Suggested Topics within your search.
Suggested Topics within your search.
International relations
9
Warfare & defence
8
Military history
7
Defence strategy, planning & research
5
Espionage & secret services
5
Terrorism, armed struggle
5
Cyber security
4
Cybersecurity
2
Diplomacy
2
International institutions
2
Malaysia
2
Political control & freedoms
2
Politics & government
2
Public international law
2
Abstracting
1
Academic literature
1
BP Islam. Bahaism. Theosophy, etc
1
Bitcoin
1
Cloud computing
1
Complexity theory
1
Computer crime
1
Computer fraud
1
Computer related crimes
1
Computing & information technology
1
Control systems
1
Control theory
1
Coping strategies
1
Court of law
1
Criminalisation
1
Cryptocurrencies
1
-
61
-
62by Lowery, Edward W.“... the effectiveness of DHS’s technology-centric, cyber-security approach, the deterrent effect realized through law...”
Published 2015
Get full text
-
63Cyber stalking victimisation of women: Evaluating the effectiveness of current laws in India from...by Halder DebaratiSubjects: “...cyber stalking...”
Published 2015-01-01
Get full text
Article -
64by Ni Ketut Supasti DharmawanSubjects: “...the Law No. 40 of 2007...”
Published 2015-04-01
Get full text
Article -
65
-
66
-
67by Synnestvedt Jensen, Louise“... being carried out and the establishment of cyber activist groups. How shall the law be interpreted...”
Published 2013
Get full text
Others -
68by Erendor, Mehmet Emin“..., there is no common application of international law in the United Nations Charter regarding cyber threats or attacks...”
Published 2017
Get full text
-
69by Sinopoli, Anthony F.Subjects: “...cyber-attack...”
Published 2012
Get full text
Get full text
Others -
70
-
71
-
72by Naim Baftiu“...European Journal of Economics, Law and Social Sciences...”
Published 2017-01-01
Get full text
Article -
73by Jawad Hussain Awan, Shazad Memon, Sheeraz Memon, Kamran Taj Pathan, Niaz Hussain Arijo“... and media. In addition, the impact of these cyber breaches and cyber law to deal with cyber security has...”
Published 2018-04-01
Get full text
Article -
74
-
75by Bambang HartonoSubjects: “...Hackers, Cyber Crime. Pilar law...”
Published 2014-01-01
Get full text
Article -
76
-
77
-
78
-
79
-
80by Moore, Ryan J.“... dramatically. Neither security policies nor international laws have been able to keep up with the demands...”
Published 2012
Get full text