Works matching DE "LEGAL status of computer hackers"
Results: 7
TERROR IN TINSELTOWN: WHO IS ACCOUNTABLE WHEN HOLLYWOOD GETS HACKED.
- Published in:
- Syracuse Law Review, 2016, v. 66, n. 2, p. 331
- By:
- Publication type:
- Article
Computer Crime: Assessing the Lawyer's Perspective.
- Published in:
- Journal of Business Ethics, 1989, v. 8, n. 4, p. 243, doi. 10.1007/BF00383337
- By:
- Publication type:
- Article
PROSECUTING CYBERTERRORISTS: APPLYING TRADITIONAL JURISDICTIONAL FRAMEWORKS TO A MODERN THREAT.
- Published in:
- Stanford Law & Policy Review, 2014, v. 25, n. 2, p. 211
- By:
- Publication type:
- Article
Hacking! Who Pays the Bill?
- Published in:
- ITNOW, 2014, v. 56, n. 3, p. 38, doi. 10.1093/itnow/bwu075
- By:
- Publication type:
- Article
Rules on dual use tools.
- Published in:
- ITNOW, 2008, v. 50, n. 2, p. 28, doi. 10.1093/itnow/bwn041
- By:
- Publication type:
- Article
Regulating Software When Everything Has Software.
- Published in:
- George Washington Law Review, 2016, v. 84, n. 6, p. 1672
- By:
- Publication type:
- Article
Hacking into the Computer Fraud and Abuse Act: The CFAA at 30.
- Published in:
- 2016
- By:
- Publication type:
- Speech