Works matching Spyware
1
- Sensors (14248220), 2022, v. 22, n. 15, p. 5765, doi. 10.3390/s22155765
- Qabalin, Majdi K.;
- Naser, Muawya;
- Alkasassbeh, Mouhammd
- Article
2
- Knowledge & Information Systems, 2011, v. 26, n. 2, p. 285, doi. 10.1007/s10115-009-0278-z
- Lavesson, Niklas;
- Boldt, Martin;
- Davidsson, Paul;
- Jacobsson, Andreas
- Article
3
- Communications of the Association for Information Systems, 2004, v. 14, p. 291, doi. 10.17705/1CAIS.01415
- Stafford, Thomas F.;
- Urbaczewski, Andrew
- Article
4
- Natural Language Engineering, 2023, v. 29, n. 3, p. 824, doi. 10.1017/S1351324923000141
- Church, Kenneth Ward;
- Chandrasekar, Raman
- Article
5
- International Journal of Information Security, 2024, v. 23, n. 3, p. 2377, doi. 10.1007/s10207-024-00841-z
- Almoqbil, Abdullah Hamad N.
- Article
6
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2008, v. 23, n. 1, p. 165
- Canbek, Gürol;
- Sağiroğlu, Şeref
- Article
7
- Information (2078-2489), 2023, v. 14, n. 2, p. 102, doi. 10.3390/info14020102
- Naser, Muawya;
- Abu Al-Haija, Qasem
- Article
8
- American Journal of Business (American Journal of Business), 2009, v. 24, n. 2, p. 41, doi. 10.1108/19355181200900010
- Sriramachandramurthy, Rajendran;
- Balasubramanian, Siva K.;
- Hodis, Monica Alexandra
- Article
9
- Jordanian Journal of Computers & Information Technology, 2025, v. 11, n. 1, p. 1
- Mimi, Mousumi Ahmed;
- Hu Ng;
- Vun Yap, Timothy Tzen
- Article
10
- Journal of Internet Commerce, 2006, v. 5, n. 3, p. 109, doi. 10.1300/J179v05n03_05
- Marshall, Kimball P.;
- Swartwout, Nansi
- Article
11
- Thunderbird International Business Review, 2023, v. 65, n. 3, p. 355, doi. 10.1002/tie.22321
- Kaster, Sean D.;
- Ensign, Prescott C.
- Article
12
- Berkeley Technology Law Journal, 2005, v. 20, n. 1, p. 340
- Article
13
- Strategic Finance, 2004, v. 85, n. 9, p. 57
- Article
14
- Berkeley Technology Law Journal, 2007, v. 22, n. 1, p. 555
- Article
15
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1433
- Article
16
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1363
- Article
17
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1283
- Article
18
- Business Lawyer, 2007, v. 63, n. 1, p. 301
- Article
19
- ComputerWorld Hong Kong, 2009, v. 26, n. 4, p. 30
- Article
20
- International Journal of Intelligence & Counterintelligence, 2024, v. 37, n. 1, p. 286, doi. 10.1080/08850607.2023.2202345
- Article
21
- Rutgers Computer & Technology Law Journal, 2008, v. 35, n. 1, p. 77
- Article
22
- IEEE Internet Computing, 2007, v. 11, n. 6, p. 11
- Article
23
- Issues in Science & Technology, 2022, v. 38, n. 2, p. 15
- Article
24
- European Journal of International Law, 2023, v. 34, n. 3, p. 697, doi. 10.1093/ejil/chad039
- Article
25
- American Business Law Journal, 2008, v. 45, n. 1, p. 61, doi. 10.1111/j.1744-1714.2008.00051.x
- Article
26
- IT Professional, 2008, v. 10, n. 2, p. 7
- Article
27
- Brooklyn Journal of International Law, 2019, v. 44, n. 2, p. 785
- Article
28
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/237125
- Taejin Kim;
- Jeong Hyun Yi;
- Changho Seo
- Article
29
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1345
- Article
30
- Berkeley Technology Law Journal, 2005, v. 20, n. 3, p. 1269
- Article
31
- CounterPunch, 2021, p. 1
- Article
32
- CounterPunch, 2021, p. 1
- Article
33
- Sensors (14248220), 2024, v. 24, n. 13, p. 4212, doi. 10.3390/s24134212
- Rossetto, Anubis Graciela de Moraes;
- Noetzold, Darlan;
- Silva, Luis Augusto;
- Leithardt, Valderi Reis Quietinho
- Article
34
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2007, v. 22, n. 1, p. 121
- Canbek, Gürol;
- Sağiroğlu, Şeref
- Article
35
- CounterPunch, 2022, p. 1
- Article
36
- Tort Trial & Insurance Practice Law Journal, 2014, v. 49, n. 2, p. 529
- Article
37
- Journal of Supercomputing, 2025, v. 81, n. 8, p. 1, doi. 10.1007/s11227-025-07391-8
- Mimi, Mousumi Ahmed;
- Ng, Hu;
- Yap, Timothy Tzen Vun
- Article
38
- Journal of Supercomputing, 2025, v. 81, n. 8, p. 1, doi. 10.1007/s11227-025-07391-8
- Mimi, Mousumi Ahmed;
- Ng, Hu;
- Yap, Timothy Tzen Vun
- Article
39
- Violence Against Women, 2021, v. 22, n. 6/7, p. 851, doi. 10.1177/1077801220923731
- Harkin, Diarmaid;
- Molnar, Adam
- Article
40
- Journal of Global Information Management, 2019, v. 27, n. 3, p. N.PAG, doi. 10.4018/JGIM.2019070105
- Howah, Kenneth;
- Chugh, Ritesh
- Article
41
- Journal of Global Information Management, 2008, v. 16, n. 2, p. 91, doi. 10.4018/jgim.2008040106
- Schmidt, Mark B.;
- Johnston, Allen C.;
- Arnett, Kirk P.;
- Chen, Jim Q.;
- Suicheng Li
- Article
42
- Crime, Media, Culture, 2020, v. 16, n. 1, p. 33, doi. 10.1177/1741659018820562
- Harkin, Diarmaid;
- Molnar, Adam;
- Vowles, Erica
- Article
43
- Knowledge & Information Systems, 2012, v. 32, n. 1, p. 167, doi. 10.1007/s10115-011-0438-9
- Lavesson, Niklas;
- Axelsson, Stefan
- Article
44
- Journal of Information System Security, 2011, v. 7, n. 2, p. 15
- Martins, W.;
- Furnell, S. M.
- Article
45
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 1135
- Dhandha, Dipti H.;
- Parekh, Chandresh
- Article
46
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 3, doi. 10.1007/s10796-007-9035-6
- Sipior, Janice C.;
- Ward, Burke T.
- Article
47
- Journalism Practice, 2022, v. 16, n. 9, p. 1849, doi. 10.1080/17512786.2021.2014346
- Article
48
- Journal of the Association for Information Systems, 2007, v. 8, n. 7, p. 386
- Article
49
- Journal of Natural Sciences & Mathematics (JNSM), 2022, v. 7, n. 13/14, p. 12
- CIVULI, Abdulla;
- LUMA-OSMANI, Shkurte;
- RUFATI, Eip;
- ARIFI, Gjulie
- Article
50
- HAPSc Policy Briefs Series, 2023, v. 4, n. 1, p. 127, doi. 10.12681/hapscpbs.35191
- Bonis, Konstantinos-Taxiarchis P.
- Article