Search Results

There are 4548 results for: content related to: A treaty for cyberspace

  1. China, Russia, and the Challenge to the Global Commons

    Pacific Focus

    Volume 24, Issue 3, December 2009, Pages: 271–297, Richard Weitz

    Article first published online : 17 NOV 2009, DOI: 10.1111/j.1976-5118.2009.01026.x

  2. You have free access to this content
    Bibliography

    Cybercrime and Cyberwarfare

    Igor Bernik, Pages: 145–161, 2014

    Published Online : 21 FEB 2014, DOI: 10.1002/9781118898604.biblio

  3. E-BUYER BEWARE: WHY ONLINE AUCTION FRAUD SHOULD BE REGULATED

    American Business Law Journal

    Volume 39, Issue 4, June 2002, Pages: 575–644, Miriam R. Albert

    Article first published online : 28 JUN 2008, DOI: 10.1111/j.1744-1714.2002.tb00306.x

  4. Cyberwar: Taking Stock of Security and Warfare in the Digital Age

    International Studies Perspectives

    Yong-Soo Eun and Judith Sita Abmann

    Article first published online : 9 MAY 2014, DOI: 10.1111/insp.12073

  5. Regulatory economics: US energy industry considered enormously vulnerable to cyber attack

    Natural Gas & Electricity

    Volume 28, Issue 12, July 2012, Pages: 13–15, Richard A. Barclay

    Article first published online : 21 JUN 2012, DOI: 10.1002/gas.21619

  6. Cyber Security

    Foundations of Homeland Security: Law and Policy

    Martin J. Alperen, Pages: 157–164, 2011

    Published Online : 28 FEB 2011, DOI: 10.1002/9780470925805.ch12

  7. You have free access to this content
    Regulatory Economics: Cybersecurity—Who Cares? Threat and Apathy Worldwide, Outlook Uncertain

    Natural Gas & Electricity

    Volume 30, Issue 6, January 2014, Pages: 30–32, Richard A. Barclay

    Article first published online : 19 DEC 2013, DOI: 10.1002/gas.21738

  8. You have free access to this content
    References

    The Death of the Internet

    Markus Jakobsson, Pages: 339–358, 2012

    Published Online : 9 JUL 2012, DOI: 10.1002/9781118312551.refs

  9. Using Technology-Enabled Active Learning Tools to Introduce Business Ethics Topics in Business Law Courses: A Few Practical Examples

    Journal of Legal Studies Education

    Volume 25, Issue 2, Summer/Fall 2008, Pages: 283–305, Linda A. Reid and Curt M. Weber

    Article first published online : 2 SEP 2008, DOI: 10.1111/j.1744-1722.2008.00054.x

  10. CYBERSECURITY AT THE LOCAL GOVERNMENT LEVEL: BALANCING DEMANDS FOR TRANSPARENCY AND PRIVACY RIGHTS

    Journal of Urban Affairs

    Volume 35, Issue 4, October 2013, Pages: 451–470, SUSAN A. MACMANUS, KIKI CARUSON and BRIAN D. MCPHEE

    Article first published online : 27 SEP 2012, DOI: 10.1111/j.1467-9906.2012.00640.x

  11. Online Child Sex Offenders: Challenges and Counter-Measures

    The Howard Journal of Criminal Justice

    Volume 52, Issue 2, May 2013, Pages: 190–215, Raphael Cohen-Almagor

    Article first published online : 21 MAR 2013, DOI: 10.1111/hojo.12006

  12. Social Media and the Activist Toolkit: User Agreements, Corporate Interests, and the Information Infrastructure of Modern Social Movements

    Journal of Communication

    Volume 62, Issue 2, April 2012, Pages: 315–329, William Lafi Youmans and Jillian C. York

    Article first published online : 16 MAR 2012, DOI: 10.1111/j.1460-2466.2012.01636.x

  13. National Web Studies

    A Companion to New Media Dynamics

    Richard Rogers, Esther Weltevrede, Erik Borra, Sabine Niederer, Pages: 142–166, 2013

    Published Online : 31 JAN 2013, DOI: 10.1002/9781118321607.ch8

  14. Governing the Final Frontier: A Polycentric Approach to Managing Space Weaponization and Debris

    American Business Law Journal

    Volume 51, Issue 2, Summer 2014, Pages: 429–513, Scott J. Shackelford

    Article first published online : 16 APR 2014, DOI: 10.1111/ablj.12031

  15. Geography/internet: ethereal alternate dimensions of cyberspace or grounded augmented realities?

    The Geographical Journal

    Volume 179, Issue 2, June 2013, Pages: 177–182, Mark Graham

    Article first published online : 1 MAR 2013, DOI: 10.1111/geoj.12009

  16. Sexting, Cybersex, and Internet Use: The Relationship Between Adolescent Sexual Behavior and Electronic Technologies

    Clinical Handbook of Adolescent Addiction

    Abigail M. Judge, Fabian M. Saleh, Pages: 377–389, 2012

    Published Online : 4 DEC 2012, DOI: 10.1002/9781118340851.ch38

  17. The global counterfeit drug trade: Patient safety and public health risks

    Journal of Pharmaceutical Sciences

    Volume 100, Issue 11, November 2011, Pages: 4571–4579, Tim K. Mackey and Bryan A. Liang

    Article first published online : 22 JUN 2011, DOI: 10.1002/jps.22679

  18. REGULATION AND JOB CREATION: AN ANALYSIS OF INSTITUTIONAL CHANGE AND ITS CONSEQUENCES

    Annals of Public and Cooperative Economics

    Volume 85, Issue 2, June 2014, Pages: 305–325, Sumit K. MAJUMDAR

    Article first published online : 9 MAY 2014, DOI: 10.1111/apce.12037

  19. CYBERFEMINISMS, CYBERLITERACIES, AND EDUCATIONAL CYBERSPHERES

    Educational Theory

    Volume 49, Issue 4, December 1999, Pages: 457–474, Jane Kenway and Helen Nixon

    Article first published online : 25 JAN 2005, DOI: 10.1111/j.1741-5446.1999.00457.x

  20. You have free access to this content
    The Shot Heard Around the World Wide Web: Who Heard What Where About Osama bin Laden's Death

    Journal of Computer-Mediated Communication

    Volume 19, Issue 3, April 2014, Pages: 643–662, Barbara K. Kaye and Thomas J. Johnson

    Article first published online : 10 JAN 2014, DOI: 10.1111/jcc4.12055