Works matching DE "COMPUTER security laws"
Results: 88
Spatiotemporal model checking of location and mobility related security policy specifications.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2013, v. 21, n. 1, p. 144, doi. 10.3906/elk-1105-54
- By:
- Publication type:
- Article
A Simple Appeal to Common Sense: Why the Current Legal & Regulatory Regime for Information Security & Privacy Doesn't Work, and Cannot Be Made to Work.
- Published in:
- ISSA Journal, 2017, v. 15, n. 12, p. 16
- By:
- Publication type:
- Article
Global Cyber Enforcement.
- Published in:
- ISSA Journal, 2017, v. 15, n. 7, p. 6
- By:
- Publication type:
- Article
Who's Ready for a J.D.?
- Published in:
- ISSA Journal, 2016, v. 14, n. 10, p. 7
- By:
- Publication type:
- Article
CONSIDERAŢII ASUPRA SECURITĂŢII INFORMAŢIILOR ÎN ROMÂNIA.
- Published in:
- Review of Management & Economic Engineering, 2010, v. 9, n. 1, p. 53
- By:
- Publication type:
- Article
Modality Mix of RFID Regulation.
- Published in:
- Journal of International Commercial Law & Technology, 2008, v. 3, n. 4, p. 222
- By:
- Publication type:
- Article
International Private Law Issues regarding Trademark Protection and the Internet within the EU.
- Published in:
- Journal of International Commercial Law & Technology, 2008, v. 3, n. 1, p. 76
- By:
- Publication type:
- Article
A Tale of Two Dystopias: Order and Chaos on the Electronic Frontier.
- Published in:
- 2016
- By:
- Publication type:
- Speech
THE GREY HAT HACKER: RECONCILING CYBERSPACE REALITY AND THE LAW.
- Published in:
- Northern Kentucky Law Review, 2014, v. 41, n. 3, p. 383
- By:
- Publication type:
- Article
Evaluating existing security and privacy requirements for legal compliance.
- Published in:
- Requirements Engineering, 2010, v. 15, n. 1, p. 119, doi. 10.1007/s00766-009-0089-5
- By:
- Publication type:
- Article
Data Protection Needs a Global Approach.
- Published in:
- International Policy Digest, 2017, v. 4, n. 5, p. 37
- By:
- Publication type:
- Article
Does Cybersecurity Legislation Have a Chance?
- Published in:
- Financial Executive, 2013, v. 29, n. 3, p. 18
- By:
- Publication type:
- Article
DEFENDING AMERICA AGAINST CHINESE CYBER ESPIONAGE THROUGH THE USE OF ACTIVE DEFENSES.
- Published in:
- Cardozo Journal of International & Comparative Law, 2012, v. 20, n. 2, p. 537
- By:
- Publication type:
- Article
PROPOSED PRIVACY REFORM LEGISLATION IN EUROPE AND ITS EFFECT ON INTERNATIONAL DATA TRANSFERS.
- Published in:
- Business Law Review (15337421), 2012, v. 45, p. 75
- By:
- Publication type:
- Article
THE FTC'S PROPOSED FRAMEWORK FOR PRIVACY PROTECTION ONLINE: A MOVE TOWARD SUBSTANTIVE CONTROLS OR JUST MORE NOTICE AND CHOICE?
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1727
- By:
- Publication type:
- Article
PUTTING THE GENIE BACK IN THE BOTTLE: LEVERAGING PRIVATE ENFORCEMENT TO IMPROVE INTERNET PRIVACY.
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1671
- By:
- Publication type:
- Article
FOREWORD: RIDING THE LONG WAVE OF DEVELOPING LAW.
- Published in:
- William Mitchell Law Review, 2011, v. 37, n. 4, p. 1666
- By:
- Publication type:
- Article
CREDIT-MONITORING DAMAGES IN CYBERSECURITY TORT LITIGATION.
- Published in:
- George Mason Law Review, 2011, v. 19, n. 1, p. 113
- By:
- Publication type:
- Article
NO FREE LUNCH (OR WI-FI): MICHIGAN'S UNCONSTITUTIONAL COMPUTER CRIME STATUTE.
- Published in:
- UCLA Journal of Law & Technology, 2009, v. 13, n. 1, p. 1
- By:
- Publication type:
- Article
Simple (Cyber) Sabotage.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2015, v. 21, n. 1, p. 12
- By:
- Publication type:
- Article
Sovereign Discourse on Cyber Conflict Under International Law.
- Published in:
- Texas Law Review, 2010, v. 88, n. 7, p. 1571
- By:
- Publication type:
- Article
ZERO-DAY RESPONSIBILITY: THE BENEFITS OF A SAFE HARBOR FOR CYBERSECURITY RESEARCH.
- Published in:
- Jurimetrics: The Journal of Law, Science & Technology, 2017, v. 57, n. 4, p. 483
- By:
- Publication type:
- Article
Generalization-based privacy preservation and discrimination prevention in data publishing and mining.
- Published in:
- Data Mining & Knowledge Discovery, 2014, v. 28, n. 5/6, p. 1158, doi. 10.1007/s10618-014-0346-1
- By:
- Publication type:
- Article
Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy.
- Published in:
- MIS Quarterly, 1990, v. 14, n. 2, p. 143, doi. 10.2307/248772
- By:
- Publication type:
- Article
Cybercrime jurisdiction.
- Published in:
- Crime, Law & Social Change, 2007, v. 46, n. 4/5, p. 189, doi. 10.1007/s10611-007-9063-7
- By:
- Publication type:
- Article
Network investigations of cyber attacks: the limits of digital evidence.
- Published in:
- Crime, Law & Social Change, 2007, v. 46, n. 4/5, p. 239, doi. 10.1007/s10611-007-9058-4
- By:
- Publication type:
- Article
Editor’s postscript.
- Published in:
- 2007
- By:
- Publication type:
- Editorial
Delitos informáticos y entorno jurídico vigente en Colombia.
- Published in:
- Cuadernos de Contabilidad, 2010, v. 11, n. 28, p. 41
- By:
- Publication type:
- Article
Defining Cybersecurity Law.
- Published in:
- Iowa Law Review, 2018, v. 103, n. 3, p. 985
- By:
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2015, v. 55, n. 10, p. 72
- By:
- Publication type:
- Article
CONGRESSIONAL UPDATE.
- Published in:
- Contract Management, 2012, p. 76
- Publication type:
- Article
Addressing Mandatory Standards.
- Published in:
- Government Technology, 2011, v. 24, n. 8, p. 46
- By:
- Publication type:
- Article
Gambling on Gmail.
- Published in:
- Government Technology, 2009, v. 22, n. 12, p. 42
- By:
- Publication type:
- Article
ENFORCING INTELLECTUAL PROPERTY RIGHTS BY DIMINISHING PRIVACY: How THE ANTI-COUNTERFEITING TRADE AGREEMENT JEOPARDIZES THE RIGHT TO PRIVACY.
- Published in:
- American University International Law Review, 2011, v. 26, n. 3, p. 601
- By:
- Publication type:
- Article
UNELE ASPECTE ÎN LEGĂTURĂ CU INFRACŢIUNILE INFORMATICE DIN PERSPECTIVA LEGISLAŢIEI ÎN VIGOARE, PRECUM ŞI A NOULUI COD PENAL.
- Published in:
- Dreptul, 2012, n. 10, p. 204
- By:
- Publication type:
- Article
Survey of Privacy Law Developments in 2009: United States, Canada, and the European Union.
- Published in:
- Business Lawyer, 2009, v. 65, n. 1, p. 285
- By:
- Publication type:
- Article
Cyber Attribution: Technical and Legal Approaches and Challenges.
- Published in:
- European Journal of International Law, 2020, v. 31, n. 3, p. 941, doi. 10.1093/ejil/chaa057
- By:
- Publication type:
- Article
Beyond Naming and Shaming: Accusations and International Law in Cybersecurity.
- Published in:
- European Journal of International Law, 2020, v. 31, n. 3, p. 969, doi. 10.1093/ejil/chaa056
- By:
- Publication type:
- Article
Data Protection and Transborder Data Flow in the European and Global Context.
- Published in:
- European Journal of International Law, 2010, v. 21, n. 2, p. 441, doi. 10.1093/ejil/chq025
- By:
- Publication type:
- Article
COMPUTER ABUSE: PROBLEMS OF INSTRUMENTAL CONTROL.
- Published in:
- Deviant Behavior, 1987, v. 8, n. 2, p. 113, doi. 10.1080/01639625.1987.9967737
- By:
- Publication type:
- Article
CYBER HARDER.
- Published in:
- Journal of Science & Technology Law, 2018, v. 24, n. 2, p. 450
- By:
- Publication type:
- Article
Positive Cybersecurity Law: Creating a Consistent and Incentive-Based System.
- Published in:
- Chapman Law Review, 2016, v. 19, n. 2, p. 401
- By:
- Publication type:
- Article
Federal Computer Fraud and Abuse Act: Employee Hacking Legal in California and Virginia, But Illegal in Miami, Dallas, Chicago, and Boston.
- Published in:
- Florida Bar Journal, 2013, v. 87, n. 1, p. 36
- By:
- Publication type:
- Article
Will There Be Cybersecurity Legislation?
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 103
- By:
- Publication type:
- Article
Cyber Threats and the Law of War.
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 87
- By:
- Publication type:
- Article
CYBER!
- Published in:
- Brigham Young University Law Review, 2017, v. 2017, n. 5, p. 1109
- By:
- Publication type:
- Article
A semantic approach for fine-grain access control of e-health documents.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 692, doi. 10.1093/jigpal/jzs027
- By:
- Publication type:
- Article
A Legislator's Dilemma.
- Published in:
- IEEE Internet Computing, 2012, v. 16, n. 6, p. 78, doi. 10.1109/MIC.2012.127
- By:
- Publication type:
- Article
The National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy through Standards.
- Published in:
- IEEE Internet Computing, 2011, v. 15, n. 6, p. 80, doi. 10.1109/MIC.2011.160
- By:
- Publication type:
- Article
Security.
- Published in:
- 2005
- By:
- Publication type:
- Abstract