Suggested Topics within your search.
Suggested Topics within your search.
International relations
9
Warfare & defence
8
Military history
7
Defence strategy, planning & research
5
Espionage & secret services
5
Terrorism, armed struggle
5
Cyber security
4
Cybersecurity
2
Diplomacy
2
International institutions
2
Malaysia
2
Political control & freedoms
2
Politics & government
2
Public international law
2
Abstracting
1
Academic literature
1
BP Islam. Bahaism. Theosophy, etc
1
Bitcoin
1
Cloud computing
1
Complexity theory
1
Computer crime
1
Computer fraud
1
Computer related crimes
1
Computing & information technology
1
Control systems
1
Control theory
1
Coping strategies
1
Court of law
1
Criminalisation
1
Cryptocurrencies
1
-
141
-
142
-
143
-
144
-
145
-
146
-
147
-
148by Mariah Dourado de Andrade, Dorinethe dos Santos Bentes, David Franklin da Silva GuimarãesSubjects: “...Criminal Law...”
Published 2017-11-01
Get full text
Article -
149by Nora OsmaniSubjects: “...personal data; privacy; digital age; cyber threats; European Union law...”
Published 2016-07-01
Get full text
Article -
150
-
151by Alexander NIEDERMEIERSubjects: “...Cyber Security...”
Published 2017-09-01
Get full text
Article -
152
-
153“... as cyber-terrorism. The purpose of this study is to discuss the emergence of the currently experienced...”
Get full text
Article -
154by Muhammad Prima ErsyaSubjects: “...tindak pidana cyber...”
Published 2017-08-01
Get full text
Article -
155“... was the third, Law of network crime's research was less then Network crime's prevention, and Network crime...”
Get full text
Others -
156by Hardianto Djanggih“... for the government, law enforcers and the public, so that cyber crime that impact children as victims could...”
Published 2018-05-01
Get full text
Article -
157
-
158by Larry Clinton“...Cyber security is a complex issue that requires a smart, balanced approach to public-private...”
Published 2011-01-01
Get full text
Article -
159“... community, they could be aware of the information of criminal wanted by the law. And further, they could...”
Get full text
Others -
160“... basing on the analysis results. This empirical study first divides the cyber crime issue in a law...”
Get full text
Others