Showing 121 - 140 results of 870 for search 'CYBER LAW', query time: 0.54s Refine Results
  1. 121
    by McDade, Wylie
    Published 2014
    ... state to publically acknowledge its role in the conduct of a cyber-operation. The central result...
    Get full text
  2. 122
    by Ayhan Dolunay, Mustafa Sağsan
    Published 2019-07-01
    Subjects: ...it law, cyber crimes, sociological problems, personal rights, north cyprus....
    Get full text
    Article
  3. 123
    by Yung-Chang Yao, 姚永錩
    Published 2003
    ... Cyber University has become an example of E-learning applications. Because our national law has...
    Get full text
    Others
  4. 124
  5. 125
  6. 126
  7. 127
    by Luca Belli, Jamila Venturini
    Published 2016-12-01
    ... than the one exercised by the law. Notably, we stress that internet intermediaries privately enforce...
    Get full text
    Article
  8. 128
    by Garcia, Colleen Elizabeth.
    Published 2012
    ... to answer two questions: (1) Are existing international laws governing cyber attacks conducted by nation...
    Get full text
  9. 129
    by Metin Turan, Özgür Külcü
    Published 2014-03-01
    ... of violations in this area. In this study, cybercrimes within the scope information technology law...
    Get full text
    Article
  10. 130
    Subjects: ...cyber notary, conceptualization, opportunity...
    Get full text
    Article
  11. 131
  12. 132
  13. 133
  14. 134
    by Ntsaluba, Nandi
    Published 2018
    ... comprehensive draft Bill on CyberSecurity and CyberCrime as a response to the SADC model law on Computer Crime...
    Get full text
    Get full text
  15. 135
  16. 136
    by CHOU, WEN-LIN, 周文玲
    Published 2017
    ...碩士 === 元智大學 === 資訊管理學系 === 105 === Seeing the netizen misbehavior is on the increase, lead Cyber...
    Get full text
    Others
  17. 137
    by Ching-Wei Su, 蘇清偉
    Published 2002
    ... cyber crimes. Being different from the evidence collected for investigating traditional crimes...
    Get full text
    Others
  18. 138
    by Dinh, Tran Thai Son
    Published 2014
    .... The first and foremost task is to gather as much information about cyber threats as possible so that cyber...
    Get full text
    Get full text
    Others
  19. 139
  20. 140