Works matching DE "SPYWARE (Computer software)"
1
- Ohio State Law Journal, 2024, v. 85, n. 5, p. 809
- Article
2
- Issues in Science & Technology, 2022, v. 38, n. 2, p. 15
- Article
3
- Information (2078-2489), 2023, v. 14, n. 2, p. 102, doi. 10.3390/info14020102
- Naser, Muawya;
- Abu Al-Haija, Qasem
- Article
4
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 83
- Article
5
- ComputerWorld Hong Kong, 2009, v. 26, n. 4, p. 30
- Article
6
- Tort Trial & Insurance Practice Law Journal, 2014, v. 49, n. 2, p. 529
- Article
7
- Our Schools / Our Selves, 2011, v. 20, n. 2, p. 9
- Article
8
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1135
- Dhandha, Dipti H.;
- Parekh, Chandresh
- Article
9
- Journal of Information System Security, 2011, v. 7, n. 2, p. 15
- Martins, W.;
- Furnell, S. M.
- Article
10
- Strategic Finance, 2004, v. 85, n. 9, p. 57
- Article
11
- Jordanian Journal of Computers & Information Technology, 2025, v. 11, n. 1, p. 1
- Mimi, Mousumi Ahmed;
- Hu Ng;
- Vun Yap, Timothy Tzen
- Article
12
- Journal of Natural Sciences & Mathematics (JNSM), 2022, v. 7, n. 13/14, p. 12
- CIVULI, Abdulla;
- LUMA-OSMANI, Shkurte;
- RUFATI, Eip;
- ARIFI, Gjulie
- Article
13
- Journal of the CPA Practitioner, 2012, v. 4, n. 3, p. 6
- Article
14
- Berkeley Technology Law Journal, 2007, v. 22, n. 1, p. 555
- Article
15
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1363
- Article
16
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1433
- Article
17
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1345
- Article
18
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1283
- Article
19
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1269
- Article
20
- Berkeley Technology Law Journal, 2005, v. 20, n. 1, p. 340
- Article
21
- European Journal of International Law, 2023, v. 34, n. 3, p. 697, doi. 10.1093/ejil/chad039
- Article
22
- Journal of Internet Commerce, 2006, v. 5, n. 3, p. 109, doi. 10.1300/J179v05n03_05
- Marshall, Kimball P.;
- Swartwout, Nansi
- Article
23
- IEEE Internet Computing, 2005, v. 9, n. 6, p. 12
- Article
24
- IEEE Internet Computing, 2005, v. 9, n. 5, p. 12
- Article
25
- Seton Hall Law Review, 2023, v. 54, n. 2, p. 533, doi. 10.60095/apeg7862
- Article
26
- ISSA Journal, 2018, v. 16, n. 11, p. 7
- Article
27
- Business Ethics Quarterly, 2006, v. 16, n. 3, p. 313, doi. 10.5840/beq200616330
- Laczniak, Gene R.;
- Murphy, Patrick E.
- Article
28
- CURIE Journal, 2010, v. 3, n. 1, p. 41
- Article
29
- New York Law School Law Review, 2016, v. 61, n. 3/4, p. 449
- Article
30
- Sensors (14248220), 2024, v. 24, n. 13, p. 4212, doi. 10.3390/s24134212
- Rossetto, Anubis Graciela de Moraes;
- Noetzold, Darlan;
- Silva, Luis Augusto;
- Leithardt, Valderi Reis Quietinho
- Article
31
- Sensors (14248220), 2022, v. 22, n. 15, p. 5765, doi. 10.3390/s22155765
- Qabalin, Majdi K.;
- Naser, Muawya;
- Alkasassbeh, Mouhammd
- Article
32
- Knowledge & Information Systems, 2012, v. 32, n. 1, p. 167, doi. 10.1007/s10115-011-0438-9
- Lavesson, Niklas;
- Axelsson, Stefan
- Article
33
- Knowledge & Information Systems, 2011, v. 26, n. 2, p. 285, doi. 10.1007/s10115-009-0278-z
- Lavesson, Niklas;
- Boldt, Martin;
- Davidsson, Paul;
- Jacobsson, Andreas
- Article
34
- Cuadernos de Derecho Penal, 2021, n. 26, p. 93
- Article
35
- AARMS: Academic & Applied Research in Military & Public Management Science, 2023, v. 22, n. 3, p. 5, doi. 10.32565/aarms.2023.3.1
- Article
36
- Parliamentarian, 2010, v. 91, n. 4, p. 400
- Article
37
- Strategic Finance, 2007, v. 88, n. 11, p. 55
- Article
38
- Strategic Finance, 2006, v. 88, n. 6, p. 49
- Article
39
- Thunderbird International Business Review, 2023, v. 65, n. 3, p. 355, doi. 10.1002/tie.22321
- Kaster, Sean D.;
- Ensign, Prescott C.
- Article
40
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2008, v. 23, n. 1, p. 165
- Canbek, Gürol;
- Sağiroğlu, Şeref
- Article
41
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2007, v. 22, n. 1, p. 121
- Canbek, Gürol;
- Sağiroğlu, Şeref
- Article
42
- Automatika: Journal for Control, Measurement, Electronics, Computing & Communications, 2024, v. 65, n. 3, p. 803, doi. 10.1080/00051144.2024.2310458
- T, Jimshith V.;
- Amala Bai, V. Mary
- Article
43
- Trends & Issues in Crime & Criminal Justice, 2010, n. 400, p. 1
- Article
44
- Washington & Lee Law Review, 2015, v. 72, n. 3, p. 1243
- Article
45
- HAPSc Policy Briefs Series, 2023, v. 4, n. 1, p. 127, doi. 10.12681/hapscpbs.35191
- Bonis, Konstantinos-Taxiarchis P.
- Article
46
- Bank Accounting & Finance (08943958), 2006, v. 19, n. 2, p. 26
- Singleton, Tommie;
- Singleton, Aaron;
- Gottlieb, Geoff
- Article
47
- Journal of Computer Networks & Communications, 2011, p. 1, doi. 10.1155/2011/569829
- Zhongqiang Chen;
- Zhanyan Liang;
- Yuan Zhang;
- Zhongrong Chen
- Article
48
- Journal of Information Systems Education, 2010, v. 21, n. 2, p. 241
- Kraushaar, James M.;
- Novak, David C.
- Article
49
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/237125
- Taejin Kim;
- Jeong Hyun Yi;
- Changho Seo
- Article
50
- Teaching Science: The Journal of the Australian Science Teachers Association, 2010, p. 16
- Article