Search Results

There are 79564 results for: content related to: Privacy Crimes, Annoyances and Self-Defeating Business Practices

  1. Cybercrime

    Standard Article

    The International Encyclopedia of Digital Communication and Society

    Federica Sarno

    Published Online : 11 FEB 2015, DOI: 10.1002/9781118767771.wbiedcs129

  2. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

    American Business Law Journal

    Volume 52, Issue 4, Winter 2015, Pages: 721–787, Amanda N. Craig, Scott J. Shackelford and Janine S. Hiller

    Version of Record online : 21 OCT 2015, DOI: 10.1111/ablj.12055

  3. Cybercrime and Cyberfraud

    Standard Article

    The Internet Encyclopedia

    Camille Chin

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie030

  4. Attribution in cyberspace: techniques and legal implications

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2886–2900, Jawwad A. Shamsi, Sherali Zeadally, Fareha Sheikh and Angelyn Flowers

    Version of Record online : 26 APR 2016, DOI: 10.1002/sec.1485

  5. Adolescents and Cybercrime: Navigating between Freedom and Control

    Policy & Internet

    Volume 3, Issue 2, May 2011, Pages: 1–28, Simone van der Hof and Bert-Jaap Koops

    Version of Record online : 10 AUG 2012, DOI: 10.2202/1944-2866.1121

  6. Cybercrime

    Standard Article

    The Encyclopedia of Theoretical Criminology

    Bradford W. Reyns, Billy Henson and Bonnie S. Fisher

    Published Online : 26 MAR 2014, DOI: 10.1002/9781118517390.wbetc077

  7. Digital Crime

    Standard Article

    The Encyclopedia of Crime and Punishment

    Chanel Hewitt and Catherine D. Marcum

    Published Online : 28 DEC 2015, DOI: 10.1002/9781118519639.wbecpx066

  8. Capacity Building in Cyberspace as an Instrument of Foreign Policy

    Global Policy

    Volume 7, Issue 1, February 2016, Pages: 83–92, Patryk Pawlak

    Version of Record online : 23 FEB 2016, DOI: 10.1111/1758-5899.12298

  9. Virtual Criminology

    Standard Article

    The Encyclopedia of Theoretical Criminology

    Amanda Bolton

    Published Online : 26 MAR 2014, DOI: 10.1002/9781118517390.wbetc092

  10. RICO's Extraterritoriality

    American Business Law Journal

    Volume 50, Issue 3, Fall 2013, Pages: 543–608, Gideon Mark

    Version of Record online : 19 AUG 2013, DOI: 10.1111/ablj.12014

  11. Data Security and the Cloud

    Journal of Corporate Accounting & Finance

    Volume 25, Issue 5, July/August 2014, Pages: 41–44, J. Ralph Byington and Jo Ann McGee

    Version of Record online : 16 JUN 2014, DOI: 10.1002/jcaf.21971

  12. You have free access to this content
    Appendix B: Network Security: Overview of Current Legal and Policy Issues

    Network Security: Current Status and Future Directions

    Christos Douligeris, Dimitrios N. Serpanos, Pages: 481–506, 2006

    Published Online : 14 JUN 2006, DOI: 10.1002/9780470099742.app2

  13. Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime

    Regulation & Governance

    Lennon Y.C. Chang, Lena Y. Zhong and Peter N. Grabosky

    Version of Record online : 23 AUG 2016, DOI: 10.1111/rego.12125

  14. Fighting the Cybercrime Plague

    Journal of Corporate Accounting & Finance

    Volume 24, Issue 5, July/August 2013, Pages: 3–7, Tommie Singleton

    Version of Record online : 19 JUN 2013, DOI: 10.1002/jcaf.21869

  15. Cybercrime: The Transformation of Crime in the Information Age – By D.S. Wall

    The British Journal of Sociology

    Volume 59, Issue 1, March 2008, Pages: 177–179, Steven Furnell

    Version of Record online : 5 MAR 2008, DOI: 10.1111/j.1468-4446.2007.00187_8.x

  16. Human Trafficking and Online Networks: Policy, Analysis, and Ignorance

    Antipode

    Volume 48, Issue 3, June 2016, Pages: 665–684, Jonathan Mendel and Kiril Sharapov

    Version of Record online : 6 JAN 2016, DOI: 10.1111/anti.12213

  17. You have free access to this content
    Bibliography

    Cybercrime and Cyberwarfare

    Igor Bernik, Pages: 145–161, 2014

    Published Online : 21 FEB 2014, DOI: 10.1002/9781118898604.biblio

  18. Using BITs to Protect Bytes: Promoting Cyber Peace by Safeguarding Trade Secrets Through Bilateral Investment Treaties

    American Business Law Journal

    Volume 52, Issue 1, Spring 2015, Pages: 1–74, Scott J. Shackelford, Eric L. Richards, Anjanette H. Raymond and Amanda N. Craig

    Version of Record online : 22 JAN 2015, DOI: 10.1111/ablj.12041

  19. You have free access to this content
    Public Policy Responses to Cybercrime

    Policy & Internet

    Volume 3, Issue 2, May 2011, Pages: 1–6, Stefan Fafinski

    Version of Record online : 10 AUG 2012, DOI: 10.2202/1944-2866.1139

  20. On the Use of Law in Transatlantic Relations: Legal Dialogues between the EU and US

    European Law Journal

    Volume 20, Issue 3, May 2014, Pages: 368–384, Elaine Fahey

    Version of Record online : 22 MAY 2013, DOI: 10.1111/eulj.12046