INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY "HACKTIVISM" CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM.Published in:Boston University Law Review, 2012, v. 92, n. 5, p. 1663By:Kelly, Brian B.Publication type:Article
CONFRONTING THE ONE-MAN WOLF PACK: ADAPTING LAW ENFORCEMENT AND PROSECUTION RESPONSES TO THE THREAT OF LONE WOLF TERRORISM.Published in:Boston University Law Review, 2012, v. 92, n. 5, p. 1613By:Barnes, Beau D.Publication type:Article
POLICING IDENTITY.Published in:Boston University Law Review, 2012, v. 92, n. 5, p. 1561By:LOGAN, WAYNE A.Publication type:Article
POWERFUL BUYERS AND MERGER ENFORCEMENT.Published in:Boston University Law Review, 2012, v. 92, n. 5, p. 1485By:KIRKWOOD, JOHN B.Publication type:Article
TORTIFYING EMPLOYMENT DISCRIMINATION.Published in:Boston University Law Review, 2012, v. 92, n. 5, p. 1431By:SULLIVAN, CHARLES A.Publication type:Article