Works matching DE "COMPUTER security laws"
Results: 88
Awareness of Cyber Laws in Young Singaporeans.
- Published in:
- DESIDOC Bulletin of Information Technology, 2007, v. 27, n. 6, p. 41
- By:
- Publication type:
- Article
Law shaping technology: Technology shaping the law.
- Published in:
- International Review of Law, Computers & Technology, 2009, v. 23, n. 1/2, p. 5, doi. 10.1080/13600860902742505
- By:
- Publication type:
- Article
The fight against crime and/or the protection of privacy: a thorny debate! 1.
- Published in:
- International Review of Law, Computers & Technology, 2004, v. 18, n. 2, p. 251, doi. 10.1080/1360086042000223535
- By:
- Publication type:
- Article
Legal constraints for the protection of privacy and personal data in electronic evidence handling 1.
- Published in:
- International Review of Law, Computers & Technology, 2004, v. 18, n. 2, p. 231, doi. 10.1080/1360086042000223526
- By:
- Publication type:
- Article
HACIA UN NUEVO SISTEMA EUROPEO DE PROTECCIÓN DE DATOS: LAS CLAVES DE LA REFORMA.
- Published in:
- Revista de Derecho Politico, 2012, n. 85, p. 13, doi. 10.5944/rdp.85.2012.10244
- By:
- Publication type:
- Article
Data Protection Needs a Global Approach.
- Published in:
- International Policy Digest, 2017, v. 4, n. 5, p. 37
- By:
- Publication type:
- Article
CYBER!
- Published in:
- Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109
- By:
- Publication type:
- Article
Survey of Privacy Law Developments in 2009: United States, Canada, and the European Union.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 285
- By:
- Publication type:
- Article
The Italian Google-Case: Privacy, Freedom of Speech and Responsibility of Providers for User-Generated Contents.
- Published in:
- International Journal of Law & Information Technology, 2010, v. 18, n. 4, p. 356, doi. 10.1093/ijlit/eaq010
- By:
- Publication type:
- Article
Sovereign Discourse on Cyber Conflict Under International Law.
- Published in:
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- By:
- Publication type:
- Article
InfiniVault Meets Key Compliance Regulations.
- Published in:
- International Journal of Micrographics & Optical Technology, 2007, v. 25, n. 5, p. 7
- Publication type:
- Article
Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy.
- Published in:
- MIS Quarterly, 1990, v. 14, n. 2, p. 143, doi. 10.2307/248772
- By:
- Publication type:
- Article
Periodicity in software vulnerability discovery, patching and exploitation.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 6, p. 673, doi. 10.1007/s10207-016-0345-x
- By:
- Publication type:
- Article
The Roots of the United States' Cyber (In)Security.
- Published in:
- Diplomatic History, 2019, v. 43, n. 1, p. 157, doi. 10.1093/dh/dhy038
- By:
- Publication type:
- Article
A REASONABLE RENDITION OF REGISTRATION: GOPETS V. HISE, SCHMIDHEINY V. WEBER, AND CONGRESSIONAL INTENT.
- Published in:
- DePaul Journal of Art, Technology & Intellectual Property Law, 2012, v. 22, n. 2, p. 449
- By:
- Publication type:
- Article
CYBER HARDER.
- Published in:
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 450
- By:
- Publication type:
- Article
RECENT DEVELOPMENTS IN CYBERSECURITY AND DATA PRIVACY.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2020, v. 55, n. 2, p. 217
- By:
- Publication type:
- Article
RECENT DEVELOPMENTS IN CYBERSECURITY AND DATA PRIVACY.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2019, v. 54, n. 2, p. 403
- By:
- Publication type:
- Article
RECENT DEVELOPMENTS IN CYBERSECURITY AND DATA PRIVACY.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2018, v. 53, n. 2, p. 291
- By:
- Publication type:
- Article
Cybersecurity and Data Protection: A Study on China's New Cybersecurity Legal Regime and How It Affects Inbound Investment in China.
- Published in:
- International Lawyer, 2018, v. 51, n. 3, p. 537
- By:
- Publication type:
- Article
Spatiotemporal model checking of location and mobility related security policy specifications.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 144, doi. 10.3906/elk-1105-54
- By:
- Publication type:
- Article
Greater cooperation sought in protecting critical infrastructure.
- Published in:
- Issues in Science & Technology, 2000, v. 17, n. 1, p. 29
- Publication type:
- Article
Task Force Tackles Computer Crime.
- Published in:
- IEEE Software, 2004, v. 21, n. 4, p. 99
- By:
- Publication type:
- Article
PERSONAL DATA PROTECTION IN BULGARTA: THE BEGINNING.
- Published in:
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 3
- By:
- Publication type:
- Article
DEFENDING AMERICA AGAINST CHINESE CYBER ESPIONAGE THROUGH THE USE OF ACTIVE DEFENSES.
- Published in:
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- By:
- Publication type:
- Article
PROPOSED PRIVACY REFORM LEGISLATION IN EUROPE AND ITS EFFECT ON INTERNATIONAL DATA TRANSFERS.
- Published in:
- Business Law Review (15337421), 2012, v. 45, p. 75
- By:
- Publication type:
- Article
What Security Professionals Need to Know About Digital Evidence.
- Published in:
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 3, p. 124, doi. 10.1080/19393550903200466
- By:
- Publication type:
- Article
Federal Computer Fraud and Abuse Act: Employee Hacking Legal in California and Virginia, But Illegal in Miami, Dallas, Chicago, and Boston.
- Published in:
- Florida Bar Journal, 2013, v. 87, n. 1, p. 36
- By:
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2015, v. 55, n. 10, p. 72
- By:
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2012, p. 76
- Publication type:
- Article
If You Give a Mouse a Cookie, It's Going to Ask for Your Personally Identifiable Information.
- Published in:
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 329
- By:
- Publication type:
- Article
Breaching and Entering.
- Published in:
- Brooklyn Law Review, 2015, v. 81, n. 1, p. 405
- By:
- Publication type:
- Article
THE FTC'S PROPOSED FRAMEWORK FOR PRIVACY PROTECTION ONLINE: A MOVE TOWARD SUBSTANTIVE CONTROLS OR JUST MORE NOTICE AND CHOICE?
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1727
- By:
- Publication type:
- Article
PUTTING THE GENIE BACK IN THE BOTTLE: LEVERAGING PRIVATE ENFORCEMENT TO IMPROVE INTERNET PRIVACY.
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1671
- By:
- Publication type:
- Article
FOREWORD: RIDING THE LONG WAVE OF DEVELOPING LAW.
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1666
- By:
- Publication type:
- Article
NO FREE LUNCH (OR WI-FI): MICHIGAN'S UNCONSTITUTIONAL COMPUTER CRIME STATUTE.
- Published in:
- UCLA Journal of Law & Technology, 2009, v. 13, n. 1, p. 1
- By:
- Publication type:
- Article
REGULATING INFORMATION SECURITY IN THE GOVERNMENT CONTRACTING INDUSTRY: WILL THE RISING TIDE LIFT ALL THE BOATS?
- Published in:
- American University Law Review, 2013, v. 62, n. 5, p. 1145
- By:
- Publication type:
- Article
Legal Barriers and Enablers to Big Data Reuse.
- Published in:
- European Data Protection Law Review (EDPL), 2016, v. 2, n. 2, p. 209, doi. 10.21552/edpl/2016/2/10
- By:
- Publication type:
- Article
Towards Building National Cybersecurity Awareness.
- Published in:
- International Journal of Electronics & Telecommunications, 2020, v. 66, n. 2, p. 321, doi. 10.24425/ijet.2020.131881
- By:
- Publication type:
- Article
CONSIDERAŢII ASUPRA SECURITĂŢII INFORMAŢIILOR ÎN ROMÂNIA.
- Published in:
- Review of Management & Economic Engineering, 2010, v. 9, n. 1, p. 53
- By:
- Publication type:
- Article
Clear and Present Danger.
- Published in:
- ITNOW, 2012, v. 54, n. 2, p. 38, doi. 10.1093/itnow/bws046
- By:
- Publication type:
- Article
To Serve and Protect.
- Published in:
- ITNOW, 2012, v. 54, n. 1, p. 22, doi. 10.1093/itnow/bws009
- By:
- Publication type:
- Article
Data protection.
- Published in:
- ITNOW, 2009, v. 51, n. 4, p. 24, doi. 10.1093/itnow/bwp067
- Publication type:
- Article
Rules on dual use tools.
- Published in:
- ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
- By:
- Publication type:
- Article
Double-edged swords.
- Published in:
- ITNOW, 2006, v. 48, n. 4, p. 16, doi. 10.1093/itnow/bwl028
- By:
- Publication type:
- Article
THE GREY HAT HACKER: RECONCILING CYBERSPACE REALITY AND THE LAW.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 383
- By:
- Publication type:
- Article
Generalization-based privacy preservation and discrimination prevention in data publishing and mining.
- Published in:
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- By:
- Publication type:
- Article
Inhalt.
- Published in:
- 2019
- Publication type:
- Table of Contents
Cyber Attribution: Technical and Legal Approaches and Challenges.
- Published in:
- European Journal of International Law, 2020, v. 31, n. 3, p. 941, doi. 10.1093/ejil/chaa057
- By:
- Publication type:
- Article
Beyond Naming and Shaming: Accusations and International Law in Cybersecurity.
- Published in:
- European Journal of International Law, 2020, v. 31, n. 3, p. 969, doi. 10.1093/ejil/chaa056
- By:
- Publication type:
- Article