Found: 83
Select item for more details and to access through your institution.
Towards Building National Cybersecurity Awareness.
- Published in:
- International Journal of Electronics & Telecommunications, 2020, v. 66, n. 2, p. 321, doi. 10.24425/ijet.2020.131881
- By:
- Publication type:
- Article
A semantic approach for fine-grain access control of e-health documents.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 692, doi. 10.1093/jigpal/jzs027
- By:
- Publication type:
- Article
A Few Things to Ponder.
- Published in:
- Government Technology, 2013, v. 26, n. 1, p. 7
- By:
- Publication type:
- Article
Addressing Mandatory Standards.
- Published in:
- Government Technology, 2011, v. 24, n. 8, p. 46
- By:
- Publication type:
- Article
Gambling on Gmail.
- Published in:
- Government Technology, 2009, v. 22, n. 12, p. 42
- By:
- Publication type:
- Article
Evaluating existing security and privacy requirements for legal compliance.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- By:
- Publication type:
- Article
Spatiotemporal model checking of location and mobility related security policy specifications.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 144, doi. 10.3906/elk-1105-54
- By:
- Publication type:
- Article
The Italian Google-Case: Privacy, Freedom of Speech and Responsibility of Providers for User-Generated Contents.
- Published in:
- International Journal of Law & Information Technology, 2010, v. 18, n. 4, p. 356, doi. 10.1093/ijlit/eaq010
- By:
- Publication type:
- Article
Anonymising Personal Data.
- Published in:
- International Journal of Law & Information Technology, 2002, v. 10, n. 2, p. 224, doi. 10.1093/ijlit/10.2.224
- By:
- Publication type:
- Article
Positive Cybersecurity Law: Creating a Consistent and Incentive-Based System.
- Published in:
- Chapman Law Review, 2016, v. 19, n. 2, p. 401
- By:
- Publication type:
- Article
Cybercrime jurisdiction.
- Published in:
- Crime, Law & Social Change, 2007, v. 46, n. 4/5, p. 189, doi. 10.1007/s10611-007-9063-7
- By:
- Publication type:
- Article
Network investigations of cyber attacks: the limits of digital evidence.
- Published in:
- Crime, Law & Social Change, 2007, v. 46, n. 4/5, p. 239, doi. 10.1007/s10611-007-9058-4
- By:
- Publication type:
- Article
Editor’s postscript.
- Published in:
- 2007
- By:
- Publication type:
- Editorial
CONSIDERAŢII ASUPRA SECURITĂŢII INFORMAŢIILOR ÎN ROMÂNIA.
- Published in:
- Review of Management & Economic Engineering, 2010, v. 9, n. 1, p. 53
- By:
- Publication type:
- Article
CYBER HARDER.
- Published in:
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 450
- By:
- Publication type:
- Article
Defining Cybersecurity Law.
- Published in:
- Iowa Law Review, 2018, v. 103, n. 3, p. 985
- By:
- Publication type:
- Article
A Legislator's Dilemma.
- Published in:
- IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
- By:
- Publication type:
- Article
The National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy through Standards.
- Published in:
- IEEE Internet Computing, 2011, v. 15, n. 6, p. 80, doi. 10.1109/MIC.2011.160
- By:
- Publication type:
- Article
Security.
- Published in:
- 2005
- By:
- Publication type:
- Abstract
TESTIMONY OF JUSTIN BROOKMAN, DIRECTOR, CONSUMER PRIVACY, CENTER FOR DEMOCRACY AND TECHNOLOGY. HEARING ON "THE CONNECTED WORLD: EXAMINING THE INTERNET OF THINGS".
- Published in:
- Journal of Current Issues in Media & Telecommunications, 2015, v. 7, n. 2, p. 209
- Publication type:
- Article
THE FTC'S PROPOSED FRAMEWORK FOR PRIVACY PROTECTION ONLINE: A MOVE TOWARD SUBSTANTIVE CONTROLS OR JUST MORE NOTICE AND CHOICE?
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1727
- By:
- Publication type:
- Article
PUTTING THE GENIE BACK IN THE BOTTLE: LEVERAGING PRIVATE ENFORCEMENT TO IMPROVE INTERNET PRIVACY.
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1671
- By:
- Publication type:
- Article
FOREWORD: RIDING THE LONG WAVE OF DEVELOPING LAW.
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1666
- By:
- Publication type:
- Article
The Lanham Act's Role in the Chase after Cybersquatters.
- Published in:
- Journal of Contemporary Legal Issues, 2010, v. 19, n. 1, p. 513
- By:
- Publication type:
- Article
Federal Computer Fraud and Abuse Act: Employee Hacking Legal in California and Virginia, But Illegal in Miami, Dallas, Chicago, and Boston.
- Published in:
- Florida Bar Journal, 2013, v. 87, n. 1, p. 36
- By:
- Publication type:
- Article
Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy.
- Published in:
- MIS Quarterly, 1990, v. 14, n. 2, p. 143, doi. 10.2307/248772
- By:
- Publication type:
- Article
Breaching and Entering.
- Published in:
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- By:
- Publication type:
- Article
If You Give a Mouse a Cookie, It's Going to Ask for Your Personally Identifiable Information.
- Published in:
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 329
- By:
- Publication type:
- Article
HACIA UN NUEVO SISTEMA EUROPEO DE PROTECCIÓN DE DATOS: LAS CLAVES DE LA REFORMA.
- Published in:
- Revista de Derecho Politico, 2012, n. 85, p. 13, doi. 10.5944/rdp.85.2012.10244
- By:
- Publication type:
- Article
Task Force Tackles Computer Crime.
- Published in:
- IEEE Software, 2004, v. 21, n. 4, p. 99
- By:
- Publication type:
- Article
PERSONAL DATA PROTECTION IN BULGARTA: THE BEGINNING.
- Published in:
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 3
- By:
- Publication type:
- Article
Cyber Attribution: Technical and Legal Approaches and Challenges.
- Published in:
- European Journal of International Law, 2020, v. 31, n. 3, p. 941, doi. 10.1093/ejil/chaa057
- By:
- Publication type:
- Article
Beyond Naming and Shaming: Accusations and International Law in Cybersecurity.
- Published in:
- European Journal of International Law, 2020, v. 31, n. 3, p. 969, doi. 10.1093/ejil/chaa056
- By:
- Publication type:
- Article
Data Protection and Transborder Data Flow in the European and Global Context.
- Published in:
- European Journal of International Law, 2010, v. 21, n. 2, p. 441, doi. 10.1093/ejil/chq025
- By:
- Publication type:
- Article
Delitos informáticos y entorno jurídico vigente en Colombia.
- Published in:
- Cuadernos de Contabilidad, 2010, v. 11, n. 28, p. 41
- By:
- Publication type:
- Article
THE GREY HAT HACKER: RECONCILING CYBERSPACE REALITY AND THE LAW.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 383
- By:
- Publication type:
- Article
Awareness of Cyber Laws in Young Singaporeans.
- Published in:
- DESIDOC Bulletin of Information Technology, 2007, v. 27, n. 6, p. 41
- By:
- Publication type:
- Article
Generalization-based privacy preservation and discrimination prevention in data publishing and mining.
- Published in:
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- By:
- Publication type:
- Article
A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn't Work, and Cannot Be Made to Work.
- Published in:
- ISSA Journal, 2017, v. 15, n. 12, p. 16
- By:
- Publication type:
- Article
Global Cyber Enforcement.
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- By:
- Publication type:
- Article
Who's Ready for a J.D.?
- Published in:
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- By:
- Publication type:
- Article
Greater cooperation sought in protecting critical infrastructure.
- Published in:
- Issues in Science & Technology, 2000, v. 17, n. 1, p. 29
- Publication type:
- Article
UNELE ASPECTE ÎN LEGĂTURĂ CU INFRACŢIUNILE INFORMATICE DIN PERSPECTIVA LEGISLAŢIEI ÎN VIGOARE, PRECUM ŞI A NOULUI COD PENAL.
- Published in:
- Dreptul, 2012, n. 10, p. 204
- By:
- Publication type:
- Article
Clear and Present Danger.
- Published in:
- ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
- By:
- Publication type:
- Article
To Serve and Protect.
- Published in:
- ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
- By:
- Publication type:
- Article
Data protection.
- Published in:
- ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
- Publication type:
- Article
Rules on dual use tools.
- Published in:
- ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
- By:
- Publication type:
- Article
Double-edged swords.
- Published in:
- ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
- By:
- Publication type:
- Article
Legal Barriers and Enablers to Big Data Reuse.
- Published in:
- European Data Protection Law Review (EDPL), 2016, v. 2, n. 2, p. 209, doi. 10.21552/edpl/2016/2/10
- By:
- Publication type:
- Article
Data Protection Needs a Global Approach.
- Published in:
- International Policy Digest, 2017, v. 4, n. 5, p. 37
- By:
- Publication type:
- Article