Works matching DE "SPYWARE (Computer software)"
Results: 77
Chipping Away at Bloomberg's Article...
- Published in:
- ISSA Journal, 2018, v. 16, n. 11, p. 7
- By:
- Publication type:
- Article
Account Information Requests From E-mail.
- Published in:
- Journal of the CPA Practitioner, 2012, v. 4, n. 3, p. 6
- By:
- Publication type:
- Article
SECURITY.
- Published in:
- Teaching Science: The Journal of the Australian Science Teachers Association, 2010, p. 16
- Publication type:
- Article
Various Malware Handling Technique.
- Published in:
- Central Asia & the Caucasus (14046091), 2022, v. 23, n. 1, p. 794, doi. 10.37178/ca-c.23.1.071
- By:
- Publication type:
- Article
WHAT NOT TO "WARE": AS CONGRESS STRUGGLES AGAINST SPYWARE, THE FBI DEVELOPS ITS OWN.
- Published in:
- Rutgers Computer & Technology Law Journal, 2008, v. 35, n. 1, p. 77
- By:
- Publication type:
- Article
Spying Inc.
- Published in:
- Washington & Lee Law Review, 2015, v. 72, n. 3, p. 1243
- By:
- Publication type:
- Article
Risky business.
- Published in:
- Public Relations Tactics, 2012, v. 19, n. 9, p. 7
- By:
- Publication type:
- Article
Cyberthreats Facing the Banking Industry.
- Published in:
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 2, p. 26
- By:
- Publication type:
- Article
Hacking: A Threat to Industrial Work Forces.
- Published in:
- CURIE Journal, 2010, v. 3, n. 1, p. 41
- By:
- Publication type:
- Article
Spyware Poses Greater Threat.
- Published in:
- IT Professional, 2008, v. 10, n. 2, p. 7
- Publication type:
- Article
Finnish-Brit Sting Nets Notorious Virus Conglomerate.
- Published in:
- IT Professional, 2006, v. 8, n. 4, p. 5
- Publication type:
- Article
THE NEED FOR A SHARED RESPONSIBILITY REGIME BETWEEN STATE AND NON-STATE ACTORS TO PREVENT HUMAN RIGHTS VIOLATIONS CAUSED BY CYBER-SURVEILLANCE SPYWARE.
- Published in:
- Brooklyn Journal of International Law, 2019, v. 44, n. 2, p. 785
- By:
- Publication type:
- Article
ATTACKING ANALOGIES: THE NEED FOR INDEPENDENT STANDARDS FOR MOBILE PRIVACY.
- Published in:
- UCLA Journal of Law & Technology, 2015, v. 19, n. 2, p. 1
- By:
- Publication type:
- Article
How to Manage E-Mail Effectively.
- Published in:
- Podiatry Management, 2005, v. 24, n. 9, p. 47
- By:
- Publication type:
- Article
Assessing Offensive Cyber Capabilities: Exploring the Talent Behind Cybersecurity.
- Published in:
- AARMS: Academic & Applied Research in Military & Public Management Science, 2023, v. 22, n. 3, p. 5, doi. 10.32565/aarms.2023.3.1
- By:
- Publication type:
- Article
Keylogger ve Gizlilik: Makine Öğrenimi Modellerinin Karşılaştırması.
- Published in:
- Afyon Kocatepe University Journal of Science & Engineering / Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi, 2024, v. 24, n. 5, p. 1189, doi. 10.35414/akufemubid.1451007
- By:
- Publication type:
- Article
MARKETING, CONSUMERS AND TECHNOLOGY: PERSPECTIVES FOR ENHANCING ETHICAL TRANSACTIONS.
- Published in:
- Business Ethics Quarterly, 2006, v. 16, n. 3, p. 313, doi. 10.5840/beq200616330
- By:
- Publication type:
- Article
Spyware Identification for Android Systems Using Fine Trees.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 2, p. 102, doi. 10.3390/info14020102
- By:
- Publication type:
- Article
Comparing the effectiveness of antispyware removal tools.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 2, p. 15
- By:
- Publication type:
- Article
Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?
- Published in:
- Social Science Computer Review, 2007, v. 25, n. 1, p. 78, doi. 10.1177/0894439306292346
- By:
- Publication type:
- Article
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness.
- Published in:
- Journal of Global Information Management, 2008, v. 16, n. 2, p. 91, doi. 10.4018/jgim.2008040106
- By:
- Publication type:
- Article
Similarity assessment for removal of noisy end user license agreements.
- Published in:
- Knowledge & Information Systems, 2012, v. 32, n. 1, p. 167, doi. 10.1007/s10115-011-0438-9
- By:
- Publication type:
- Article
Learning to detect spyware using end user license agreements.
- Published in:
- Knowledge & Information Systems, 2011, v. 26, n. 2, p. 285, doi. 10.1007/s10115-009-0278-z
- By:
- Publication type:
- Article
Malicious Firmware Attack Detection in ICT tools Connected on Cloud Services using Deep Random Forest (MAC-DRF).
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2022, v. 8, n. 1, p. 557
- By:
- Publication type:
- Article
Unmasking the Term 'Dual Use' in EU Spyware Export Control.
- Published in:
- European Journal of International Law, 2023, v. 34, n. 3, p. 697, doi. 10.1093/ejil/chad039
- By:
- Publication type:
- Article
Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 3, doi. 10.1007/s10796-007-9035-6
- By:
- Publication type:
- Article
The Road to Digital Single Market: How the EU Can “Enter That Orbit”?
- Published in:
- HAPSc Policy Briefs Series, 2023, v. 4, n. 1, p. 127, doi. 10.12681/hapscpbs.35191
- By:
- Publication type:
- Article
CYBER ESPIONAGE CONSEQUENCES AS A GROWING THREAT.
- Published in:
- Journal of Natural Sciences & Mathematics (JNSM), 2022, v. 7, n. 13/14, p. 12
- By:
- Publication type:
- Article
Education Roundup.
- Published in:
- Our Schools / Our Selves, 2011, v. 20, n. 2, p. 9
- By:
- Publication type:
- Article
PROTECTING INDIVIDUAL SECURITY ONLINE AND IN THE REAL WORLD.
- Published in:
- Parliamentarian, 2010, v. 91, n. 4, p. 400
- Publication type:
- Article
Marketing and Internet Professionals' Fiduciary Responsibility: A Perspective on Spyware.
- Published in:
- Journal of Internet Commerce, 2006, v. 5, n. 3, p. 109, doi. 10.1300/J179v05n03_05
- By:
- Publication type:
- Article
Security.
- Published in:
- IEEE Internet Computing, 2005, v. 9, n. 6, p. 12
- By:
- Publication type:
- Article
Security.
- Published in:
- IEEE Internet Computing, 2005, v. 9, n. 5, p. 12
- By:
- Publication type:
- Article
Opening a Can of Worms and Viruses: The Impact of E-Service on E-Mail Users Everywhere.
- Published in:
- New York Law School Law Review, 2016, v. 61, n. 3/4, p. 449
- By:
- Publication type:
- Article
THE CHILLING OF RELIGIOUS LIBERTY IN THE AGE OF DIGITAL SURVEILLANCE.
- Published in:
- Seton Hall Law Review, 2023, v. 54, n. 2, p. 533, doi. 10.60095/apeg7862
- By:
- Publication type:
- Article
La utilización de software como herramienta de interceptación de comunicaciones.
- Published in:
- Cuadernos de Derecho Penal, 2021, n. 26, p. 93
- By:
- Publication type:
- Article
Privacy theft malware multi-process collaboration analysis.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 1, p. 51, doi. 10.1002/sec.705
- By:
- Publication type:
- Article
Enhancement of Password Authentication System Using Recognition based Graphical password for web Application.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1135
- By:
- Publication type:
- Article
Neoliberalism's conditioning effects on the university and the example of proctoring during COVID-19 and since.
- Published in:
- Journal of Critical Realism, 2022, v. 21, n. 5, p. 502, doi. 10.1080/14767430.2022.2100612
- By:
- Publication type:
- Article
Privatized espionage: NSO Group Technologies and its Pegasus spyware.
- Published in:
- Thunderbird International Business Review, 2023, v. 65, n. 3, p. 355, doi. 10.1002/tie.22321
- By:
- Publication type:
- Article
Rogues and Spyware: Pegasus Strikes Again.
- Published in:
- CounterPunch, 2022, p. 1
- By:
- Publication type:
- Article
Blacklisting the Merchants of Spyware.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Pegasus and the Threat of Cyberweapons in the Age of Smartphones.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Pegasus and the Global Surveillance Business.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Pegasus Rides Again: the NSO Group, Spyware and Human Rights.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Cloud computing: Challenges and future directions.
- Published in:
- Trends & Issues in Crime & Criminal Justice, 2010, n. 400, p. 1
- By:
- Publication type:
- Article
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 3, p. 2377, doi. 10.1007/s10207-024-00841-z
- By:
- Publication type:
- Article
Bad Neighborhoods.
- Published in:
- Strategic Finance, 2007, v. 88, n. 11, p. 55
- By:
- Publication type:
- Article
Technology Concern?
- Published in:
- Strategic Finance, 2006, v. 88, n. 6, p. 49
- By:
- Publication type:
- Article
Spyware! Who Put That on My Machine?
- Published in:
- Strategic Finance, 2004, v. 85, n. 9, p. 57
- By:
- Publication type:
- Article