Works matching DE "INTERNET fraud prevention"
1
- 2014
- Question & Answer
2
- Economics, Management & Financial Markets, 2011, v. 6, n. 2, p. 194
- SPERDEA, NATALIŢA MARIA;
- ENESCU, MARIA;
- ENESCU, MARIAN
- Article
3
- IETE Journal of Research, 2011, v. 57, n. 5, p. 423, doi. 10.4103/0377-2063.90151
- Cha, ByungRae;
- Park, Sun;
- Kim, JongWon
- Article
4
- Journal on Active Aging, 2017, v. 16, n. 6, p. 14
- Article
5
- MIS Quarterly, 2007, v. 31, n. 4, p. 759, doi. 10.2307/25148819
- Cecil Eng Huang Chua;
- Wareham, Jonathan;
- Robey, Daniel
- Article
6
- Journal of the Association for Information Systems, 2015, v. 16, n. 6, p. 448
- Zahedi, Fatemeh Mariam;
- Abbasi, Ahmed;
- Yan Chen
- Article
7
- Journal of Management Information Systems, 2015, v. 31, n. 4, p. 109, doi. 10.1080/07421222.2014.1001260
- Abbasi, Ahmed;
- Zahedi, Fatemeh "Mariam";
- Zeng, Daniel;
- Chen, Yan;
- Chen, Hsinchun;
- Nunamaker, Jay F.
- Article
8
- Journal of Current Issues in Crime, Law & Law Enforcement, 2012, v. 5, n. 3, p. 219
- Article
9
- Penn State Law Review, 2018, v. 122, n. 3, p. 727
- Reetz, Margaret A.;
- Prunty, Lauren B.;
- Mantych, Gregory S.;
- Hommel, David J.
- Article
10
- International Management Review, 2018, v. 14, n. 2, p. 5
- Article
11
- Socioeconomica, 2015, v. 4, n. 8, p. 527, doi. 10.12803/SJSECO.48131
- Article
12
- Utah Bar Journal, 2018, v. 31, n. 4, p. 37
- Article
13
- Engineering Letters, 2017, v. 25, n. 4, p. 360
- Article
14
- National Institute of Justice Journal, 2011, n. 268, p. 40
- Article
15
- Wireless Personal Communications, 2018, v. 102, n. 3, p. 2331, doi. 10.1007/s11277-017-5089-z
- Fathy, Waleed S.-A.;
- Ali, Hanaa S.
- Article
16
- Financial Innovation, 2016, v. 2, n. 1, p. 1, doi. 10.1186/s40854-016-0039-4
- Article
17
- Canadian Medical Association Journal (CMAJ), 2001, v. 165, n. 8, p. 1083
- Article
18
- International Journal of Information Security, 2011, v. 10, n. 6, p. 351, doi. 10.1007/s10207-011-0140-7
- Sánchez García, Sergio;
- Gómez Oliva, Ana;
- Pérez Belleboni, Emilia;
- Pau de la Cruz, Iván
- Article
19
- Business Lawyer, 2012, v. 68, n. 1, p. 183
- Article
20
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59
- Kuan-Ta Chen;
- Chun-Rong Huang;
- Chu-Song Chen;
- Jau-Yuan Chen
- Article
21
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 96, doi. 10.1109/MIC.2009.64
- Article
22
- ITNOW, 2016, v. 58, n. 2, p. 56, doi. 10.1093/itnow/bww053
- Article
23
- ITNOW, 2016, v. 58, n. 2, p. 24, doi. 10.1093/itnow/bww040
- Article
24
- ITNOW, 2016, v. 58, n. 2, p. 30, doi. 10.1093/itnow/bww043
- Article
25
- ITNOW, 2016, v. 58, n. 2, p. 28, doi. 10.1093/itnow/bww042
- Article
26
- ITNOW, 2016, v. 58, n. 2, p. 34, doi. 10.1093/itnow/bww045
- Article
27
- ITNOW, 2015, v. 57, n. 2, p. 30, doi. 10.1093/itnow/bwv041
- Article
28
- ITNOW, 2015, v. 57, n. 1, p. 38, doi. 10.1093/itnow/bwv016
- Article
29
- Criminal Justice Studies, 2016, v. 29, n. 2, p. 125, doi. 10.1080/1478601X.2016.1170278
- Article