Showing 61 - 80 results of 396 for search 'CYBER LAW', query time: 1.69s Refine Results
  1. 61
    by Yin-Ling Chen, 陳銀鈴
    Published 2010
    ... was the third, Law of network crime's research was less then Network crime's prevention, and Network crime...
    Get full text
    Others
  2. 62
    by Tseng, Ya-Ting, 曾雅婷
    Published 2009
    ... community, they could be aware of the information of criminal wanted by the law. And further, they could...
    Get full text
    Others
  3. 63
    by Chiu-Fu Hsu, 徐久富
    Published 2015
    ... basing on the analysis results. This empirical study first divides the cyber crime issue in a law...
    Get full text
    Others
  4. 64
  5. 65
  6. 66
    by Alharthi, Mohannad
    Published 2014
    ...Cyber-physical systems (CPSs) represent a new generation of engineered systems that tightly...
    Get full text
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
    by Wu, Yi-Hsuan, 吳宜璇
    Published 2018
    .... The constitutionality of anti-cyber stalking and harassment law in the United States has been challenged on the ground...
    Get full text
    Others
  12. 72
    by Cheng, Yeh-Chi, 鄭曄祺
    Published 2007
    ... of the science of law, penalty system, actual crime rate and the history of copyright law. An attempt is made...
    Get full text
    Others
  13. 73
    by Schaefer-Ramirez, Victoria Ann
    Published 2017
    ..., and professionals in the educational community. Although no federal law specifically addresses cyber-harassment...
    Get full text
  14. 74
    by Shu-Ting Yang, 楊舒婷
    Published 2005
    ...碩士 === 國立交通大學 === 教育研究所 === 93 === The goal of this study was to develop the cyber copyright...
    Get full text
    Others
  15. 75
  16. 76
    by Hsieh, Yen Hao, 解燕豪
    Published 2010
    ... experience and operation for cyber-physical services. Consequently, this study not only analyzes...
    Get full text
    Others
  17. 77
    by Babjak, Benjamin
    Published 2014
    ... requirements of a new class of cyber-physical systems. For systems observing physical phenomena via multiple...
    Get full text
    Others
  18. 78
    by Batterbee, Wendy Ann
    Published 2014
    ... to fill the legal gap that exists between the available cyber technology and managing learner cyber...
    Get full text
  19. 79
    by Batterbee, Wendy Ann
    Published 2014
    ... to fill the legal gap that exists between the available cyber technology and managing learner cyber...
    Get full text
  20. 80