5 research outputs found
How the Legal Fraternity Should Respond to Modern Cybercrimes
- Author
- Allan
- Allan
- Bainbridge
- Bainbridge
- Blume
- Blume
- Brenner
- Brenner
- Brenner
- Brenner
- Brenner
- Brenner
- Cavelty
- Cavelty
- Clough
- Clough
- Cybercrime
- Cybercrime
- Dumbill
- Dumbill
- Fafinski
- Fafinski
- Garrie
- Garrie
- Geer
- Geer
- Grabosky
- Grabosky
- Greiner
- Greiner
- Hafner
- Hafner
- Hamid Jhankhani
- Hamid Jhankhani
- Kroczynski
- Kroczynski
- Majid
- Majid
- Reyes
- Reyes
- Roman
- Roman
- Sivasubramaniam
- Sivasubramaniam
- Sun
- Sun
- Symantec
- Symantec
- Turrini
- Turrini
- Wall
- Wall
- Wiles
- Wiles
- Publication venue
- 'Mediterranean Center of Social and Educational Research'
- Publication date
- Field of study
The Use of Hacking as a Cybercrime Investigation Technique in Sri Lanka through the Perspectives of the Right to Privacy as Enumerated in Article 17 of International Covenant on Civil and Political Rights, Article 8 of European Convention on Human Rights and Fourth Amendment to the US Constitution
- Author
- &
- &
- &
- &
- &
- A F Westin
- A J Colangelo
- A Marsoof
- A Taylor
- B J Koops
- Brandon Buskey
- Bryant
- C Amarasinghe
- C F Amerasinghe
- C Slobogin
- Cybercrime Brenner
- Cybercrime Wall
- D
- D Johnson
- D Solove
- D Wall
- D Wall
- Dhanapala V Dissanayake
- G Dutertre
- G Newey
- G Rivlin
- H L A Hart
- H Nissenbaum
- H T Tavani
- Id
- J Clough
- J M Cooray
- J Mayer
- Jackson Ex Parte
- Jay Us
- K Gormley
- K Roach
- K Ziolkowski
- L Cohen
- L Lessig
- L R Sri
- Luna
- M Burchell
- M Daly
- M J Bozzuyt
- M S Gomez
- M W Janis
- P Stephenson
- Principles Clough
- R Bryant
- R Bryant
- R Deibert &
- R Gavinson
- R L Leenes
- R Thomas
- R Thomas
- Ridge V Baldwin
- S D D Warren &
- S Felix
- S Felix
- S Felix
- S Felix
- S Marsoof
- Sanduni Wickramasinghe
- Schiller
- Sieber
- Silverthorne Lumber
- Stephenson
- W A Schabas
- Y
- Y Benkler
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2016
- Field of study
The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century
- Author
- Albright
- Anderson
- Antolin
- Baker
- Barkham
- Billo
- Blank
- Brenner
- Brown
- Cannizzaro
- Carnahan
- Carr
- Cheng Hang
- Clarke
- Coleman
- Condron
- Creekman
- Cybercrime
- Darcy
- David
- DCSINT
- DeLuca
- Dinstein
- Dombrowski
- Dormann
- Estreicher
- Franzese
- GAOR
- Geneva
- Gercke
- German
- Goodman
- Gordon
- Graham
- Hague
- Halberstam
- Hathaway
- Hathaway
- Heinsch
- Hemen Philip Faga
- Henckaerts
- Hildreth
- Hoisington
- Hurka
- ICRC
- Jensen
- Jensen
- July
- July
- Kalpokienė
- Kampala
- Kastenberg
- Kelsey
- Kerschischnig
- Kingsbury
- Landau
- Libicki
- Lieber
- Little
- Lülf
- Melzer
- Melzer
- Michael
- Michael
- Murphy
- Owens
- Proulx
- Quadrennial
- Sandoz
- Schaap
- Schindler
- Schmitt
- Schmitt
- Schmitt
- Schmitt
- Schmitt
- Schmitt
- Schmitt
- Schmitt
- Shane
- Sharp
- Shimeall
- Sklerov
- Smith
- Solce
- Stevens
- Svarc
- Swanson
- Waxman
- Wheeler
- White
- Wiltshire
- Wingfield
- Publication venue
- 'Walter de Gruyter GmbH'
- Publication date
- Field of study
Understanding Crime with Computational Topology
- Author
- A Cerri
- A Kigerl
- AJ Masys
- BW Reyns
- C Alexander
- C Alexander
- C Everett
- CA Doxiadis
- DK Rossmo
- DK Rossmo
- E Brunswik
- E Brunswik
- F Calderoni
- G Bichler
- G Bichler
- G Carlsson
- GF Rengert
- GO Mohler
- Gwern.net
- H Chen
- H Chen
- H Office
- J Martin
- J Song
- J Xu
- JC Lowe
- JH Ratcliffe
- JH Ratcliffe
- KP Erb
- LA Zadeh
- LE Cohen
- M Felson
- M Felson
- M Felson
- M Felson
- M Felson
- M Felson
- M Felson
- M Felson
- M Goff
- M McGuire
- M Yar
- MA Andresen
- MRJ Soudijn
- P Wiles
- PJ Brantingham
- PJ Brantingham
- PJ Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- PL Brantingham
- R Bryant
- S Perreault
- SD Johnson
- SW Brenner
- TJ Holt
- UK Fights Cybercrime
- W Vliet van
- Publication venue
- 'Springer Science and Business Media LLC'
- Publication date
- 01/01/2015
- Field of study
Is Cyberthreat the Next Pearl Harbor?
- Author
- A Stewart
- Andrea See
- Andrew Hilts
- Anna Mulrine
- Arno R See Generally
- Ash Carter
- Carol M Hayes
- Cass R Sunstein
- Charles J Dunlap
- Christopher Marsden &
- Christopher S Yoo
- Cong
- Cybercrime
- Cyberwar
- Dakota S
- Damian Paletta
- Douglas A See Generally
- Duncan B Hollis
- Duncan B Hollis
- Duncan B Hollis
- E-Mail From Steve
- Elizabeth Hanford
- Francis X Taylor
- Friedman
- G Brandon
- G Brandon
- Glennon
- Harv Int&apos
- Hitoshi Nasu &
- Hofstra L Rev
- Id
- Id
- Id
- Infrastructure Cybersecurity
- J C H Julie
- J C H Julie
- J Conflict
- J Daniel
- J L Ill
- J Lawrence
- J Lawrence
- J M Lianne
- James Kraska
- Jason Healey
- Jeffrey L Vagle
- Jeffrey S Brand
- Jens David Ohlin
- Jeremy Rabkin
- Jim Garamone
- Joanna Kulesza
- Joel R Reidenberg
- John C Richardson
- Jules Polonetsky
- Julie J C H See
- Julie J C H See
- K A Taipale
- Kristen Eichensehr
- Kristen Eichensehr
- Kristin Westerhorstmann
- Larisa Breton
- Laura Donohue
- Lawrence J See Generally
- Lawrence J Trautman
- Lawrence J Trautman
- Lawrence J Trautman
- Lawrence J Trautman
- Lawrence J. Trautman
- Lori Fossum
- Matthew Hoisington
- Melissa Hathaway
- Michelle A See Generally
- Mike Mcconnell
- Myriam Dunn
- Nazli Choucri
- Orla Lynskey
- P Jay
- Paul M Schwartz
- Peter Swire
- Peter Swire
- Peter Swire
- Peter Swire
- Robert Faris
- Robin Geiss &
- S Rep
- Scott Shackelford
- See Carter
- See Gary
- See Generally
- See Generally
- See Generally
- See Jane Harman
- See Michael
- See Scott Shackelford
- See Steve Morgan
- Shane R Id
- Shaun B Spencer
- Stuart Malawer
- Stuart Malawer
- Supra Hayden
- Supra Healey
- Susan W Brenner
- Susan W Brenner
- Tim Stevens
- Wetherbe
- William H Dutton
- Publication venue
- 'Elsevier BV'
- Publication date
- 01/01/2016
- Field of study