERSPACE VERSUS PROPERTY LAW?
- Published in:
- Texas Review of Law & Politics, 1999, v. 4, n. 1, p. 103
- By:
- Publication type:
- Article
THE CLOUD OF WAR: SECURING THE OPERATIONAL DOMAIN OF CYBERSPACE WITH A ROBUST MILITARY COMMAND.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 515
- By:
- Publication type:
- Article
FROM CELL TO SLAMMER: FLAWS OF THE HYBRID THEORY.
- Published in:
- Arizona Law Review, 2011, v. 53, n. 2, p. 663
- By:
- Publication type:
- Article
Cyberspace: The 21st Century Battlefield.
- Published in:
- National Security & Armed Conflict Law Review, 2016, v. 6, p. 233
- By:
- Publication type:
- Article
Privacy of electronic medical information.
- Published in:
- 2000
- By:
- Publication type:
- commentary
Legal issues concerning electronic health information: privacy, quality, and liability.
- Published in:
- 1999
- By:
- Publication type:
- journal article
How to Make Lemonade from Lemons: Achieving Better Free Speech Protection Without Altering the Existing Legal Protection for Censorship in Cyberspace.
- Published in:
- Campbell Law Review, 2013, v. 36, n. 1, p. 147
- By:
- Publication type:
- Article
Sovereign Discourse on Cyber Conflict Under International Law.
- Published in:
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- By:
- Publication type:
- Article
Recognizing the Impact of E-Discovery Amendments on Electronic Records Management.
- Published in:
- Information Systems Management, 2009, v. 26, n. 4, p. 350, doi. 10.1080/10580530903245721
- By:
- Publication type:
- Article
Individual Criminal Responsibility for Cyber Aggression.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 495, doi. 10.1093/jcsl/krw010
- By:
- Publication type:
- Article
Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 429, doi. 10.1093/jcsl/krw011
- By:
- Publication type:
- Article
'Proxies' and Cyberspace.
- Published in:
- Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 383, doi. 10.1093/jcsl/krw015
- By:
- Publication type:
- Article
Copyright infringement and users of P2P networks in multimedia applications: The case of the U.S. Copyright regime.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 1, p. 31, doi. 10.1007/s12083-012-0160-8
- By:
- Publication type:
- Article
Circular on the Issuance of the Implementation Regulations for the "Interim Provisions of the People's Republic of China on Management of the International Networking of Computer Information Networks".
- Published in:
- Chinese Law & Government, 2010, v. 43, n. 5, p. 21, doi. 10.2753/CLG0009-4609430503
- By:
- Publication type:
- Article
Free Speech.
- Published in:
- Iowa Law Review, 2015, v. 100, n. 2, p. 501
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: An Introduction.
- Published in:
- Business Lawyer, 2020, v. 76, n. 1, p. 257
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Introduction.
- Published in:
- Business Lawyer, 2010, v. 66, n. 1, p. 155
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Domain Name Cases 2008.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 251
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Intellectual Property Cases 2008.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 229
- By:
- Publication type:
- Article
Survey of the Law of Cyberspace: Introduction.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 227
- By:
- Publication type:
- Article
Regulation and Rights in Networked Space.
- Published in:
- Journal of Law & Society, 2003, v. 30, n. 2, p. 187, doi. 10.1111/1467-6478.00253
- By:
- Publication type:
- Article
Waking Sleeping Beauty? Exploring the Challenges of Cyber-Deterrence by Punishment.
- Published in:
- Loyola of Los Angeles International & Comparative Law Review, 2023, v. 46, n. 1, p. 45
- By:
- Publication type:
- Article
PRECONDITIONS FOR LEGAL REGULATION OF PERSONAL IDENTIFICATION IN CYBERSPACE.
- Published in:
- Jurisprudence / Jurisprudencija, 2011, v. 18, n. 2, p. 703
- By:
- Publication type:
- Article
Spare the messenger!
- Published in:
- Nature, 1995, v. 376, n. 6537, p. 200, doi. 10.1038/376200a0
- Publication type:
- Article
Inhalt.
- Published in:
- Computer Law Review International, 2016, v. 17, n. 6, p. ii, doi. 10.9785/cri-2016-0601
- Publication type:
- Article
Titelei.
- Published in:
- Computer Law Review International, 2016, v. 17, n. 6, p. i, doi. 10.9785/cri-2016-frontmatter6
- Publication type:
- Article
WARSHAK: A TEST CASE FOR THE INTERSECTION OF LAW ENFORCEMENT AND CYBER SECURITY.
- Published in:
- Journal of Law, Technology & Policy, 2010, v. 2010, n. 2, p. 345
- By:
- Publication type:
- Article
The Internet of Things, Legal Aspects What Will Change (Everything)….
- Published in:
- Communications & Strategies, 2012, n. 87, p. 83
- By:
- Publication type:
- Article
Understanding Lessig: implications for European Union cyberspace policy.
- Published in:
- International Review of Law, Computers & Technology, 2005, v. 19, n. 3, p. 277, doi. 10.1080/13600860500348226
- By:
- Publication type:
- Article
Towards the International Rule of Law in Cyberspace: Contrasting Chinese and Western Approaches.
- Published in:
- Chinese Journal of International Law, 2017, v. 16, n. 2, p. 271, doi. 10.1093/chinesejil/jmx011
- By:
- Publication type:
- Article
@SOCIALMEDIA: SPEECH WITH A CLICK OF A BUTTON? #SOCIALSHARINGBUTTONS.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2013, v. 32, n. 1, p. 377
- By:
- Publication type:
- Article
Using Frugal Innovations to Support Cybercrime Legislations in Small Developing States: Introducing the Cyber-Legislation Development and Implementation Process Model (CyberLeg-DPM).
- Published in:
- Information Technology for Development, 2014, v. 20, n. 2, p. 165, doi. 10.1080/02681102.2013.841630
- By:
- Publication type:
- Article
Gaining Cyberspace "Sea Legs" : A Proposal for a Judicial Cyber Education Program in District Courts.
- Published in:
- University of San Francisco Law Review, 2014, v. 48, n. 3, p. 559
- By:
- Publication type:
- Article
A Tricky Situation: Deception in Cyberspace.
- Published in:
- Journal of Criminal Law, 2013, v. 77, n. 5, p. 417, doi. 10.1350/jcla.2013.77.5.867
- By:
- Publication type:
- Article
THE MODERNITY OF THE NATIONAL LEGAL FRAMEWORK ON REGULATING CYBERCRIME.
- Published in:
- Valahia University Law Study, 2012, v. 20, n. 2, p. 341
- By:
- Publication type:
- Article
STATE SOVEREIGNTY AND SELF-DEFENSE IN CYBERSPACE: A NORMATIVE FRAMEWORK FOR BALANCING LEGAL RIGHTS.
- Published in:
- Emory International Law Review, 2012, v. 26, n. 2, p. 825
- By:
- Publication type:
- Article
It's the customer, stupid!
- Published in:
- Journal of Telecommunications Management, 2008, v. 1, n. 3, p. 224
- By:
- Publication type:
- Article
LITTLE THINGS AND BIG CHALLENGES: INFORMATION PRIVACY AND THE INTERNET OF THINGS.
- Published in:
- American University Law Review, 2017, v. 66, n. 5, p. 1183
- By:
- Publication type:
- Article
IPR, Law and FLOSS: Building a Protected Common.
- Published in:
- Journal of Intellectual Property Rights, 2007, v. 12, n. 1, p. 176
- By:
- Publication type:
- Article
ZONING CYBERSPACE: PROTECTING PRIVACY IN THE DIGITAL UPSIDE DOWN.
- Published in:
- Utah Law Review, 2020, v. 2020, n. 5, p. 1219
- By:
- Publication type:
- Article
A Brief Report on the Ethical and Legal Guides For Technology Use in Marriage and Family Therapy.
- Published in:
- 2017
- By:
- Publication type:
- journal article
Perspectives for Cyber Strategists on Law for Cyberwar.
- Published in:
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 81
- By:
- Publication type:
- Article
Retaliatory Deterrence in Cyberspace.
- Published in:
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 62
- By:
- Publication type:
- Article
Rise of a Cybered Westphalian Age.
- Published in:
- Strategic Studies Quarterly, 2011, v. 5, n. 1, p. 32
- By:
- Publication type:
- Article
The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring.
- Published in:
- American Business Law Journal, 2011, v. 48, n. 2, p. 285, doi. 10.1111/j.1744-1714.2011.01116.x
- By:
- Publication type:
- Article
HANDY: a hybrid association rules mining approach for network layer discovery of services for mobile ad hoc network.
- Published in:
- Wireless Networks (10220038), 2013, v. 19, n. 8, p. 1961, doi. 10.1007/s11276-013-0571-3
- By:
- Publication type:
- Article
THE LAW OF ARMED CONFLICT AND THE RESPONSIBLE CYBER COMMANDER.
- Published in:
- Vermont Law Review, 2013, v. 38, n. 1, p. 103
- By:
- Publication type:
- Article
BRINGING NEUTRALITY TO NETWORK NEUTRALITY.
- Published in:
- Berkeley Technology Law Journal, 2007, v. 22, n. 1, p. 615
- By:
- Publication type:
- Article
RECENT DEVELOPMENTS -- FOREIGN & INTERNATIONAL LAW.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 613
- Publication type:
- Article
UNITED STATES V. AMERICAN LIBRARY ASS'N: THE CHILDREN'S INTERNET PROTECTION ACT, LIBRARY FILTERING, AND INSTITUTIONAL ROLES.
- Published in:
- Berkeley Technology Law Journal, 2004, v. 19, n. 1, p. 555
- By:
- Publication type:
- Article